Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites

    Fordham University Information Security and Assurance

    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    October 26, 20150

    Article: How To Stop Ransomware, The Cyberattack That Holds Your Computer Hostage Until You Pay

    By Gregory Rivas2 Mins Read

    The FBI and cybersecurity researchers have issued increasingly urgent warnings over the course of 2015, culminating this week with a…

    October 26, 20150

    Tip #18 Are You SURE You Want to Download that App?

    By Elizabeth Cornell1 Min Read

    A Snapchat notification twinkles out at you from the phone. It’s midterms week and you’re craving a break from studying.…

    October 23, 20150

    Tip #17 Free Antivirus Protection from Fordham

    By Elizabeth Cornell1 Min Read

    Did you know that Fordham University provides free antivirus protection to all students, faculty and staff? We provide this protection…

    October 22, 20150

    Security Alert: Apple Updates for iOS, OS X, watchOS, and Other Applications

    By Gregory Rivas1 Min Read

    Apple has posted security updates and feature improvements for its desktop, mobile, and developer gear. These updates cover a multitude…

    October 22, 20150

    Article: Support Scams That Plagued Windows Users For Years Now Target Mac Customers

    By Gregory Rivas1 Min Read

    Researchers at antivirus provider Malwarebytes spotted a Web-based campaign that attempts to trick OS X and iOS users into thinking…

    October 22, 20150

    Tip #16 Tips for a Strong, Secure Password

    By Elizabeth Cornell2 Mins Read

    Yesterday’s Tip #15 mapped out the perils of sharing your password and why it’s important to have a robust and…

    October 21, 20150

    Tip #15 Your First Line of Defense: Strong Passwords

    By Elizabeth Cornell2 Mins Read

    Your workout buddy, Fred tells you his Facebook account is acting glitchy. He wants to look up on Facebook this…

    October 20, 20150

    Tip #14 First It Was Phishing, Now It’s Smishing

    By Elizabeth Cornell1 Min Read

    On another (very important) note, another phishing technique lures consumers by using text messages containing URLs and phone numbers. Such a…

    October 19, 20150

    Tip #13 Is that a Fish on Sale or a Phish?

    By Elizabeth Cornell2 Mins Read

    Would an Ebay representative threaten to close your account lest you submit $150? Would Amazon normally offer you $100 free…

    October 16, 20150

    Tip #12 The Upshot on Updates

    By Elizabeth Cornell2 Mins Read

    Your car needs regular servicing to keep it in good condition.  Your computer, mobile devices, and software applications need regular…

    Previous 1 … 38 39 40 41 42 … 87 Next
    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (334)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (105)
    • Security Awareness (263)
    • Security Guides (35)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.