Ransomware

Ransomware occurs when hazardous software is downloaded on your computer, phone or server and executed.  Typically you have only three options available to you: Pay the ransom Restore from a back-up Start fresh The first option may not always work, it depends on the...

Blackmail

During a cyber security webinar, one of the recent popular blackmail threats was discussed, pornography blackmail. This is  a trojan attack, where illicit child pornography is added to your computer or turning on your camera on when you are on a pornography site and...

PC vs cellphone

I have family and friends who are constantly on their phones.  They use these devices for most aspects of their lives.  I tend to use mine as a phone.  I know I am a dinosaur. I was watching a webinar and the presenter went through how to uncover e-mail phishing on a...

Text Spoofing

I was talking to a client recently; their e-mail system was compromised, and I believe that the hackers were still lurking in the system. They had hired a new employee who received a text from the owner within the first week requesting that he go out and buy a bunch...

Taxpayer Bill of Rights

By law, all taxpayers have fundamental rights when they’re interacting with the IRS. It’s important that all taxpayers know and understand their rights. The Taxpayer Bill of Rights presents these rights in 10 categories. For full official details about...

Pin It on Pinterest