Search

Recent Post

Archives

Jim Pardonek


SPAM Email Contains Ransomware

April 7th, 2016

Early this morning, Loyola email users may have noticed an email in their inbox that appears ot come from a legitimate source containing a Word document that has an embedded program that attempts to install ransomware named “Locky” The email looks to be from: ebilling@angelsprings.com and has the subject line: “Your Latest Documents from Angel […]


Thursday May 5th is World Password Day

May 5th, 2016

  May 5 is World Password Day, an annual effort to encourage safe password practices. The World Password Day 2016 theme is multi-factor authentication (MFA) – also called two-factor authentication (2FA) or two-step verification – which provides an extra layer of security to your online activities. The National Cyber Security Alliance (NCSA), a proud champion […]


JavaScript Ransomware Spreading

January 6th, 2016

What is believed to be the first JavaScript-based ransomware-as-service is spreading. Because of the way it works, Called Ransom32, it is likely to be able to infect multiple operating systems including Windows Mac and Linux. It is generally spread via phishing type email and is contained in a self executing ZIP file attachment that is […]


Welcome to National Cyber Security Awareness Month

October 8th, 2015

October is National Cyber Security Awareness Month (NCSAM), conducted every October since 2004, this national public awareness campaign is intended to encourage everyone to protect their computers and our nation’s critical cyber infrastructure. Cyber security requires vigilance 365 days per year. However, the Department of Homeland Security (DHS), the National Cyber Security Alliance (NCSA), and […]


August 23, 2013 Phishing Report

August 23rd, 2013

This one was captured this morning. Luckily there are no links in this one. From: Sung Lee Sent: Thursday, August 22, 2013 5:07 PM To: Recipients Subject: Business Ethics. Greetings, I am Mr.Sung Lee,Auditing and Account Credit Officer,Dah Sing Bank Ltd (Hong Kong).I will give you the details but in summary,the funds are coming via […]


August 26, 2013 Phising Report

August 26th, 2013

This is the latest phishing email reported to the Loyola Information Security Office From: LUC-Webmaster [mailto:webteam@luc.edu] Sent: Tuesday, August 27, 2013 11:35 AM To: WebTeam Subject: Update Dear User Your password will expire in Three Days Click on the link below to validate your e-mail. CLICK HERE System Administrator The link is an attempt to […]


August 22, 2013 Phishing Report

August 22nd, 2013

After a quiet few days, the phishers are at it again. The first one from today was easy to identify because it came from a London bank: Our Valued Account Holder, Lloyds TSB Bank technical services department is carrying out a scheduled software upgrade to improve the quality of services for the online banking customers. […]


August 15, 2013 Phishing Report

August 15th, 2013

This phish was received by one of our automated mailboxes this morning. It claims that your account has been compromised and unless you follow the instructions, your account will be blocked. ATTENTION : MAIL VIOLATION NOTIFICATION This Account has been Compromise; User is advice to follow the admin assistance below for authentication of this account. […]


It’s IRS SPAM Season Again

April 11th, 2013

As we get closer to the tax filing deadline, many of us have received or are anticipating a refund (at least we hope so). Spammers, looking to make a quick buck, sometimes hundreds of dollars, use this opportune time to send messages aimed at getting one’s personal information and thus access the one’s bank account. […]


August 13, 2013 Phishing Report

August 13th, 2013

The Latest phish received contains the following subject line: “Faculty/ Staff/ Employee Notification” The Body of the email reads: Institution account routine, this has been made mandatory for all users.Due to the IP Security upgrades we have reason to believe that your webmail account was accessed by a third party. You are advice to re-validate […]