VirtuallySurreal
Tech Services

Advisories

Full Article and Source - https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-6

New generational approach enables users to easily differentiate between Wi-Fi® technologies

Austin, TX, - October 3, 2018 – Wi-Fi Alliance® introduces Wi-Fi 6 as the industry desi...

V_S
2018-11-14 01:48 AM - Comment(s)

Full Article and Source - https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/

Sextortion

The basic elements of this sextortion (FBI Website explaining Sextortion) scam email have been around for some time, and usually the only thing that changes with this pa...

V_S
2018-07-13 05:34 AM - Comment(s)

Basically, Smishing is Phishing (like you get in your email), except it's on your Smartphone through SMS Text messages. The word itself is a mashup of SMS and Phishing, as you can see better when it's displayed like this: SMiShing.

Smishing is dangerous, as a text sent to your phone implies legitimac...

V_S
2017-07-08 09:07 PM - Comment(s)

Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interest. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then get...
V_S
2017-07-08 10:04 AM - Comment(s)

Scammers don’t really give refunds


The FTC has been cracking down on deceptive tech support operations that call or send pop-ups to make people think their computers are infected with viruses. Scammers ask for access to computers, then charge people hundreds of dollars for unnecessary repairs. In Ope...

V_S
2017-06-23 04:35 PM - Comment(s)

iOS 11 will render older iPhones, iPads and apps obsolete (And potentially cause issues with 32-bit apps in compatible 64-bit devices).


Apple’s iOS 11 update means iPhone 5 and 5C wi...

V_S
2017-06-20 07:02 AM - Comment(s)

Full Gizmodo Article - http://gizmodo.com/gop-data-firm-accidentally-leaks-personal-details-of-ne-1796211612


Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a public...

V_S
2017-06-20 06:47 AM - Comment(s)

The best way to avoid falling for scams, phishing, fake websites, and getting infected with malware/virus is knowing how to spot fake email and avoid clicking on anything that is suspicious.


You are the last line of defense in keeping your devices, information, and identity safe!


Social Engineering R...

V_S
2017-06-06 02:35 AM - Comment(s)

A must read for everyone, although some mitigation options listed are quite expensive and others only possible in highly-managed Enterprise environments. 

Full SEI Article - 

https://insights.sei.cmu.edu/sei_blog/2017/05/ransomware-best-practices-for-prevention-and-response.html 
V_S
2017-06-01 09:34 PM - Comment(s)

Think you got an email from a business you know? Scammers sometimes use emails that look legit to trick you into sending money to them.


The email might say it’s from a real estate professional you’re working wit...

V_S
2017-05-30 09:39 AM - Comment(s)


Federal Trade Commission - HOW TO SPOT A TECH SUPPORT SCAM:

Learn how to spot and report Tech Support Scams:

V_S
2017-05-30 09:29 AM - Comment(s)

Identity theft, or identity fraud, is a crime that can have substantial financial and emotional consequences. Take precautions with personal information. If you become a victim, act immediately to minimize the damage.


V_S
2017-05-30 08:31 AM - Comment(s)

Do not give sensitive information to others unless you are sure that they are indeed who they claim to be and that they should have access to the information.


V_S
2017-05-30 04:16 AM - Comment(s)

Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent. When troubleshooting problems with your computer, you may discover that the source of the problem is spyware software that has been installed on you...

V_S
2017-05-30 03:25 AM - Comment(s)

While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know.


V_S
2017-05-30 03:23 AM - Comment(s)

When vendors become aware of vulnerabilities in their products, they often issue patches to fix the problem. Make sure to apply relevant patches to your computer as soon as possible so that your system is protected.


V_S
2017-05-30 03:10 AM - Comment(s)

Explore the resources in this section to learn more about cybersecurity and to better secure your home and small-business networks - Provided by US-CERT:


While it helps to have a grasp of the basics, when it comes to the protection and security ...
V_S
2017-05-30 02:46 AM - Comment(s)

Alerts provide timely information about current security issues, vulnerabilities, and exploits - Provided by US-CERT:


V_S
2017-05-30 02:38 AM - Comment(s)

Tips describe and offer advice about common security issues for non-technical computer users - Provided by US-CERT:


V_S
2017-05-30 02:35 AM - Comment(s)