Social Engineering/Phishing
Latest Posts from Our Blog
Chances are, if you have used any popular social media platforms recently, you have been exposed to social media bots. By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human. However, most benign bots are…
Read MoreThe best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…
Read MoreWhat is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social engineering is that it’s much easier to trick a human than to…
Read MoreThere has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy. We’ve all heard of folks hit by identity theft. And, yes, sometimes that comes from hackers and the…
Read MoreWhat is Phishing? This varies from the specific type of phishing, but in general, phishing is the act of tricking and manipulating a user to reveal information to the attacker through various means. Tools of the trade can range from malware laced documents, to websites with URLs that are spelled similarly to popular services that…
Read MoreJust a few days after Quest Diagnostics reported that a data breach compromised the information of 11.9 million patients, LabCorp is reporting that it was breached as well, affecting 7.7 million additional records. What happened? An unauthorized user installed malicious code on the payment pages of the American Medical Collection Agency (AMCA), a 3rd party…
Read MoreThere have been multiple reports of users around the country receiving emails with their own passwords and an email trying to blackmail them for BitCoin using convincing social engineering. The attackers begin by sending their potential victims an email, claiming they have access to their computers and have been spying on them. To make it…
Read More- « Previous
- 1
- 2
Categories
- 5G & Mobile Networking (13)
- Backups & Business Continuity (11)
- Business (75)
- Cloud Backups (5)
- Cloud/Serverless Computing (4)
- Cybersecurity (80)
- Data Breaches/Leaks (12)
- Desktop Operating Systems (16)
- Desktop Software (20)
- DR/BCM Planning & Consulting (6)
- Email Software and Applications (6)
- Enterprise Resource Planning (ERP) (3)
- Featured (7)
- General Business (18)
- Hardware & Peripherals (9)
- Internet of Things (IoT) (8)
- Managed Anti-Virus/Anti-Malware (6)
- Managed Backups & Monitoring (13)
- Managed Services (20)
- Networking (70)
- News (16)
- Office Applications (6)
- On-Site Backups (6)
- Other (5)
- Passwords (5)
- Personal Computing (45)
- Press Releases (5)
- Ransomware (10)
- SandStorm News (12)
- Security Alerts & Vulnerabilities (14)
- Server & Server Hardware (1)
- Server Operating Systems (3)
- Servers (11)
- Social Engineering/Phishing (17)
- Software & Applications (14)
- Spyware/Malware/Viruses (14)
- Tips/Tricks/Shortcuts (27)
- Troubleshooting (3)
- Updates/Patches (6)
- Voice & Telephony (3)
- Wired Networking (12)
- Wireless/Wi-Fi (11)