
Topics covered in this newsletter include Incident Response and Current Threats.
Ransomware is becoming one of the most widely-known types of cyber attacks today. It is malware that uses asymmetric encryption, or cryptography that uses a pair of keys to encrypt…
Spear phishing seems to be a never-ending threat. In fact, a new version is making its way through the Institute. The newest message differs in the subject and content of…
I am beginning to see a few versions of this phishing scam, but they are all attempts to steal your password. The message may come from MS – Utk –…
Topics covered in this newsletter include Policy Updates, Risks from Falling for Online Scams, and Current Threats.
With the start of the new semester, it seems that a few zoom bombings have taken place. Zoom bombing, also called Zoom raiding, is when an uninvited person(s) enters a…
Topics covered in this newsletter include Passwords, Zero Trust, and Current Threats, including Ransomware.