About Stacey Ehling

This author has not yet filled in any details.
So far Stacey Ehling has created 27 blog entries.

Holiday Threats & Scam Warnings

By |2024-11-27T14:19:12-05:00November 27th, 2024|

Beware of the Latest Cyber Threats Targeting You This Holiday Season The holiday season presents an attractive target for financially motivated cybercriminals who seek to exploit online retailers and shoppers. Despite the challenges posed by high inflation rates, the National Retail Federation (NRF) predicts a three to four percent increase in retail sales for the [...]

TrickMo or Treat: Stealing Android PIN numbers & patterns

By |2024-12-12T17:49:39-05:00October 17th, 2024|

Security researchers have uncovered the newest tricks in TrickMo’s playbook. The latest variant of TrickMo can steal a user’s device PIN or pattern. This new feature also allows threat actors to use the device while it is locked. The malware shows an HTML page displayed in full-screen mode, designed to replicate the Android unlock screen. [...]

October is Cyber Security Awareness Month

By |2024-09-26T14:15:38-04:00October 1st, 2024|

The MEL and the Cyber JIF are proud to be part of the 2024 Champions Program and support Cybersecurity Awareness Month. October is Cybersecurity Awareness Month, an international initiative that educates everyone about online safety and empowers individuals and businesses to protect their data from cybercrime. Even amidst large-scale data breaches and cyberattacks, Cybersecurity Awareness Month [...]

Google Chrome Vulnerability

By |2024-08-23T17:07:09-04:00August 23rd, 2024|

NJCCIC ADVISORY: Aug. 23, 2024CCIC Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, [...]

NJ Pension Plan “Help” Scams

By |2024-08-08T16:32:55-04:00August 8th, 2024|

NJCCIC Bulletin: August 8, 2024 Pension Plan Help Scams Threat actors continue to target pension plans and use social engineering tactics to initiate contact and appear legitimate. They may contact their targets by email, phone, text message, social media, or online advertisements and falsely claim to offer a “free” review of their pension plan savings [...]

Google Android OS Vulnerability Warning

By |2024-08-07T16:39:18-04:00August 7th, 2024|

NJCCIC ADVISORY: August 7, 2024 Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow [...]

Global IT Outage Presents Social Engineering Threat

By |2024-07-25T14:35:21-04:00July 25th, 2024|

Global IT Outage Presents Social Engineering Threat Published in the 7/25/24 NJCCIC Bulletin In the early morning of Friday, July 19, a Windows update pushed by CrowdStrike to its customers contained a defect that caused widespread global IT outages. Cyber threat actors attempt to capitalize on this event in social engineering campaigns. These cyber threat [...]

Patches for Microsoft Products

By |2024-05-21T14:14:38-04:00May 21st, 2024|

NJCCIC Advisory: May 2024 Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with [...]

Identity Management Day – April 9

By |2024-11-11T18:18:22-05:00April 5th, 2024|

Established in 2021 in partnership with the National Cybersecurity Alliance, Identity Management Day is held on the second Tuesday of April (April 9, 2024).  This is a day of awareness to educate business leaders, IT decision makers, and the general public about the importance of identity management.  A free virtual conference is also available - [...]

ALERT: Vulnerabilities in Apple Products

By |2024-03-06T13:21:10-05:00March 6th, 2024|

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation.  Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights [...]

Go to Top