October 2016

Scareware

Halloween is all about tricks and treats and about dressing up as something you're not. So is scareware.

Scareware can take many forms, but usually presents itself as a pop up window on your computer that looks like it is from your computer. It might say your computer has been infected with a virus that needs to be removed, or that your software is malfunctioning and you need to fix it. Usually the message tells you to go to the link provided to purchase and download anti-virus software. Once the software is purchased the download

Read more about Scareware

Spooky Computer Threats

With Halloween approaching, this week's blog is about a seriously spooky and ghoulish collection of creepy computer threats you need to be on the look out for.

A Botnet (also known as a Zombie Army) is a group of network-connected zombie computers that have been hacked and are being controlled by bad actors to collectively perform tasks such as sending spam or causing a denial of service (DoS) attack on a site.  Usually the owners of the zombie machines are unaware that they have been compromised

Read more about Spooky Computer Threats

Stache Second Factor Authentication

The Stache secure credential escrow service from the Information Security Office offers the ability of a second authentication method to further protect access to your sensitive information. As we have covered in earlies articles, two-factor authentication (2FA) requires more than a password to gain access to online resources. It requires a second form of authentication. Common second forms make use of cellphones, either through the messaging of nonces or through approvals sent by app.

Stache offers several choices of 2FA mechanism. We recommend SMS on your cellphone as the easiest

Read more about Stache Second Factor Authentication

What Stache Is and How to Use It to Share Confidential Information

The UT Information Security Office (ISO) created Stache (named after the moustache of the fictional TV private eye Thomas Magnum, portrayed by Tom Selleck)  to provide secure storage, sharing, and backup of such sensitive data as passwords, encryption keys, lock codes, and personal identification numbers. The creator of an entry in Stache controls who can see and/or edit the

Read more about What Stache Is and How to Use It to Share Confidential Information