<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>ASIS NJ</title>
	<atom:link href="https://asisnj.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://asisnj.com</link>
	<description>Making IT Work for Your Business</description>
	<lastBuildDate>Fri, 27 Mar 2026 18:42:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://asisnj.com/wp-content/uploads/2021/03/cropped-ASIS-Favicon-32x32.png</url>
	<title>ASIS NJ</title>
	<link>https://asisnj.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI Glossary Part 1</title>
		<link>https://asisnj.com/blog/ai-glossary-part-1/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 18:41:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3651</guid>

					<description><![CDATA[<p>It seems like AI is on everyone’s minds today.  As you read articles about AI developments, you may encounter a range of complex terms used to discuss it. This post will begin an “AI Glossary” series. In it, we’ll define key AI terms and explain the cybersecurity considerations related to them. Agent: A standard AI [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/ai-glossary-part-1/">AI Glossary Part 1</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3651" class="elementor elementor-3651" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-2054bd4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2054bd4" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38ff6e2" data-id="38ff6e2" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-3a8e78c elementor-widget elementor-widget-text-editor" data-id="3a8e78c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><a href="https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity.jpg"><img fetchpriority="high" decoding="async" class="alignright wp-image-3653" src="https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-1024x683.jpg" border="0" alt="– AI Glossary Part 1" width="500" height="334" title="AI Glossary Part 1 – ASIS NJ" srcset="https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-1024x683.jpg 1024w, https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-300x200.jpg 300w, https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-768x512.jpg 768w, https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-1536x1025.jpg 1536w, https://asisnj.com/wp-content/uploads/2026/03/iStock_cybersecurity-2048x1367.jpg 2048w" sizes="(max-width: 500px) 100vw, 500px" /></a></p><p>It seems like AI is on everyone’s minds today.  As you read articles about AI developments, you may encounter a range of complex terms used to discuss it.</p><p>This post will begin an “AI Glossary” series. In it, we’ll define key AI terms and explain the cybersecurity considerations related to them.</p><p><strong>Agent:</strong> A standard AI chatbot just talks to you, but an agent can actually do things. A chatbot is like a consultant who gives you advice, whereas an agent is like an employee who takes that advice and files the paperwork or sends the email.</p><p><strong>Algorithm:</strong> This is a set of rules a computer follows to solve a problem. Think of it like a recipe for a cake. If the computer follows the steps exactly, it gets the desired result every time.</p><p><strong>API (Application Programming Interface): </strong>This is the bridge that lets two different software programs talk to each other. Think of it like a waiter in a restaurant. The kitchen (the software) and the customer (you) do not talk directly; the waiter (API) takes the order and brings the food back.</p><p><strong><u>Cybersecurity considerations:</u></strong><br />Some of the biggest risks associated with the use of AI occur when AI is in Agent mode. This is because the AI is enabled to undertake administrative actions such as making purchases and downloading files.  This leads to risks such as the AI mistakenly downloading malicious files or making other decisions that compromise data.</p><p>AI should be used in Agent mode only with caution.  If you do decide to use it, ensure that you have implemented the following:<br />-Limited permissions: Don’t allow it to access private data, bank account info, etc.  <br />-Approval required to complete sensitive actions like purchases</p><p>If you need assistance with implementing these AI permissions, contact ASIS.  </p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/ai-glossary-part-1/">AI Glossary Part 1</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>“Unsolvable” AI Browser Prompt Attacks</title>
		<link>https://asisnj.com/blog/unsolvable-ai-browser-prompt-attacks/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 22:06:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3640</guid>

