Blog

TA16-091A: Ransomware and Recent Variants

Original release date: March 31, 2016 | Last revised: May 06, 2016 Systems Affected Networked Systems Overview In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare facilities and hospitals worldwide. Ransomware is a type of malicious software that infects a computer

Read More
MSI NET Owner is Judge for Student STEM App. Building Contest

http://www.brooklyneagle.com/articles/2015/12/29/stem-contest-challenges-students-create-apps By Paula Katinas Brooklyn Daily Eagle Hey students, here’s a competition that is sure to test your app-titude. U.S. Rep. Dan Donovan is inviting students from his congressional district to use their creative skills to come up with original apps for a contest aimed at promoting education in the fields of science, technology, engineering

Read More
Cyber Crime- Are Your Client, Student, and Patient Personal and Financial Records Safe?

Credit N.Y. Times 12/10/15 Personal Tech http://paidpost.nytimes.com/norton/cybercrime-gets-personal.html?om_ext_cid=hho_ext_display_nr_greysf_299_US_599729_15438498 On a personal level we can always take steps to protect ourselves on a higher level. However, Are You Ready to prevent an attack on your entire company or institutions data history and payment information? MSI NET Can Give you the added layers of safety and with installation

Read More
Cyber Crime – Are Your Student, Client, and Personal Records Truly Safe?

Credit N.Y. Times 12/10/15 Personal Tech http://paidpost.nytimes.com/norton/cybercrime-gets-personal.html?om_ext_cid=hho_ext_display_nr_greysf_299_US_599729_15438498 On a personal level we can always take steps to protect ourselves on a higher level. However, Are You Ready to prevent an attack on your entire company or institutions data history and payment information? MSI NET Can Give you the added layers of safety and with installation

Read More
TA15-337A: Dorkbot

Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in

Read More

How Can CISCO Meraki Mobile Device Management Help YOU…? Using Cisco Meraki Systems provides easy centralized management, diagnostics, and monitoring for mobile devices connected to your organization — from iPads and Androids to Macs and PCs. We can monitor these devices, showing client hardware/software information and recent location, and even lets administrators remotely lock and

Read More
Did Cyber Monday Slow Your Company Down? Don’t Wait

  Credit to: By CHRISTINE HAUSER The New York Times http://www.seattletimes.com/business/target-and-paypal-sites-report-problems-on-cyber-monday Some of the most popular websites experienced an overload on Monday, similar to a crowd pushing its way into an already packed brick-and-mortar store.  Check out this article on how some popular retailers seemingly fell short of providing a smooth customer on line shopping experience.

Read More
10/23/15- N.Y. Times- Microsoft in the Cloud. Mike and Nick’s Week in Tech:

http://mobile.nytimes.com/2015/10/25/technology/farhad-and-mikes-week-in-tech-microsoft-in-the-cloud.html?emc=edit_th_20151025&nl=todaysheadlines&nlid=38241789&_r=0&referer= You, Nick, are our resident Microsoft expert. Tell me everything, starting with why they seem to be on a roll lately. Nick: One word: the cloud. Actually, that’s two words. The money they are making from it is now big enough ($5.9 billion) and growing fast enough that investors feel as if the company

Read More
TA15-286A: Dridex P2P Malware

Original release date: October 13, 2015 | Last revised: October 15, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of

Read More
TA15-240A: Controlling Outbound DNS Access

Original release date: August 28, 2015 | Last revised: August 30, 2015 Systems Affected Networked systems Overview US-CERT has observed an increase in Domain Name System (DNS) traffic from client systems within internal networks to publically hosted DNS servers. Direct client access to Internet DNS servers, rather than controlled access through enterprise DNS servers, can

Read More
TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations

Original release date: August 01, 2015 | Last revised: April 06, 2016 Systems Affected Microsoft Windows Systems, Adobe Flash Player, and Linux Overview Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing campaigns targeting U.S. Government agencies and private sector organizations.

Read More