Skip to main content
0

Malware and Botnets

By No Comments

Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware, etc.) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Clicking on links in harmful websites, downloading infected software that may include toolbar add-ons and other apps, file sharing, and removable media are all ways to get malware. Links or attachments in email, social media posts, and online advertising are often…

Read More

The Internet of Things

By No Comments

The Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data via the internet. Cars, appliances, thermostats, door locks, smoke alarms, wearables, lighting, healthcare, and home security all contain sensing devices that we can control with our smartphones from anywhere, and they can talk to other machines and trigger other actions. Like an electric kettle that is controlled from a phone…

Read More

Digital Spring Cleaning

By No Comments

With spring in full swing we are all looking forward to warmer weather, flowers blooming . . . and cleaning? Yes, there’s a good chance your weekend plans may include the annual scrubbing, sweeping, and decluttering of your home so you can just relax and enjoy the warmer weather and flowers blooming with little worries. And while clearing clutter is an annual ritual for many households, most don’t think about freshening up their online life with a digital spring cleaning,…

Read More

Your Phone Can Be Your Worst Enemy!

By No Comments

Oh great! Your phones been infected. You cannot make calls, you get a text every 30 seconds telling you to pay someone 2 Bitcoin or else they will release photos… and Siri only tells you to turn left at the next stoplight. What happened? Why is your phone acting so weird? Is it just old? Did you download something? Are you infected? We will take some time to look through the mobile device threat landscape. A foggy foray that each…

Read More

Reporting Wire Fraud to the Internet Complaint Crime Center (IC3)

By No Comments

For several years I have been telling people who have suffered a wire fraud incident to fill out a complaint at the Internet Complaint Crime Center (IC3.gov). When asked why the answer always came down to because the FBI asked. The act of filling out that complaint can feel like an exercise in futility; you do not get a complaint number, do not get any contact information, and you never hear anything about the progress. So why should you fill…

Read More

How do I phish thee? Let me count the ways!

By No Comments

Traditional phishing is what we refer to as the “spray and pray” phishing attack because it’s usually a mass email that goes to thousands of individuals in hopes that a few will fall for the scam. Spear phishing targets specific individuals instead of a huge group and often research their victims on social media to customize their email. This is often the first step to get past a company’s defenses and then carry out targeted attacks on the company employees….

Read More