					<description><![CDATA[<p>A new scam called prompt injection targets AI browsers while remaining invisible to humans. For example, a malicious website might have text written in a white font on a white background.  While the user doesn’t see the text, an AI browser reviews all the text on the page, and responds accordingly.  The text may prompt [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/unsolvable-ai-browser-prompt-attacks/">“Unsolvable” AI Browser Prompt Attacks</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3640" class="elementor elementor-3640" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-b405613 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b405613" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f21547" data-id="3f21547" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-ab76688 elementor-widget elementor-widget-text-editor" data-id="ab76688" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>A new scam called prompt injection targets AI browsers while remaining invisible to humans.</p><p>For example, a malicious website might have text written in a white font on a white background.  While the user doesn’t see the text, an AI browser reviews <em>all</em> the text on the page, and responds accordingly.  The text may prompt the AI to take action that compromises the user’s data. </p><p>Open AI has recently admitted that prompt injection scams do not have a quick fix, but exploit vulnerabilities central to AI’s processes. </p><p>The risk increases when AI browsers are used in “agent mode,” which allows the browser to take actions such as clicking links and reading emails.  According to cyber expert Kurt Knusson, “The more an AI can do on your behalf, the more damage it can cause when something goes wrong.”</p><p>This vulnerability applies to all AI browsers, not just those from Open AI. When allowed free rein to operate on their own, AI browsers have made purchases from fake sites and followed harmful hidden instructions. </p><p>The most direct way to remedy this is to not use AI browsers.  But if you do, be sure to require confirmation for any actions.  Don’t allow the AI to operate on its own and mistakenly allow malware onto your computer. </p><p>In addition, beware of AI summaries.  When the AI scans documents or emails, it may also absorb embedded malicious information.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/unsolvable-ai-browser-prompt-attacks/">“Unsolvable” AI Browser Prompt Attacks</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don’t Let Scams Wreck your Holiday</title>
		<link>https://asisnj.com/blog/dont-let-scams-wreck-your-holiday/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 19:16:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3628</guid>

					<description><![CDATA[<p>The holiday season should be a time for family, friends, and festivities.  But be aware that cybercriminals know that people are busy and distracted during this time of year and seek to take advantage of that.  Here are just a few examples of holiday-related scams to avoid. 1. Gift Card ScamsThis type of scam has [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/dont-let-scams-wreck-your-holiday/">Don’t Let Scams Wreck your Holiday</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3628" class="elementor elementor-3628" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-6307e86 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6307e86" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cff57eb" data-id="cff57eb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9bee3b0 elementor-widget elementor-widget-text-editor" data-id="9bee3b0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><a href="https://asisnj.com/wp-content/uploads/2025/12/giftcard_image.png"><img decoding="async" class="alignright wp-image-3634 size-medium" src="https://asisnj.com/wp-content/uploads/2025/12/giftcard_image-e1765999305813-300x163.png" border="0" alt="– Don’t Let Scams Wreck your Holiday" width="300" height="163" data-wp-editing="1" title="Don’t Let Scams Wreck your Holiday – ASIS NJ" srcset="https://asisnj.com/wp-content/uploads/2025/12/giftcard_image-e1765999305813-300x163.png 300w, https://asisnj.com/wp-content/uploads/2025/12/giftcard_image-e1765999305813.png 747w" sizes="(max-width: 300px) 100vw, 300px" /></a>The holiday season should be a time for family, friends, and festivities.  But be aware that cybercriminals know that people are busy and distracted during this time of year and seek to take advantage of that.  Here are just a few examples of holiday-related scams to avoid.</p><p><strong>1. Gift Card Scams<br /></strong>This type of scam has become more prevalent in general, but it is especially an issue around the holidays. Since gift cards are difficult to trace, they have become a way for criminals to cover their tracks.</p><p><u>How to avoid this: <br /></u>-No seller should be asking for payment in gift cards.  If this occurs, end the transaction. <br />-If you purchase a gift card online, make sure the site is legitimate. </p><p><strong>2. Package Delivery Scams<br /></strong>During the holidays, many people are expecting package deliveries, so a message about a package delivery might not seem out of place.  But if you receive a text similar to the following, think again.</p><p><em>“Your package is stuck at the sorting center, pls update your address: www.upst.top.us”</em></p><p>A few clues indicate that this message is not legitimate.  First, the link is not to ups.com – it’s to “uspst.top.” This is another cybercriminal strategy that is becoming increasingly common: “typosquatting,” which involves hackers claiming domains with names almost the same as the company they are posing as.  This trick relies on users not noticing the typo and thinking the link goes to the actual site.</p><p>In addition, the text uses abbreviations “pls” which official company communications would not contain.</p><p><u>How to avoid this:<br /></u>If you receive an email or text about a package and are not sure whether it is fake, do NOT click on the link.  Instead, go back to the original confirmation email you received when you placed the order.  You can use the order number to access the real package tracking information. </p><p><strong>3. Fake Online Stores<br /></strong>Hackers can create online stores designed to mimic the branding and design of the actual store, yet whose sole purpose is to steal your information. The site may also send you emails with malicious links. </p><p><u>How to avoid this:<br /></u>-Check that the site domain name is an exact match and that there are no typos. If there are, the site may be employing the “typosquatting” scam technique. </p><p>-Notice whether there are spelling and grammar errors on a site, or informal “texting speech” that official company communications would not contain.</p><p>-If the website asks for highly sensitive personal information not necessary for a purchase, such as your social security number, that is a red flag that the site is malicious.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/dont-let-scams-wreck-your-holiday/">Don’t Let Scams Wreck your Holiday</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Mimic&#8221; AI Apps</title>
		<link>https://asisnj.com/blog/mimic-ai-apps/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 19:10:49 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3597</guid>

