G2 Security Expert

Helping Tomorrow's Future

Menu
  • Privacy Policy
  • About Us
  • Small Business
  • For Your Home
  • G2 Threat Update

Category: G2 Threat Update

SMS Phishing – A real world kill chain review

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

A few days ago as I was walking out to the door headed to a meeting when my phone dinged.  It was a new SMS message that read “do not show anybody i sent that” and contained a linked.  It came from a number not in my contact list so I just ignored and thought […]

Read More »

Malicious Chrome Extensions – A Drive by Download

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Definition of a Drive By Download: Google: “A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”) a browser, app, or operating system that is out of date and has a security flaw.” Case Study: Late last week while traveling […]

Read More »

Why Anti-Virus is Not Enough for Your Endpoints!

No Comments
| G2 Threat Update, Small Business, Threat Reviews

Rather you purchased a new laptop from Best Buy or was issued one from your IT department the odds are it came with antivirus software.  Antivirus software is designed to detect and ultimately quarantine and remove viruses from machines. Antivirus software mitigates many forms of malware such as keyloggers, backdoor, trojan horses, and so on.  […]

Read More »

WiFi Access Points – What you need to know!

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

Is your office on a WiFi hotspot?  Do you connect to your local Starbucks, hotel, or at the gym?  Chances are you connect to WiFi to save from costly cellular data plans. Also, as more and more enterprises are enabling WiFi these access points are ripe for malfeasance.  Let’s look at a WiFi kill-chain to […]

Read More »

Top 6 Considerations for Identity Management

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Managing identities correctly will not only give your business a competitive advantage but it will also make you more secure. Rather you are managing employee, customer, or contractor identities you must take into consideration how you are going to not only use this information but also how to keep it secure.  If you don’t have […]

Read More »

CVE’s – What You Need to Know!

2 Comments
| G2 Threat Update, Small Business

Part of any good security hygiene program is to make sure you are up to date with the latest security patches.  As of May 22, 2018  there have been 11,555 common vulnerability and exposures reported.  In 2017 there were a total of 53,976 CVE’s reported. These numbers are daunting to say the least.  In small […]

Read More »

What Atlanta is Teaching Us

No Comments
| G2 Threat Update, Small Business

Overview: Atlanta was recently a victim of a ransomware attack. Ransomware as the name implies is a type of software that will encrypt all the files on your computer and will not release a key/password until a ransom is paid. Atlanta is not the first nor will they be the last to experience this type […]

Read More »

Is Your Bluetooth Safe?

No Comments
| G2 Threat Update, Threat Reviews

Most of us turn on Bluetooth and just leave it on.  The fact is Bluetooth poses security challenges that need to be addressed. Bluetooth History and Background Bluetooth’s name came after King Herald and if you ever watched the movie “A Kingsman” then you’ll undoubtable remember the dinner scene when Gary ‘eggsy’ Unwin shows off […]

Read More »

A Bot Everyone Likes!

1 Comment
| G2 Threat Update

There are a lot of bad bots out there.  For example, Mirai, Brobot, or even zombie bots are wreaking havoc across all industries.  There’s also the “not so bad” bots.  These are things like aggregators Mint, Yoodlee, and others that run on behalf of a human. Well these aren’t the type of bots we are […]

Read More »

Please follow & like us :)

LinkedIn
Twitter
Follow by Email
Facebook
Google+
https://www.g2expert.com/category/security-updates">

Recent Post

  • SMS Phishing – A real world kill chain review
  • Malicious Chrome Extensions – A Drive by Download
  • Customer Identity Landscape is Evolving
  • Why Anti-Virus is Not Enough for Your Endpoints!
  • WiFi Access Points – What you need to know!

G2 Security Expert 2023 . Powered by WordPress