Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: “Enter to Win FREE Tickets to Star Wars”

October 27, 2015 by The T By D Team Leave a Comment

Apparently geeks go after their own now…Star Wars VII Poster
ALERT:
Enter to Win FREE Tickets to Star Wars

 

The upcoming December of the next Star Wars Episode VII:  The Force Awakens movie has been eagerly anticipated, and is scheduled for mass release in the U.S. on December 18, 2015.  

CyberCriminals are using this anticipation, and are trying to trick people by offering free tickets to the upcoming theater release.  

Star Wars free tickets

Over the next 2 months computers everywhere will be deluged with scams.  Until the December 2015 release (and likely for weeks afterwards) people will receive emails that ask you to enter sweepstakes, fill out surveys, or enter information to win coupons for free movie tickets.  CyberCriminals will employ every trick in the book to get you to open their emails, click on attachments, or open zip files.

Do NOT fall for these tricks.  

Instead of free tickets, all you will win is a bill from your friendly neighborhood computer geek, because you will be downloading and infecting your computer (and possibly the whole computer network, if you’re at work!) with malware or a virus.  If you’re using a work computer, you risk infecting the whole network. 

Technology by Design clients that have purchased our Spam Filter don’t have to worry, the spam emails will not get through.

However, they cannot open things willy-nilly.  A well-intentioned friend in your contacts can still directly email you the link/entry form/etc.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Facebook Dislike Button

October 6, 2015 by The T By D Team Leave a Comment

Zuckerberg Dislike

ALERT:  Facebook Dislike Button

At a Q&A session at Facebook on September 15th, Mark Zuckerberg mentioned that Facebook users have been requesting a “Dislike” button, and that Facebook was finally working on this option.  Zuckerberg clarified that this “Dislike” button would not be a “downvote” or meant as a disparaging comment on someone’s post, but rather to communicate a user’s empathy towards another user’s post.

Fb Communicate Empathy

CyberCriminals, in their ever-scamming mood, jumped all over this suggestion.  There have been similar scams in the past, but this time they took Zuckerberg’s comment and ran with it.  CyberCriminals have sent out a deluge of scams trying to lure Fb users to “get the new dislike button” in their Fb profile. 

No Dislike Button

Facebook users that fall for this scam, end up giving out confidential information, installing malware on their PC or mobile device, installing rogue browser plugins and/or get themselves on a ‘scam list” and end up getting inundated with unwanted phone calls, emails…even snail mail, that tries to sell them various scam products.

The Facebook scam posts could look similar to the scam posts below:

Fb Dislike 1

Fb Dislike 6

 

 

 

 

 

 

Fb Dislike 2

Fb Dislike 5

If you receive an email, Fb message, text message, tweet, etc about a Facebook dislike button…

It Is A SCAM.

Do not click on anything, do not open any attachments, do not fill out any forms, do not forward to your friends/Facebook groups.

Fb Now Dislike Button

 Facebook does not yet have a Facebook button.  One is in the works, but has not yet been finalized.

If you receive a post, email, message etc about a Facebook ‘Dislike’ button, to check if it’s the real deal, simply go to Facebook’s Fb page:  

https://www.facebook.com/facebookcanada?fref=ts.  

You can be sure there will be a big announcement.

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: FBI Public Alert

September 21, 2015 by The T By D Team Leave a Comment

FBIALERT:  FBI Public Alert

The FBI released a warning recently against a new CyberCriminal I.T. crime wave that is so prevalent and so devastating to companies, that the FBI have named it:

“CEO Fraud”

This scam is also known as “Business Email Compromise“, which we sent out an ALERT for in January.  FBI CEO Fraud

“CEO Fraud”:  CyberCriminals impersonate a company’s CEO, using the company’s own spoofed domain name.  The fake CEO contacts company employees in charge of money transfers, and orders them to transfer large amounts of money out of the country.

CEO Fraud2CyberCriminals take employee email addresses and other information from the target company’s website to help make the emails more convincing.  In the case where executives or employees have their inboxes compromised by the thieves, the crooks will scour the victim’s email correspondence for certain words that might reveal whether the companies routinely deals with wire transfers (searching for messages with key words like “invoice”, “deposit” or “president” or “CEO”).

