Healthcare IT Support Blog Archives

by | Feb 19, 2016

Important Alert: NEW Office 365 Phishing Threat

A new phishing attack is using fake non-delivery notification in an attempt to steal users’ Microsoft Office 365 credentials. These credentials will then be used to send messages from the users account, further spreading malicious emails and software. In this case,...

A New SamSam Ransomware Alert Issued

The United Staes Computer Emergency Readiness Team (US-CERT) of the Department of Homeland Security (DHS) have issued a new alert for a ransomware known as SamSam (MSIL/Samas.A.) - just days after two mastermind suspects were charged by US Department of Justice. The...

Ransomware – Still Alive and Kicking

If not familiar, Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. A computer can become infected with Ransomware in a number of ways; thorough an email, an infected link, or even an infected ad on a...

Sextortion: what you should know of this new email scam

Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...

Sextortion: what you should know of this new email scam

Sextortion, yes that is correct, is a new twist on an old email scam in which the scammer has indicated that they have compromised your computer via malware and recorded you or your family members watching porn. The attacker then threatens to release the video to all...

Top-Clicked Phishing Email Subjects

Think before you click! KnowBe4, a provider of security awareness training and simulated phishing attacks, has released statistics on the top 10 phishing email subjects that are opened by end-users. Drum roll please - the top 10 are: Password Check Required...

What to Do About C-Level Fraud Attacks

C-level fraud attacks are an increasingly common attack vector, especially for SMBs. Generally, these attacks come in the form of spoofed emails from the “CEO” or another C-suite executive and ask the recipient to wire role power (people tend to do what the boss says)...

CPU Meltdown and Spectre Alert Update

powersolution.com has been testing the patches provided by Microsoft and computer vendors to patch the two vulnerabilities dubbed Meltdown and Spectre. To recap, roughly every processor produced since 1995 is susceptible to a flaw that could allow an attacker to gain...

CPU Meltdown and Spectre Alert Update

powersolution.com has been testing the patches provided by Microsoft and computer vendors to patch the two vulnerabilities dubbed Meltdown and Spectre. To recap, roughly every processor produced since 1995 is susceptible to a flaw that could allow an attacker to gain...

Copyright © 2019 powersolution.com. All rights reserved.