Criminals Using SMS Messages to Beat Multifactor Authentication

For several years, cyber criminals have used text message scams called “smishing” to steal personal information. Now, SMS messages are being used to infiltrate peer-to-peer (P2P) payment service used by many financial institutions. According to Krebbs on security, criminals have deployed a Zelle fraud scam that allows them to circumvent multifactor authentication and access a

Posted in Industry News | Comments Off on Criminals Using SMS Messages to Beat Multifactor Authentication

Choosing and Protecting Passwords

You probably use personal identification numbers (PINs), passwords or passphrases every day: from getting money from the ATM or using your debit card in a store, to logging in to your email or your company’s VPN. Tracking all the number, letter and special character combinations may be frustrating, but these protections are important because hackers

Posted in Industry News | Comments Off on Choosing and Protecting Passwords

Ransomware 101

Source: CertifID The Cybersecurity & Infrastructure Security Agency (CISA) says ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files, such as .aaa, .micro, .encrypted, .ttt, .xyz, .zzz, .locky, .crypt, .cryptolocker, .vault, or&.petya, to show that the files have