					<description><![CDATA[<p>With the AI revolution, AI is increasingly being incorporated into people’s daily lives.  Along with this, AI apps such as Chat GPT are becoming commonplace.  However, users should be aware that there are fake apps that imitate open AI, while acting solely to steal data.  These “mimic” apps often include the exact same branding information [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/mimic-ai-apps/">&#8220;Mimic&#8221; AI Apps</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3597" class="elementor elementor-3597" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-9044e19 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9044e19" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59faed0" data-id="59faed0" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2815f18 elementor-widget elementor-widget-text-editor" data-id="2815f18" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>With the AI revolution, AI is increasingly being incorporated into people’s daily lives.  Along with this, AI apps such as Chat GPT are becoming commonplace.  However, users should be aware that there are fake apps that imitate open AI, while acting solely to steal data. </p><p>These “mimic” apps often include the exact same branding information as real Open AI apps.  One example is “DALL-E 3 AI Image Generator.” It claims to be an AI image generator and shows a preview of an image being generated.  Yet once downloaded, the app does not generate images; it just remains on a loading screen.  According to Appknox, a platform for mobile application security, the app only performs advertising and data analytics functions.  It uses image generation as a cover for its real operations.   </p><p>Other “mimic” apps can be even more sinister.  An app known as “WhatsApp Plus,” posing as an upgraded version of WhatsApp, actually contains advanced malware capable of stealing credentials and conducting surveillance.  Its malware continues running even after the app is closed. </p><p>“Mimic” apps can harm both individuals and businesses.  Here are some ways to defend your device against “mimic” apps:</p><ol><li><strong>Download only from official app stores</strong><br />It is best to only download from your official app store, whether Apple Apps or Google Play. While it is still possible for malicious apps to appear in official app stores, these contain security checks in official stores that other vendors do not require.  Moreover, if official stores receive reports of a malicious app, they are prompt in taking that app down. </li><li><strong>Verify the developer before you download an app</strong><br />The developer for ChatGPT apps is OpenAI, so be sure to check that the name of the developer on an app you download is what it should be. Hackers will often use similar-sounding names, so even if there’s a slight difference, be sure to check again.  </li><li><strong>Update your device regularly</strong><br />Malicious apps can exploit vulnerabilities in other apps and in your device, to be sure to keep both your device and apps updated.</li><li><strong>Use antivirus software</strong><br />Use a high-quality antivirus software such as Sentinel One, which uses AI in a proactive manner to anticipate and prevent attacks. If you do not already have Sentinel One, please contact ASIS. </li></ol>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/mimic-ai-apps/">&#8220;Mimic&#8221; AI Apps</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beware ClickFix Attacks</title>
		<link>https://asisnj.com/blog/beware-clickfix-attacks/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 06 Nov 2025 17:38:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3584</guid>

