Beware Tricky Virus Links in Emails
No matter how great the spam filter a business employs, the occasional malicious email will still make it through to end users. A decent analogy might be that of a battle of tug-o-war between good and bad actors. The bad actors develop a new kind of spam intended to...
Another Fake Invoice Scam
The invoice below was sent in by a client for verification. Although it looks very much like like an invoice; if one reads the fine print it becomes clear that it is actually a solicitation for a website listing on a relatively obscure internet directory. The internet...
Which Type of Microsoft Office Should a Business Buy Today?
Which Type of Microsoft Office Should a Business Buy Today? Last update - 9/7/18 Office Home & Business Retail ($229/Approx) Office 365 "Business Plus" Subscription ($9.95/Mo)* Email Registration Requirement Changes to the e-mail...
4 Types of Social Engineering Used Every Day
4 Types of Social Engineering Used Every Day Article by Calyptix Security. August 28th, 2017 Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when...
Online Profile Scams
I was recently contacted (via an online platform) by a person I had known for close to 30 years. He was telling me about a HUD program where citizens could apply to receive cash (up to 150,000), and were not obligated to pay it back. I was puzzled as on the one hand...
Should You Pay Invoices from IDNS?
IDNS is a supposed technology company that sends businesses unsolicited invoices (they refer to them as only as notifications although they look like an invoice) for domain registrations and other services. The invoiced services (example shown below) are...
Selecting and Managing Passwords
What makes a password unsafe? Is the password a dictionary word (ex. monkey, superman, dragon, password, etc.)? Is the password something common (ex. abc123, 123456, iloveyou, etc.)? Typically employing automated scripts, hackers frequently use dictionary and...
Beware of Fake Microsoft Tech Support Scams
I received a call today from a call center in India. I know it was a call center because I could hear countless other people in the background. The woman on the other end of the phone claimed to be a representative from Microsoft. She claimed that there was a...
Have Your Username/Password Combos Been Compromised in a Data Breech?
By now most everyone has heard about one or more of the data breeches that have occurred at Adobe, Equifax, LinkedIn, Stratfor, and others. In many cases, after a company has it's data compromised, the data often makes it onto the 'dark' web where it is bought, sold,...
Fake RFQ/Purchase Order Scams Becoming More Sophisticated
For many years I have received fake RFQs and purchase orders through e-mail. Usually they are obvious fakes written in poor English and with few embellishments. Opening my mail this morning however I found one that is more sophisticated (shown below). In this example...