One of the better sci-fi franchises of all time is the Terminator movies, which is basically an 80s retread of the old Frankenstein horror tale. One of the best things about these movies is how prescient they now seem about technology. Yes, the movies got a lot wrong too. According to first installment in 1984, the evil autonomous AI called Skynet would destroy the world by 1997. When that didn’t happen, the 2003 Terminator 3 movie conveniently postposed the apocalypse to 2004. Unless I’m living in the Matrix, that didn’t happen either. But that’s a whole other movie franchise and discussion for another time. Read more
Even though the Internet as we know it has only been around 35 years or so, it has a long memory. For those old enough to have lived a portion of their lives pre-internet, you are probably very thankful that some of the things you said and did when you were much younger (and more foolish) were not on Twitter or Tik Tok. I wonder about how this generation, who lived all their lives with social media, will handle seeing their awkward dance and prank videos when they are grandparents. Read more
Protect-the-Thread, Tie Up Loose Ends that Your Email Encryption Cannot Touch
If you’re like me, you’re a human, and you know that as humans, we’re error prone. Sometimes we take the easy way out (but only when it comes to technology of course 😊). However, taking the easy way when it comes to email can put private information at risk in so many ways. One way that is often overlooked is the “thread” – the email thread that is. If you were hoping for a tailor recommendation, I can’t help much. Read more
Ransomware Attacks Won’t Die–Just Multiply
Ransomware has become such a hot topic with a seemingly new case every day that we thought we would pick up where we left off last week…
We Predicted the Death of Ransomware in 2017. Oh, Time Machines.
We first wrote about Ransomware attacks in Tech Essentials in 2017 – back when a Bitcoin was valued at $1800 (oh, the good old days). The crux of the article was that many victims were paying their ransom to the cyber perpetrators, but they did not have an easy way to track and reconcile who paid, and many who did pay the ransom never got the decryption key to unlock their files. Imagine this happening in the analog world with kidnapping cases!
Working from Home Continues to Test Patience of IT Administrators
Has this happened to you recently: You get an email from yourself asking you to click a link to see an agenda you didn’t write or for an invoice you never sent? The newest are people sending you pictures of checks that they supposedly put in the mail to you (hoping you click on the image which then makes nefarious things happen). Earlier this week I saw an email from myself with an exact duplicate of my own RPost signature asking me to click a link to register for a long-past webinar and download a strange document that was titled, “PO#09162020.doc”.
Signs of the Times: Dealing with Lower Home Bandwidth and a Host of Other New Security Threats
As 2020 plods along, new tech challenges I never thought we’d face are becoming realities. First of all, as I’m sure many of you who share living spaces have noticed, home internet connections have become less than ideal during the 8AM – 12 noon timeframe. My kids’ virtual learning via video hogs so much bandwidth that my own video calls for business are cutting out (fortunately, virtual school is only half a day).
“You’re Fired!” Fake Termination Emails Proliferate in this Climate of Job Insecurity
It was only a matter of time. Fresh off their latest exploits at trying to phish for sensitive financial account information, scammers have set their sights on people’s actual jobs. With jobless claims now topping 30 million and the unemployment rate headed for new highs, cyber criminals now have fertile ground for a brazen new scam.
Anatomy of Phishing in this Pandemic – Spearphising is Great, Whaling Best
If you have money, savvy phisherman and whalers will find you. With most of the world hunkered down working from home, normal processes are disrupted, so this is a target-rich environment for scammers. They are lurking. Beware!
Whale Eats Shark. Whale Eats Nurse. Whale Eats $1.2mm
Killer whales occasionally hunt sharks. When they do, it can be ugly. In a recent whaling attack (This is not a nature article. We are referring to the very tricky type of email “spear-phishing” impostor email attack), the poser sent an email to one of the most famous sharks (from the Shark Tank TV show); an email with an invoice for a real estate renovation.