KSU Student Arrested for Hacking – Keylogger Use Suspected

A student at Kennesaw State University was recently arrested on charges that he hacked into the school’s systems and changed grades. When police searched his home, they found a notebook containing numerous KSU employee usernames and passwords. It is very likely this information was captured with the use of a software or hardware keylogger. Keyloggers are devices […]

Amazon.com Found Reused Passwords – Was Yours One of Them?

Amazon.com has announced that during some sort of routine account security monitoring, the company discovered a large cache of usernames and passwords on the Internet that were reused for Amazon.com accounts. Since the scope and nature of this data has yet to be disclosed, it is highly advisable that everyone change his/her Amazon.com password and enable two factor […]

Tips for Avoiding Malware from the FTC

Malware – a portmanteau of “malicious software” – is any unwanted program that interferes or subverts the normal, everyday use of computing device. Malware continues to proliferate through email and on the Internet and although malware can be difficult to discern from legitimate software, the FTC has compiled a great list of easy-to-remember steps you can take to […]

Stop. Think. Connect. It’s National Cybersecurity Awareness Month!

This October is the 13th annual National Cyber Security Awareness Month. This event was founded in order to raise awareness about the risks we face online and our responsibilities to protect ourselves and our data in an increasingly Internet-connected society. Check out the attached flyer for basic tips for staying safe online and look for more cyber security […]


Public USB Chargers: Are They Safe?

/ Whether it’s a Micro USB, Lightning, USB Type-C, or something else, invariably one side of the charging cable that we use with our phones has a standard USB (sometimes called Type-A) connector. Although it’s easy to think of these cables as just a way to recharge your device, the USB standard was introduced primarily […]

The Dropbox Hack: It’s Worse Than You Thought

You may have heard about an account breach with the cloud storage and file sharing service Dropbox that involved the disclosure of usernames and password hashes in 2012, but the full extent of that breach has not been public knowledge until this week. Over 68,000,000 account records have been discovered online and verified as authentic. […]

Convention Attendees Fall Victim to Fake Wi-Fi

Security research company Avast Software set up fake Wi-Fi access points with network names like “Google Starbucks”, “Xfinitywifi”, “I Vote Trump! free internet”, and “Attwifi” at various locations around the Republican National Convention in Cleveland last week. While many attendees intentionally connected to these networks, many others did so unknowingly because their devices were set […]

New Ransomware Phishing Campaign – Scanned Documents

GHC ITS has been alerted about a new ransomware campaign that took place at another University System of Georgia institution recently. The attack consisted of an email message masquerading as a document sent with a scan-to-email function from a printer at that institution. This message contained a malicious attachment with a ransomware and remote access trojan […]

Ransomware: not just for computers

Smartphones have become so powerful that there are only minor technical differences between the computer in your pocket and the one on your desk. Phones (Android devices, in particular) are vulnerable to the same types of malicious software that can infect Windows computers. Kaspersky Labs recently released a study that notes a dramatic rise in […]