by Chuck Rutenberg | Jan 31, 2019 | Cyber Threats
By now, pretty much everyone who uses a computer has heard about phishing scams. For the sake of clarity, however, let’s recap: In a phishing attack (typically carried out by email, but also increasingly by text messages and other communications channels), the...
by Chuck Rutenberg | Jan 24, 2019 | Cyber Threats
Ah, the art of disguise. Ever since the Big Bad Wolf and Little Red Riding Hood (and probably earlier), one of the oldest tricks in the book is for a miscreant to pretend to be someone else—a phone or appliance repairman, a contractor, someone from the government, or...
by Chuck Rutenberg | Jan 17, 2019 | Cyber Threats
Internet fun fact: The term “spam” was first used in 1993 to refer not to unwanted email advertising, but to the accidental posting of 200 messages to a USENET news group. One of the readers of that group called it “spam,” for reasons that aren’t entirely clear. The...
by Chuck Rutenberg | Jan 15, 2019 | Cyber Threats
If you run or work in a small- or medium-sized business (SMB), ask yourself if any of these statements sounds familiar: “My staff and I are too smart to be fooled into installing malware on our computers.”“My business is too small for hackers to be interested in.”“Of...
Recent Comments