Email scammers never seem to rest when looking for ways to bypass business spam filters. Sometimes their intent is to encrypt files while holding them for ransom ($$), other times their intent is to simply wreak havoc. Either way, computer users today must be adept at...
No matter how great the spam filter a business employs, the occasional malicious email will still make it through to end users. A decent analogy might be that of a battle of tug-o-war between good and bad actors. The bad actors develop a new kind of spam intended to...
The invoice below was sent in by a client for verification. Although it looks very much like like an invoice; if one reads the fine print it becomes clear that it is actually a solicitation for a website listing on a relatively obscure internet directory. The internet...
4 Types of Social Engineering Used Every Day Article by Calyptix Security. August 28th, 2017 Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when...
I was recently contacted (via an online platform) by a person I had known for close to 30 years. He was telling me about a HUD program where citizens could apply to receive cash (up to 150,000), and were not obligated to pay it back. I was puzzled as on the one hand...
IDNS is a supposed technology company that sends businesses unsolicited invoices (they refer to them as only as notifications although they look like an invoice) for domain registrations and other services. The invoiced services (example shown below) are...