					<description><![CDATA[<p>If you are browsing a website when an alert pops up telling you to take immediate action, think twice before you click! A new type of cyberattack, called “ClickFix,” has recently been identified.  The name comes from the fact that these attacks aim to trick users into taking action – such as clicking – under [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/beware-clickfix-attacks/">Beware ClickFix Attacks</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3584" class="elementor elementor-3584" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-61178df elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="61178df" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5e99c6" data-id="d5e99c6" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-576ef7a elementor-widget elementor-widget-text-editor" data-id="576ef7a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><a href="https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic.jpg"><img decoding="async" class="alignright size-medium wp-image-3587" src="https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic-300x200.jpg" border="0" alt="– Beware ClickFix Attacks" width="300" height="200" title="Beware ClickFix Attacks – ASIS NJ" srcset="https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic-300x200.jpg 300w, https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic-1024x682.jpg 1024w, https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic-768x512.jpg 768w, https://asisnj.com/wp-content/uploads/2025/11/cyberattack_warningpic.jpg 1280w" sizes="(max-width: 300px) 100vw, 300px" /></a>If you are browsing a website when an alert pops up telling you to take immediate action, think twice before you click!</p><p>A new type of cyberattack, called “ClickFix,” has recently been identified.  The name comes from the fact that these attacks aim to trick users into taking action – such as clicking – under the pretext of “fixing” a system issue.  They appear as pop-ups or false alerts claiming the user needs to complete a CAPTCHA challenge, enter credentials, or copy and paste code in order to resolve the problem. However, the action actually downloads malware onto your computer.</p><p>ClickFix attacks often start off as malicious advertisements.  While they are unable to harm the device directly in that form, once the user interacts with the ad, the malware is transferred onto the device.  Because the user’s own actions compromise the device, these attacks can often bypass typical security systems. </p><p><u>What to do if you encounter a ClickFix attack: </u></p><p>Do not follow any prompts or instructions the pop-ups mention.  If you are concerned that there might be a legitimate system issue, do not click on the pop-up, but contact ASIS directly.</p><p>If you find yourself directed to Windows Run or PowerShell and told to paste in code, never do so.  While those two programs are legitimate, running the pasted code will activate the virus on your computer.</p><p>ClickFix attacks can also target phones.  If you see a pop-up appear, perhaps claiming that you need to update an app or verify your identity, don’t click on it or follow any code-related instructions.</p><p><u>What to do if you think your device has been infected by a ClickFix attack:</u> <br />1. Disconnect from the internet<br />2. Contact ASIS immediately</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/beware-clickfix-attacks/">Beware ClickFix Attacks</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Browsers Unable to Detect Scams</title>
		<link>https://asisnj.com/blog/ai-browsers-unable-to-detect-scams/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 17:28:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3573</guid>

