Tackling Ransomware on Windows

Tackling Ransomware on Windows

Tackling Ransomware on Windows   Microsoft has 1 billion Windows-OS powered PCs in use worldwide which explains why they are such a big target for hackers.  There are a number of Windows security threats that everyone needs to be aware of including potentially...
Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday — Shopping and Privacy   Black Friday is almost upon us!  The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...
Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones   Are you ready for the extreme online shopping season!  While you can purchase items online anytime, holiday e-commerce sales reached $126 billion last year with Cyber Monday online purchases generating $7.9 billion...
Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait – Fake Sexual Harassment Claims Scammers are phishing employees of large corporations using fake US EEOC sexual harrassment complaints to offload trojan payloads of Trickbot malware onto corporate computers which direct them to hand over...
Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?   Cybercriminals are getting better at crafting believable and sophisticated ilephishing emails that are undetectable from legitimate emails. Do you know how to spot them?  If you suspect that an email is not legitimate you can...
Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program   McAfee anti-virus software has a very serious vulnerability in its code execution.  No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...