I cannot emphasize it enough Be careful when opening any email attachment where you aren’t sure of the sender or the attachment! If you don’t know who sent it, delete it; if it’s important the person sending it to you will contact you or you can call that person yourself. If you know the sender, but…
Read more
Recently a new worm dubbed “TheMoon” has been discovered exploiting a known vulnerability in a number of Linksys Router models. Once each router is infected it becomes a part of the chain and attempts to infect more Linksys routers. Sort of like you’d imagine a zombie biting a person and turning that person into another…
Read more
“Hello we have been notified your computer is infected. I’m a Microsoft Tech calling to fix it for you.” Sound familiar? I hope not, but it’s a scam that’s spreading and many people are being drawn in and taken every day. So much so that this kind of tech support scam has grown into a…
Read more
So many times we’ve seen a website owner struggling to manage their domain name registration because best practices weren’t used when it was originally registered. In many cases it was simply not knowing what the best practice is, or having paid a web designer to both create your site and register your domain name. There…
Read more
The seminar presented by the Cyber Security Group will focus on educating small and mid-size businesses on cyber threats and defenses. Included in the seminar will be Marie Kissinger of Top Speed Computer and Internet Services discussing examples of malware currently being used by criminals, including Cryptolocker which has been causing havoc around the world…
Read more