- Southern Oregon University
Teksquisite is an IT Consultant with over 20+ years of combined computing experience in higher education; hardware, software, network, internet security, open source, web development & design, and IT consulting expertise.
Teksquisite is currently heavily immersed in promoting social media,researching malware progression in social networking, monitoring botnet activity, and always fighting the good fight to keep our Internet safe!
- Teksquisite SecurityIT Consulting &Social Media Enthusiast, present
- Keene State College
Last week Trend Micro reported that this version now uses heavily obfuscated hardcoded URLs.
Would you pay the ransom?
Ok, well actually it does if you do think it means Spam Everything Often.
These days it is becoming extremely difficult to download software from an official source without getting gobsmacked by a sundry of unwanted programs. PUPs is an acronym for potentially unwanted programs and frequently propagate through:
Download portals (Express installations)
Fake updates (malicious sites)
Browser add-ons (or toolbars)
Legitimate software companies (third-party programs included in their installer)
#adware #security #PUPs #privacy
Recently I purchased a VIZIO E-Series 24” Class Razor LED™ Smart TV (for my office). Imagine my surprise when I walked out of the office for a few seconds and stepped back in and saw a firmware update (with a one minute timer alert displayed on the screen) regarding broadcast interactivity. If I had not stepped immediately back into my office — I may never have known that Smart Interactivity was turned on and that the firmware was updated without my permission.
#smartintreactivity #smarttv #privacy
My recent blog post on ransomware is listed below and I just heard about the NJ attack today :)
Cybercriminals are finding out that employees are easy targets. Targeting email to specific employees within an organization is more lucrative than going after thousands of random people. Fraudsters can tailor an email to appear as though it is coming from a company executive, a vendor, partner, or even a current client or customer. Some of these emails may be followed up with a phone call — which makes it much easier to socially engineer a victim.
#security #phishing #email #businesstips
#millennials #GenY #workplace #babyboomers #generationx