Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites

    Fordham University Information Security and Assurance

    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    October 28, 20160

    Article: Free Tools to Remove Ransomware Infections From Your PC

    By Gregory Rivas2 Mins Read

    “Ransomware, a variety of malware which encrypts user files and demands payment in return for a key, has become a…

    October 28, 20160

    Tip #20 Avoid Unlicensed Mobile Applications

    By Gerald Johnson Jr.1 Min Read

    There are ways in which some users manipulate their devices to accept unsigned or unlicensed apps on to their devices…

    October 27, 20160

    Tip #19 Don’t Let Your Computer Get Sick (Viruses)

    By Gerald Johnson Jr.1 Min Read

    Viruses are small software programs that perform malicious actions and are designed to systematically spread from one device to another.…

    October 26, 20160

    Tip #18 Gone Phishing? Don’t Get Hooked!

    By Gerald Johnson Jr.2 Mins Read

    Phishing is the act of attempting to deceive a user into divulging personal or confidential information such as login credentials,…

    October 25, 20160

    Tip #17 Don’t Be Forced to Pay for Your Stuff! (Ransomware)

    By Gerald Johnson Jr.1 Min Read

    Ransomware is a form of malware that prevents or limits a user’s access to their files or devices . The…

    October 24, 20160

    Tip #16 Be Wary of Malware

    By Gerald Johnson Jr.1 Min Read

    Malware is a name given to a malicious piece of software or code that is designed to compromise and disrupt…

    October 21, 20160

    Tip #15 Be Aware of Your File Sharing Settings

    By Gerald Johnson Jr.1 Min Read

    File sharing settings on your computer can be dangerous if not implemented properly. Lax settings can allow malicious actors to…

    October 20, 20160

    Tip #14 Be Wary of Mandatory Software Downloads for Wi-Fi Access

    By Gerald Johnson Jr.1 Min Read

    Some establishments offer free Wi-Fi access after accepting their terms of service policies. You should always familiarize yourself with what…

    October 19, 20160

    Tip #13 Pay Attention to Permissions and Privacy Policies

    By Gregory Rivas2 Mins Read

    Application permissions on your mobile devices grant an application access to certain information or functions of your phone. When you…

    October 18, 20160

    Alert: Notice of McAfee Class Action Settlement Email

    By Gregory Rivas5 Mins Read

    This is an questionable email that has been reported. This message was received on or about October 12th, 2016. It…

    Previous 1 … 30 31 32 33 34 … 87 Next
    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (334)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (105)
    • Security Awareness (263)
    • Security Guides (35)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.