by Matt Logan | Mar 6, 2019 | Computer Security, Computer Operations
I received an interesting “phishing” e-mail today that at first glance appeared to be a notice from Wells Fargo. It only took a few seconds however to determine that it was not a legitimate email. If not already aware, so called “Phishing”...
by Matt Logan | Dec 17, 2018 | Computer Security, Computer Operations
What is a “Sextortion” Email Scam? “Sextortion” email scams are a form of “social engineering” designed to trick or entice a user into: clicking on a link, installing mal-ware, paying a ransom, or other behavior (that a victim would...
by Matt Logan | Nov 23, 2018 | Computer Security, Computer Operations
Our computers and mobile devices find resources on the Internet using a naming system we call DNS (Domain Name System). DNS converts the names we humans use to browse the web (ex. www.AVAREN.com) and converts them to the IP addresses our computers use to communicate...
by Matt Logan | Nov 19, 2018 | Computer Security, Computer Operations
Occasionally it can become necessary to transmit confidential information (such as account user-names and passwords) to co-workers or family members via electronic means. Because of concerns related to account hacking and ghosting (ghosting being where a hacker...
by Matt Logan | Nov 9, 2018 | Scam Alerts, Computer Security
Email scammers never seem to rest when looking for ways to bypass business spam filters. Sometimes their intent is to encrypt files while holding them for ransom ($$), other times their intent is to simply wreak havoc. Either way, computer users today must be adept at...