Blog

Stay up to date with the latest technology trends, news, and tips

BBB warns of phishing scam targeting Netflix customers

WARNING: Hackers are targeting Netflix Customers with new Phishing email Here is how the scam works. Hackers send you an email claiming to be from Netflix. The email usually has the Netflix logo in the body of the message. The letter will read: Dear Customer: We’re having some trouble with your current billing information. We’ll

Read More »

Windows 10 updates will be biannual

Updating the Windows operating system is both crucial for the security of your computers, and incredibly frustrating. Up until now, Microsoft has released patches and updates unpredictably and often at a pace difficult to maintain. However, the company behind the world’s more popular operating system has announced it’s making some changes. Windows 10 updates in

Read More »

This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done. Even well-trained users are falling for the most recent ploy,

Read More »

[ALERT] FBI: “CEO Fraud Is Now a 5.3 Billion Phishing Scam

[img src=”/wp-content/uploads/sites/1097/2017/05/ProvidenceConsulting_CEOFraudEmailScam-blogpost.jpg” class=”aligncenter”] There is no better budget ammo for new-school security awareness training than to prevent phishing attacks. Attempts at cyber wire fraud, using spoofed email to impersonate a C-level executive or trusted business associates, surged in the last seven months of 2016, the FBI said in a May 4, 2017 warning. Cyber criminals

Read More »

A brief history of virtual quarantines

Malware is becoming more sophisticated every day, and we recommend several solutions for dealing with it. One of the most interesting of these is achievable via cutting-edge virtualization technology. Often referred to as sandboxing, this solution is a great way to quarantine and test suspicious applications before exposing them to your entire network. What is

Read More »

Sly phishing attack catching users off guard

You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com…right? Because if you’re not, you could end up exposing your computer or smartphone to a host of malware. The newest phishing attack strategy is the worst of all, and can catch even the most astute users

Read More »

Wikileaks’ charges of government spying

Staving off malicious cyber attackers is already a herculean task, so the last thing you need is to feel exposed from a totally new angle. That’s how many felt after Wikileaks’ accusations that the US government was spying on its citizens. However, the truth is a lot different from what the headlines would have you

Read More »

No Ransom: a place for free decryption

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the further it goes, the more resources are allocated to fighting it. If your data is held hostage, always check these lists for free decryptors first. The state of ransomware in 2017

Read More »

Mac ransomware and how to defeat it

Although most ransomware is designed to attack Windows systems, a new strain is targeting Mac computers. Discovered last month, Mac ransomware OSX/Filecoder.E was found by researchers to behave just like any cryptolocker variant. It would encrypt all data until victims paid the cybercriminals. But here’s the catch: There’s no guarantee that the Mac ransomware will

Read More »

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter,

Read More »
Archives
Scroll to Top