Author Archives: alfredfustakgi

CyberSecure Solutions Security Bulletin (September 4, 2019)

Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and […]
Read More »

CyberSecure Solutions Security Bulletin (August 21, 2019)

Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example […]
Read More »

CyberSecure Solutions Security Bulletin (August 7, 2019)

Overview Phish Tale of the Week Cyber Attacks on the Rise US Utilities Have Become Targets How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week For this week’s Phish Tale of the Week, we’re taking a look at the phishing email that was sent to our HQ office that claims to be a promotional […]
Read More »

CyberSecure Solutions Security Bulletin (July 24, 2019)

Overview Phish Tale of the Week Sprint Breach Exposes Customer Data Critical Flaw Found In VLC Media Player How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week As is typical for most businesses, our HQ Office inbox receives the occasional phishing email attempting to trick an employee into sending the perpetrator some sort of […]
Read More »

Netizen Cybersecurity Bulletin (July 10, 2019)

Overview Phish Tale of the Week Microsoft’s BlueKeep Proves Vulnerable Critical Warning Issued for Samsung Cellphone Update App How Can Netizen Help? Phish Tale of the Week Phishing attempts are often carried out with urgent messages that are meant to provoke the victim to act without rationally thinking about the contents of the email. In […]
Read More »

Netizen Cybersecurity Bulletin (June 26, 2019)

Overview Phish Tale of the Week Vulnerability in TP-Link’s Wi-Fi Extenders Could Allow Remote Control to Attackers Latest Phishing Scam Impersonates Apple Support How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing email targeting […]
Read More »

NETIZEN AWARDED $845,000 U.S. ARMY CYBER SECURITY ENGINEERING CONTRACT

Allentown, PA: Netizen Corporation, an ISO 27001:2013 certified provider of cyber security and related solutions for defense, government and commercial markets, was awarded an $845,000 contract with the U.S. Army supporting the Project Manager Training Devices (PM TRADE) organization in Orlando, Florida. The work under the contract, which began on May 31st, includes Cyber Security […]
Read More »

Netizen Cybersecurity Bulletin (12 June 2019)

Overview Phish Tale of the Week Microsoft Urges Users to Patch BlueKeep Security Flaw U.S. Customs and Border Protection Data Breach How Can Netizen Help? Phish Tale of the Week Malicious actors are constantly finding new ways to target a big payday. In the newest trend, these cyber criminals are using secured websites to run […]
Read More »

Netizen Cybersecurity Bulletin (29 MAY 2019)

Overview Phish Tale of the Week First American Financial Corp. Leaks 800+ Million Records Google Begins Tracking “zero-day” Exploits How Can Netizen Help? Phish Tale of the Week One way a malicious actor can try to collect a business’ sensitive information is by targeting the business’ employees. Attempting to phish an employee requires some research […]
Read More »

Netizen Cybersecurity Bulletin (15 MAY 2019)

Overview Phish Tale of the Week Ransomware Attacks Hit Baltimore City Servers Hospitals Demanding Better Cybersecurity from Device Makers How Can Netizen Help? Phish Tale of the Week Malicious actors are often attempting to find an unassuming victim to target with the goals of persuading them to provide log-in credentials or download malware. Some of […]
Read More »