					<description><![CDATA[<p>The “AI Revolution” has promised faster and more powerful technological tools.&#160; AI has already been incorporated into many internet browsers, such as Microsoft Copilot in Edge.&#160; Yet despite its advanced capabilities, AI can be fooled by scams – even ones that would be very obvious to humans. During a study run by Guardio Labs, an [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/ai-browsers-unable-to-detect-scams/">AI Browsers Unable to Detect Scams</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3573" class="elementor elementor-3573" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-660246ec elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="660246ec" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4edf82d8" data-id="4edf82d8" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2022288 elementor-widget elementor-widget-text-editor" data-id="2022288" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p></p>
<p>The “AI Revolution” has promised faster and more powerful technological tools.&nbsp; AI has already been incorporated into many internet browsers, such as Microsoft Copilot in Edge.&nbsp;</p>
<p></p>
<p>Yet despite its advanced capabilities, AI can be fooled by scams – even ones that would be very obvious to humans.</p>
<p></p>
<p>During a study run by Guardio Labs, an AI browser was instructed to purchase an Apple Watch.&nbsp; It found a fake Walmart site and filled in all the user’s personal information in seconds.&nbsp; The scammer took the money and data and the user never received the watch.&nbsp; This combination of speed with a lack of human oversight creates ideal circumstances for cybercriminals.&nbsp;</p>
<p></p>
<p>In another instance, when AI was asked to process a fake email, it did so unaware of the scam.&nbsp; According to cyber journalist Kurt Knutsson, “The browser clicked the malicious link with no verification and even helped the user fill out login credentials on the phishing page. By removing human intuition from the loop, the AI created a perfect trust chain that scammers could exploit.”</p>
<p></p>
<p>Here’s how to not fall prey to AI browser scams:</p>
<p><strong>1) Don’t leave final approval to AI</strong><br>By double-checking actions like downloads and purchases, you ensure that an AI browser doesn’t automatically approve a suspicious transaction.</p>
<p></p>
<p><strong>2) Set up an Antivirus Defense &nbsp;</strong><br>Install a strong Antivirus software, such as Sentinel One, a next-generation antivirus software that proactively anticipates threats and immediately responds to new threats.&nbsp;&nbsp;</p>
<p></p>
<p><strong>3) Review your accounts often</strong><br>Review your bank account and credit card statements regularly so that if fraudulent transactions appear, you can address them immediately.&nbsp;</p>
<p></p>
<p>To set up any of these measures, contact ASIS at 732-549-6030.&nbsp;</p>
<p></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/ai-browsers-unable-to-detect-scams/">AI Browsers Unable to Detect Scams</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New DefensX Finally Stops “Call 800#” Scam</title>
		<link>https://asisnj.com/blog/new-defensx-finally-stops-call-800-scam/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 20:25:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3541</guid>

					<description><![CDATA[<p>Many users have had the experience of navigating to a website, hearing a loud beeping sound, and seeing this message pop up: &#8220;Malware has been recognized on your device: Call Microsoft Support at 1-800&#8230;&#8221; This is not a real Microsoft Support message.  But while the message itself isn&#8217;t a virus, the beeping sound and flashing [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/new-defensx-finally-stops-call-800-scam/">New DefensX Finally Stops “Call 800#” Scam</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3541" class="elementor elementor-3541" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-4c3d74cb elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4c3d74cb" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ab78290" data-id="7ab78290" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-191624a8 elementor-widget elementor-widget-text-editor" data-id="191624a8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Many users have had the experience of navigating to a website, hearing a loud beeping sound, and seeing this message pop up: &#8220;Malware has been recognized on your device: Call Microsoft Support at 1-800&#8230;&#8221;</p>
<p>This is not a real Microsoft Support message.  But while the message itself isn&#8217;t a virus, the beeping sound and flashing warning are alarming enough that many people call the 800 number, unintentionally contacting the criminals.  Under the guise of fixing the issue, the hackers are then able to gain access to the computer.  <a href="https://asisnj.com/wp-content/uploads/2025/09/DefensX_flyer.jpg"><img loading="lazy" decoding="async" class="alignright wp-image-3558 size-full" src="https://asisnj.com/wp-content/uploads/2025/09/DefensX_flyer-e1758834805164.jpg" border="0" alt="– New DefensX Finally Stops “Call 800#” Scam" width="640" height="833" title="New DefensX Finally Stops “Call 800#” Scam – ASIS NJ"></a></p>
<p>A new product, DefensX, finally stops this scam.  It blocks pop-ups like these, also known as Mal-Advertisements.  DefenseX deploys in under 2 minutes, requires no user training, and improves cyber resiliency by over 30% in just 6 months.</p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p><strong>DefensX Key Features:</strong></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>✅ Web Protection<br />✅ Evaluates password strength &amp; Detects breached passwords<br />✅ AI-Powered Data Loss &amp; Identity Protection<br />✅ Human Risk Reports &amp; Behavior Insights<br />✅ Credential Protection<br />✅ Zero Workflow Disruption<br />✅ No Extensions or Training Required</p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p><strong>Proven Business Impact</strong></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>✅ 30% improvement in cyber resiliency in just 6 months<br />✅ 40% better password hygiene across user base<br />✅ 20% drop in IT overhead<br />✅ Fully deployable in under 2 minutes</p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>DefensX turns your browser into a fully protected, intelligent digital workspace. Without changing user behavior, it defends against phishing, credential theft, data loss, and more.  To get this comprehensive browser protection for your devices, contact ASIS at 732-549-6030 to set up DefensX.</p>
<p><!-- /wp:paragraph --></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/new-defensx-finally-stops-call-800-scam/">New DefensX Finally Stops “Call 800#” Scam</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero-Click Attacks on the Rise</title>
		<link>https://asisnj.com/blog/zero-click-attacks-on-the-rise/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 19:27:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3463</guid>

