fbipressreleasebanner

September 15, 2016

Alert Number

I-091516-PSA

Questions regarding this PSA should be directed to your local FBI Field Office.

Local Field Office Locations: www.fbi.gov/contact-us/field

Ransomware Victims Urged to Report Infections to Federal Law Enforcement

The FBI urges victims to report ransomware incidents to federal law enforcement to help us gain a more comprehensive view of the current threat and its impact on U.S. victims.

What Is Ransomware?

Ransomware is a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid. Ransomware is typically installed when a user clicks on a malicious link, opens a file in an e-mail that installs the malware, or through drive-by downloads (which does not require user-initiation) from a compromised Web site.

Continue reading

Fighting iOS Calendar Spam

Tech Tip

By J. D. BIERSDORFER NOV. 25, 2016

Q. I have been getting spam invitations to my iOS calendar recently. They come from Chinese accounts and their subjects are for super-discounted Ray-Bans and the like. Is there any solution to this?

A. Many iCloud users have recently reported an influx of spam in the form of iOS calendar events and iCloud Photo Sharing invitations. While the delivery mechanism is different, the calendar and photo-sharing invitations traffic in the same old suspect offers for cheap goods as the junk mail and text messages that came before. Unlike those older forms of spam, which can be filtered, blocked or deleted, invitation spam usually offers Accept, Decline (or Maybe) as your options — all of which notify the spammer that your account is live and ready for more unsolicited offers.

Continue reading Fighting iOS Calendar Spam

iPhones vulnerable to yet another lockscreen bypass

microphone
Image courtesy of Naked Security

18 Nov 2016 7 Apple, iOS

iPhone aficionados at iDeviceHelp and EverythingApplePro have discovered yet another way for someone who has physical access to your phone to access your messages, photos, and contacts, even if the phone is locked with both a passcode and properly configured TouchID.

EverythingApplePro and iDeviceHelp published full proof-of-concept videos of this bypass on YouTube, in case you’d like to follow along at home.

The demonstration shows the bypass on an iPhone 7 using the iOS 10.2 beta 3, as well as an iPhone 4 using iOS 8 and even on an iPad, showing that this flaw affects any iDevice that can receive Facetime or phone calls.

Continue reading iPhones vulnerable to yet another lockscreen bypass

How to back up your iPhone, iPad, and iPod touch

If you back up your iPhone, iPad, or iPod touch, you’ll have a copy of your information to use in case your device is ever replaced, lost, or damaged.

Choose a backup method

Before you get started, learn the difference between making backups with iCloud and iTunes and choose the method that’s best for you. In case you ever need an alternative backup, you can make one in iCloud and another in iTunes.

Continue reading How to back up your iPhone, iPad, and iPod touch

The best messaging apps with end-to-end encryption

These apps can help keep prying eyes away from your conversations

encryption
Credit: Yuri Samoilov 

By Derek Walter

Greenbot | Nov 10, 2016 12:27 PM PT

There is a growing desire to keep one’s messages private. Some users are concerned about hackers, or worry about foreign or domestic government surveillance, but most people just agree with the general principle that what you say in your chat conversations ought to stay between you and the people you chat with.

It’s not a pleasant idea to think that your messages could be archived for perpetuity on a large company’s server or analyzed by some algorithm. The quest for privacy has birthed a whole generation of apps that promise to give you exactly that. Services like Telegram and Signal have turned the phrase “end-to-end encryption” into a popular discussion. We’re here to help you figure out what this is all about and which apps to try.

A little background on encryption

Continue reading The best messaging apps with end-to-end encryption

How to Sign-in to Panopto

Panopto is used to capture Audio, Video, and screen content for live events, lectures, and student assignments throughout the law school. We recently started using the University Single User Sign-in Process. Which sounds more complicated than it really is.

In this short How-to webinar I demonstrate just how easy it is to sign into Panopto. Be sure to contact the IT department (lawhelp@law.sc.edu) for scheduled recordings and user access.

How to record your lecture on the fly in under 5 minutes

Sometimes you don’t have the time to get a hold of IT to schedule your recordings. I completely understand. That’s why I want to show you how to start a recording in the classroom on the fly.

In this Quick How-to Webinar I will demonstrate to you how to use start and stop a recording in the classroom in under 5 minutes. 🙂

how-to-record-your-lecture-on-the-fly

Using the Timer in PollEverywhere

PollEverywhere has some features you may not know exist. The timer is a good example of a feature that could be really powerful in the classroom setting where students need to think fast in order to demonstrate their understanding of material.

In this Quick How-to Webinar I will demonstrate to you how to use the timer with various example questions.

Getting Started with iClicker: An Introduction

iClicker is a dynamic solution for engaging, assessing, and keeping students involved in any classroom material. The law school has a department set of 80 clickers available for you to use in your class.

In this Quick How-to Webinar I will demonstrate to you how to get started using iClickers, how to request to use the Law School’s department set, how to submit iClicker as a course material to the bookstore, and how to make sure your Polls are up and running in anonymous mode.

 

Click here for the i>Clicker Guide

Control the Animations of Open Ended Polls

Open Ended Polls can be a lot of fun to use with a live audience, but on occasion you may want to stop the animation to speak to a particular response or moderate responses that you are receiving.

In this Quick How-to Webinar I will demonstrate to you how to edit this animation feature if you would like or how to moderate responses to your polls in real time.