data privacy

November 18, 2020
Phishing

Security Filters Only Catch Half of Spear Phishing Emails

Feel safe because you bought a great email security filter? You might want to rethink your security strategy. New data by researchers at IronScales suggests that […]
October 26, 2020
Smishing

Smishing Scams Using Fake “Delivery Notice”

Not too long ago if you got a text message from your bank with a fraud alert you were actually concerned there was fraud on your […]
October 22, 2020
Voters

Hacker Peddling Info on 186 Million U.S. Voters

Is your private voting data being sold on the Dark Web? According to Trustwave, a cybersecurity company, the answer is yes. They claim to have found […]
October 19, 2020
Phishing

#1 Phishing Lure is Fake Microsoft Emails

You casually click through emails on the sofa, living your best work from home life, when you spot a Microsoft notice reminding you to update your […]
October 8, 2020
Washington

Entire State of Washington Battling Phishing Attacks

The State of Washington is currently embroiled in a large-scale phishing campaign, although it doesn’t seem yet to involve any form of ransomware. Multiple state agencies […]
October 2, 2020
Stolen Mail

Stolen Mail? Ring Security is Conquering That Too.

Click, purchase, delivery. It’s that easy, these days almost anything we could ask for is at the tip of our fingers. Sometimes however, there’s a glitch […]
September 21, 2020

Have you been Zoombombed yet?

Interrupted on a virtual meeting by an unruly and unwanted guest? Welcome to Zoombombing! FYI…Zoombombing refers to the unwanted, disruptive intrusion, generally by Internet trolls and […]
September 1, 2020
Captcha

Watch out! New Scam Tricks Victims With “Captcha”

I have to be honest. I love this new scam. It uses the very thing designed to protect a system from automated robotic attacks as bait. […]
August 26, 2020
data leak

Ransomware Costs University of Utah $475,000 to Avoid Data Leak.

Scammers and hackers will do anything to make their money. It’s not enough that they encrypt your files and demand a ransom, now they will steal […]