					<description><![CDATA[<p>Until now, most cyberattacks started when a user clicked on a bad link or downloaded a corrupted file.&#160; The click or download permitted the malware to enter the device.&#160; But now, a new type of cyberattack is on the rise: one that doesn’t require any clicks at all. “Zero-click attacks” are defined as cyberattacks requiring [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/zero-click-attacks-on-the-rise/">Zero-Click Attacks on the Rise</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[
<p>Until now, most cyberattacks started when a user clicked on a bad link or downloaded a corrupted file.&nbsp; The click or download permitted the malware to enter the device.&nbsp; But now, a new type of cyberattack is on the rise: one that doesn’t require any clicks at all.</p>



<figure class="wp-block-image alignright size-full"><a href="https://asisnj.com/wp-content/uploads/2025/06/hacker-8003393_1280-e1750731471177.jpg"><img loading="lazy" decoding="async" width="500" height="280" src="https://asisnj.com/wp-content/uploads/2025/06/hacker-8003393_1280-e1750731471177.jpg" alt="– Zero-Click Attacks on the Rise" class="wp-image-3464" title="Zero-Click Attacks on the Rise – ASIS NJ"></a></figure>



<p>“Zero-click attacks” are defined as cyberattacks requiring no user action. Instead, they exploit vulnerabilities in apps and operating systems like Windows, Mac, Chrome, iOS, and Android. These systems release “patches” when they realize a loophole in their code exists.&nbsp; But if cybercriminals find the loophole first, or if they find an unfixed loophole on devices that have not installed the patch, they can get into a device without users knowing.&nbsp;</p>



<p>These attacks often target messaging apps, which receive significant amounts of data from many different sources, including unknown sources.&nbsp; Hackers send a message in which bad code is embedded in something that seems harmless to the operating system, such as a text or PDF.&nbsp; When the message is received, the code activates and infects the device, allowing the hacker to see all messages on that app.&nbsp; All without the user even opening the message.&nbsp;</p>



<p>These attacks are highly sophisticated.&nbsp; Even if the message is deleted, the device is still infected. They hardly leave any traces, making them extremely difficult to detect.</p>



<p>Despite their complexity, there are steps you can take to prevent a zero-click attack:</p>



<ol class="wp-block-list">
<li><strong>Regularly update your computers and apps</strong><br>If you install “patches” for operating systems in a timely manner, you’re protecting your device from system flaws that can otherwise be an easy entry for hackers.</li>



<li><strong>Get rid of any apps you aren’t using</strong><br>Discarding unused apps means fewer chances for criminals to find a vulnerability.</li>



<li><strong>Use multi-factor authentication</strong></li>



<li><strong>Block pop-ups</strong></li>



<li><strong>Periodically restart your phone</strong><br>On iPhones, this has been shown to stop zero-click attack software Pegasus from working, or at least temporarily disrupt it. <br><br>Fortunately, right now, these attacks are expensive to implement, with one recorded at 2.5 million according to CSO online.  But as hackers and AI continue to advance, it is important to be aware that cyberattacks can be carried out in this manner, and to take steps to guard against it.</li>
</ol>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/zero-click-attacks-on-the-rise/">Zero-Click Attacks on the Rise</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Moves from Passwordless Option towards Mandate</title>
		<link>https://asisnj.com/blog/microsoft-moves-from-passwordless-option-towards-mandate/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 29 May 2025 18:47:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3446</guid>

