Halloween is all about tricks and treats and about dressing up as something you're not. So is scareware.
Scareware can take many forms, but usually presents itself as a pop up window on your computer that looks like it is from your computer. It might say your computer has been infected with a virus that needs to be removed, or that your software is malfunctioning and you need to fix it. Usually the message tells you to go to the link provided to purchase and download anti-virus software. Once the software is purchased the download
With Halloween approaching, this week's blog is about a seriously spooky and ghoulish collection of creepy computer threats you need to be on the look out for.
A Botnet (also known as a Zombie Army) is a group of network-connected zombie computers that have been hacked and are being controlled by bad actors to collectively perform tasks such as sending spam or causing a denial of service (DoS) attack on a site. Usually the owners of the zombie machines are unaware that they have been compromised
The Stache secure credential escrow service from the Information Security Office offers the ability of a second authentication method to further protect access to your sensitive information. As we have covered in earlies articles, two-factor authentication (2FA) requires more than a password to gain access to online resources. It requires a second form of authentication. Common second forms make use of cellphones, either through the messaging of nonces or through approvals sent by app.
Stache offers several choices of 2FA mechanism. We recommend SMS on your cellphone as the easiest
The UT Information Security Office (ISO) created Stache (named after the moustache of the fictional TV private eye Thomas Magnum, portrayed by Tom Selleck) to provide secure storage, sharing, and backup of such sensitive data as passwords, encryption keys, lock codes, and personal identification numbers. The creator of an entry in Stache controls who can see and/or edit the