Researchers at Trustwave have shed light on a recently discovered phishing campaign revolving around Facebook Messenger bots. If you don't spend much time on social media, chatbots are programs designed to impersonate live people and are usually relegated the task of answering simple questions as a form of triage customer support. If the bot can't answer the question, then a handoff escalation is made to a human customer support person. That's how it's supposed to work, [...]
Hackers found a new way to slip malware past your defenses. Researchers around the world have spotted a curious new campaign designed to scare victims by sending them emails warning of copyright infringement. The email begins by warning that the recipient's website is hosting copyright-protected content and threatens legal action if the offending material isn't removed immediately. The red flag here is that rather than simply spelling out what materials are copyright protected [...]
Conflict in the workplace is sadly inevitable. Put a group of people in a room together for eight hours or longer every day, week after week. No matter how well they get along, sooner or later, it's going to happen. Since it can't be completely avoided, the next best thing is to have a plan for when it occurs. That's because if left unaddressed, employee conflicts can ruin morale and permanently damage your company's culture. Simply put, letting conflicts in the workplace [...]
Do the meetings you hold tend run off the rails? Do you find that they frequently run far longer than you intended and that very little actually comes out of them? If those things are true and if you're looking for ways to improve the structure of your meetings, here are some quick tips that will help make them more effective: 1 - Consider Your Attendees Carefully Unless someone's presence is essential at any given meeting, don't send them an invite. Keep the circle as [...]
While "vishing" is by no means a new threat, it's not something that has ever happened with sufficient frequency to get most people's attention. So, if you haven't heard the term before, you're not alone. "Vishing" is short for voicemail phishing, and it is apparently on the rise based on data collected by the security firm Zscaler. Attackers are specifically targeting tech firms and US military installations. No actual voice mails are involved, which is interesting. What the [...]
Data security isn't something that's at the forefront of most people's minds, but it probably should be. These days, we use far more than just our trusty laptops and desktops to do real, meaningful work. Most people have a plethora of devices they tap into on a regular basis and take with them wherever they go. From smart phones to smart watches and more, the average person has no less than four different devices they can and often do use to get stuff done. How safe are [...]
Recently, Microsoft published a fascinating blog post. In the blog post, they said they were experimenting with "novel approaches" when it comes to harnessing the power of AI to spot threats on the threat landscape before they become a problem. In particular, the company is focused on stopping ransomware attacks while they're still in their earliest stages. To get even more fine-grained than that, they are specifically targeting human-operated ransomware campaigns. They note that [...]
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN Router If so, be advised that a new and critical security vulnerability has been found that impacts your equipment. It is being tracked as CVE-2022-20825. With a severity rating of 9.8 out of a possible 10, it's about as serious an issue as it's possible to have. What [...]
Remember the Heartbleed scare we had a couple years back? It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent shockwaves through the entire world. Well, it's back. In a way. While this new side-channel attack isn't identical, it's similar enough that the researchers who discovered it gave it a similar sounding name: Hertzbleed. It allows remote attackers to pilfer full cryptographic keys by[...]
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember when you had to pay for long distance telephone calls? That's mostly a thing of the past. In under a minute, you can install any number of messenger apps, most of which offer VOIP capabilities and make calls to just about anywhere for nothing. Today's youngsters might not believe this, but [...]
Corporate Offices
4801 Southwick Drive, Suite 260, Matteson, IL. 60443
[email protected]
(708) 365-1000 | (847) 450-6500
(c) 2017 - Medicus Technologies - All Rights Reserved