by Matt Logan | Oct 15, 2019 | Computer Security, Computer Operations
ARTICLE BY CALYPTIX SECURITYRansomware attacks used to have a broad scale. Think of the massive WannaCry attack that infected 200,000 machines in 150 countries over a handful of days in 2017. Today, ransomware is much more targeted – and losses from the attacks have...
by Matt Logan | Jun 11, 2019 | Computer Security, Computer Operations
A interesting phony email made it past the spam filter today. This one portended to be a waiting voicemail message. As you can see in the image below, all one supposedly needs to do to listen to voicemail is to click on the included link. Of course this is not...
by Matt Logan | Mar 6, 2019 | Computer Security, Computer Operations
I received an interesting “phishing” e-mail today that at first glance appeared to be a notice from Wells Fargo. It only took a few seconds however to determine that it was not a legitimate email. If not already aware, so called “Phishing”...
by Matt Logan | Dec 17, 2018 | Computer Security, Computer Operations
What is a “Sextortion” Email Scam? “Sextortion” email scams are a form of “social engineering” designed to trick or entice a user into: clicking on a link, installing mal-ware, paying a ransom, or other behavior (that a victim would...
by Matt Logan | Nov 23, 2018 | Computer Security, Computer Operations
Our computers and mobile devices find resources on the Internet using a naming system we call DNS (Domain Name System). DNS converts the names we humans use to browse the web (ex. www.AVAREN.com) and converts them to the IP addresses our computers use to communicate...
by Matt Logan | Nov 19, 2018 | Computer Security, Computer Operations
Occasionally it can become necessary to transmit confidential information (such as account user-names and passwords) to co-workers or family members via electronic means. Because of concerns related to account hacking and ghosting (ghosting being where a hacker...