IT Alert: Osama-Themed Phishing Attempts

May 6, 2011 | Alerts

The United States Computer Emergency Readiness Team (https://www.us-cert.gov) reports that Internet criminals often take advantage of high-profile news stories, such as the recent death of Osama bin Laden, by launching a mass phishing attack, termed “spear phishing.” Embedded links (allegedly to access video coverage, photos or other multimedia) and attachments are used to lure you into providing confidential information and/or to infect your computer system, or draw you to a Web site designed to infect your computer or network.

While there have been no reports of these email phishing attacks yet, similar attacks have already begun to appear on popular social media sites such as Facebook. Axxys Technologies recommends the following safe computing practices to protect yourself and your IT resources from email scams:

 

  1. Do not click on links contained within an email unless you are certain of the sender’s identity and expecting the information;
  2. Do not open attachments unless you are certain of the sender’s identity and expecting the information;
  3. If absolutely unsure of an email, and you are suspicious, email a “screenshot” of the email message (NOT the actual email) to your IT support contact for review;
  4. Delete and do not reply to any of these emails;
  5. Update your desktop, laptop, and/or mobile device anti-virus software; and
  6. Keep current on critical system updates:

 

Windows Users: https://windowsupdate.microsoft.com

Mac Users: Use Software Update in System Preferences

 

We encourage you to be vigilant in practicing safe computing. For more information or questions, please contact your Axxys Technologies support personnel.

Recent Posts

The Modern Digital Warzone

The Modern Digital Warzone

Cybersecurity often shares many comparisons to military and borrows many concepts and terminology from the forces. For example, the Lockheed Martin Cyber Kill Chain is borrowed from a military concept related to the structure of an attack consisting of target...

Do You Secure Your Lawn?

Do You Secure Your Lawn?

Do you secure your lawn? No, I don’t mean from the likes of “Dennis the Menace”, and hopefully you’ve never uttered the phrase “you darn kids get off my lawn!” But believe it or not, there are some similarities between caring for your lawn and cybersecurity....

So, What’s the Big Deal About Ransomware?

So, What’s the Big Deal About Ransomware?

Thanks to the recent Colonial Pipeline and JBS cyberattacks (and their subsequent impacts), you’re probably encountering the term ransomware more than you used to and it’s not hard to see why – the number of successful ransomware attacks is rising dramatically. The...

A New Era in Cybersecurity – Assume Breach Mentality

A New Era in Cybersecurity – Assume Breach Mentality

As we kickoff a new year of 2021 and begin marching towards this year’s goals and objectives for success, I wanted to share thoughts and feedback around the ever-growing elephant in the room called cybersecurity. It has been a challenge for small businesses for many...