					<description><![CDATA[<p>Microsoft recently announced that starting this month, all new Microsoft accounts will be passwordless by default.  Instead, accounts will use a passkey, which involves a fingerprint, face ID, or PIN. Although they are not yet forcing customers to stop using passwords, Microsoft’s goal is to “eventually remove password support altogether,” as stated in their May [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/microsoft-moves-from-passwordless-option-towards-mandate/">Microsoft Moves from Passwordless Option towards Mandate</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="3446" class="elementor elementor-3446" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-7e02f21c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7e02f21c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57c00731" data-id="57c00731" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-36ef9c7f elementor-widget elementor-widget-text-editor" data-id="36ef9c7f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Microsoft recently announced that starting this month, all new Microsoft accounts will be passwordless by default. </p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Instead, accounts will use a passkey, which involves a fingerprint, face ID, or PIN.</p>
<p><a href="https://asisnj.com/wp-content/uploads/2025/05/Security_biometric_700px.png"><img loading="lazy" decoding="async" class="alignright size-full wp-image-3457" src="https://asisnj.com/wp-content/uploads/2025/05/Security_biometric_700px.png" border="0" alt="– Microsoft Moves from Passwordless Option towards Mandate" width="700" height="429" title="Microsoft Moves from Passwordless Option towards Mandate – ASIS NJ" srcset="https://asisnj.com/wp-content/uploads/2025/05/Security_biometric_700px.png 700w, https://asisnj.com/wp-content/uploads/2025/05/Security_biometric_700px-300x184.png 300w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<p>Although they are not yet forcing customers to stop using passwords, Microsoft’s goal is to “eventually remove password support altogether,” as stated in their <a href="https://www.microsoft.com/en-us/security/blog/2025/05/01/pushing-passkeys-forward-microsofts-latest-updates-for-simpler-safer-sign-ins/" target="_blank" rel="noopener">May 1<sup>st</sup> post</a>.    </p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>There are advantages and risks in switching to passkeys.</p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p><br /><strong>Advantages of Passkey Use</strong></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Some are excited to move away from passwords, which pose a challenge to remember or store, and, if stored in a browser, can be easily stolen by cybercriminals.  Microsoft cited concerns over passwords&#8217; vulnerability to cyberattacks in their announcement of the passkey switch.  Last year, there were “a staggering 7,000 password attacks per second,” which was “more than double the rate from 2023.”  Thus, their shift to passkeys is not intended to decrease security, but to use a different method that may not be as vulnerable to attack. </p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Another advantage of passkeys is swifter and more successful logins.  Microsoft points out that users experienced a much higher success rate of logging into their accounts on the first try with a passkey as opposed to a password, and in a shorter period of time. <br /><br /><strong>Risks of Passkey Use</strong></p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Others, however, have privacy concerns in the use of passkeys.  The foremost concern is the use and storage of sensitive biometric information.  As tech companies have often sold users’ data without informing them, entrusting these companies with even more personal data may not go well given their past conduct.</p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Next, although passkeys are less vulnerable to being stolen by cybercriminals, if biometric passkeys are compromised, cybercriminals gain a permanent means of entry into individuals’ information.  Unlike a password, which can be changed, a user cannot change his or her fingerprints or face.  This exposes the user to far longer-term threats than would occur with a breached password that could be reset. </p>
<p><!-- /wp:paragraph --><!-- wp:paragraph --></p>
<p>Also, passkeys are tied to specific devices.  If users change phones without the information being backed up, they could be locked out of their accounts.<br />&#8212;<br />Microsoft’s announcement represents a major shift in the online world.  In fact, the company is trying to work towards a future in which <em>all </em>websites can be logged into using biometrics.  While the specifics of how this will be accomplished are still unclear, their announcement does draw attention to the ever-shifting cybersecurity threats, and tech companies&#8217; search for the best means to combat them. </p>
<p><!-- /wp:paragraph --></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/microsoft-moves-from-passwordless-option-towards-mandate/">Microsoft Moves from Passwordless Option towards Mandate</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attack Targets All 1.8 Billion Gmail Accounts</title>
		<link>https://asisnj.com/blog/sophisticated-attack-targets-all-1-8-billion-gmail-accounts/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 May 2025 18:10:47 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://asisnj.com/?p=3436</guid>

