Types of Phishing Attacks, Part 2: Whaling

“Whaling” is another evolution of phishing attacks that uses sophisticated social engineering techniques to steal confidential information, personal data, access credentials to restricted services/resources, and specifically information with relevant value from an economic and commercial perspective. What distinguishes whaling from Read more…

Social Engineering

Social Engineering is defined as follows: The art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. Social engineering happens in both the physical world and the digital world. We are going Read more…

Basics of Online Privacy

With ransomware attacks at an all time high, it’s imperative to conform to a strict set of standards for online privacy. Stop using the same password for everything! If you’re not already doing it, you need to start behaving responsibly online.

Fraud Notice

We have been receiving phone calls from several angry and confused computer users who have been scammed by a fraudulent company calling themselves “Yes Tech LLC” based in Cranston, Rhode Island. If you believe you have been scammed by this Read more…

Recommended Listening

It’s a bit overwhelming to keep up with the times of technology so I really depend on several podcasts to keep me informed. My topics of interest include computer and personal security.