					<description><![CDATA[<p>Recently, Google confirmed an advanced attack targeting all 1.8 billion of its Gmail users.&#160; The attack involved an email from accounts.google.com claiming that Google had been issued a subpoena for the user’s account content, and the user must give up account access to comply. The scam was first identified by cryptocurrency developer Nick Johnson, who [&#8230;]</p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/sophisticated-attack-targets-all-1-8-billion-gmail-accounts/">Attack Targets All 1.8 Billion Gmail Accounts</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recently, Google confirmed an advanced attack targeting all 1.8 billion of its Gmail users.&nbsp;</p>



<p>The attack involved an email from accounts.google.com claiming that Google had been issued a subpoena for the user’s account content, and the user must give up account access to comply.</p>



<p>The scam was first identified by cryptocurrency developer Nick Johnson, who received an email that appeared to come directly from Google.&nbsp; Johnson described the scam as “extremely sophisticated.” The false link led him to a “very convincing &#8216;support portal’ page,” complete with “exact duplicates” of real Google documents.&nbsp; From there, he was asked to enter his account information; if he had, he would have provided the cybercriminals with control over his account. &nbsp;&nbsp;</p>



<p>Johnson posted the following screenshot of the fraudulent email:</p>



<figure class="wp-block-image size-full"><a href="https://asisnj.com/wp-content/uploads/2025/05/image.jpeg"><img loading="lazy" decoding="async" width="519" height="687" src="https://asisnj.com/wp-content/uploads/2025/05/image.jpeg" alt="– Attack Targets All 1.8 Billion Gmail Accounts" class="wp-image-3437" title="Attack Targets All 1.8 Billion Gmail Accounts – ASIS NJ" srcset="https://asisnj.com/wp-content/uploads/2025/05/image.jpeg 519w, https://asisnj.com/wp-content/uploads/2025/05/image-227x300.jpeg 227w" sizes="(max-width: 519px) 100vw, 519px" /></a><figcaption class="wp-element-caption">Image Source: <a href="https://www.msn.com/en-us/news/technology/warning-to-all-1-8bn-gmail-users-over-password-hack-you-have-seven-days-to-act/ar-AA1EcCaG" target="_blank" data-type="link" data-id="https://www.msn.com/en-us/news/technology/warning-to-all-1-8bn-gmail-users-over-password-hack-you-have-seven-days-to-act/ar-AA1EcCaG" rel="noreferrer noopener">MSN article</a> </figcaption></figure>



<p>In his post on X, Johnson voiced his displeasure with Google’s handling of the scam: &#8220;given their refusal to fix it, we’re likely to see a lot more” of such attacks.&nbsp; &nbsp;</p>



<p>However, Google contends that they are addressing it. A Google spokesperson told DailyMail.com:&nbsp;&#8220;We&#8217;re aware of this class of targeted attack” and “have rolled out protections to shut down this avenue for abuse.”&nbsp; Specifically, they have shut down the means that allowed this email to be classified as a legitimate Google alert.&nbsp;</p>



<p>For now, Google recommends security measures such as two-factor authentication and reminds users that &#8220;Google will not ask for any of your account credentials&nbsp;— including your password, one-time passwords, confirm push notifications, etc.&nbsp;— and Google will not call you.”</p>



<p>But Google did note that even if you do happen to fall prey to such a convincing scam and are locked out of your account, you will still have seven days to act and regain control of it.&nbsp; &nbsp;</p>



<p></p>
<p>&lt;p&gt;The post <a rel="nofollow" href="https://asisnj.com/blog/sophisticated-attack-targets-all-1-8-billion-gmail-accounts/">Attack Targets All 1.8 Billion Gmail Accounts</a> first appeared on <a rel="nofollow" href="https://asisnj.com">ASIS NJ</a>.&lt;/p&gt;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 41/63 objects using Redis
Page Caching using Disk: Enhanced 

Served from: asisnj.com @ 2026-04-24 05:21:30 by W3 Total Cache
-->