CyberCriminals monitor the email account of a company’s CEO for months, waiting for the right time to kick this fraudulent event off.  The “right time” is usually a time where the CEO is out of town, or can’t be easily reached.  

The CyberCriminals spoof the name of the company’s own domain (eg. “tbyd.co” instead of “tbyd.ca”) to make the emails more convincing, which can be done easily if your email server is not configured properly.

(One reason to get a professional I.T. organization to manage and maintain your I.T. network!)

IT Security Guard

The CyberCriminals, once they have spoofed the company’s domain, and have confirmed (by monitoring the CEO’s email account) that the CEO cannot easily be reached for confirmation, send URGENT emails that look legit.  The emails look like they are coming directly from the CEO, and are ordering the employee to send wire transfers.  

This email fraud is targeting small and medium-sized companies, and the current loss is tallied at $1.2 Billion.

“The scam has been reported in all 50 states and in 79 countries,” the FBI’s alert notes.  

“Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.”

How To Prevent Becoming a Victim
The FBI suggests the following tips for businesses to avoid being victimized by this scam (a more complete list is available at:  www.ic3.gov).
  1. Verify changes in vendor payment location and confirm requests for transfer of funds.
  2. Be wary of free, web-based email accounts, which are more susceptible to being hacked.
  3. Be careful when posting financial and personnel information to social media and company websites.
  4. Regarding wire transfer payments – Be suspicious of requests for secrecy or pressure to take action quickly.
  5. Consider financial security procedures that include a two-step verification process for wire transfer payments.
  6. Create intrusion detection system rules that flag emails with extensions that are similar to company email, but not exactly the same.  For example “.co” instead of “.com”.
  7. If possible, register all Internet domains that are slightly different than the actual company domain.
  8. Know the habits of your customers, including the reason, detail, and amount of payments.  Beware of any significant changes.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Drowned Syrian Boy Scams

September 9, 2015 by The T By D Team Leave a Comment

ALERT:  Drowned Syrian Boy Scams

The news, Internet, and social media have been confronted with some disturbing images this week.

 

Graphic photos of 3-year-old Alyan Kurdi, lying lifelessly on  a beach off the coast of Turkey, have been shared prolifically across social media platforms, such as Facebook.  The boy, along with his family and other Syrian refugees, was trying to reach Greece.

The graphic photos have reached millions of people, being passed from friend to friend.  Justified by the reasoning that we cannot hide away from the very real, very serious nature of this situation.

As with all tragedies, CyberCriminal lowlifes are willing to exploit this graphic photo, for their own profit.  
And they have several scams currently being used, to do just that.

 

Phishing Scams

Phishing email attacks are sent out randomly to a mass amount of people:

  1. Trying to trick people into either giving a charitable donation at a bogus website, or
  2. Trying to trick people into clicking on a link that downloads malware onto your PC.
Social Media Scams

Facebook, Twitter, etc:  Asking you to share/like/retweet etc their post1 share = 1 prayer

  1. They tell you that if you care at all you will share/like etc –  “1 share = 1 prayer”LikeFishing scam1
  2. Asking for your help, they tell you that if they get 1000 shares/likes etc, so and so will donate a specific amount of money

Think before you click

Called “Like-Farming Scams“ – They collect “likes” or “shares” etc.  The list of followers can be used by the CyberCriminals for further spear-phishing, or sold to other CyberCriminals for their spamming use, or to marketing outfits.

Fb Page for Sale

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: AshleyMadison Hack Blows Up

August 20, 2015 by The T By D Team 1 Comment

AM3ALERT:  

AshleyMadison Hack Blows Up

 

If you haven’t heard about this yet (on the news, social media, around the water cooler…), you will soon.

We previously reported on the huge AshleyMadison hack, where CyberCriminals stole, and posted partial records.

The hackers who stole more then 36 million records from the AshleyMadison site (which promotes cheating on your partner)…
have now posted ALL the records.

AMProfile

All these records are now out in the open, exposing highly sensitive personal information…for everyone to see.

If that wasn’t bad enough…CyberCriminals are going to exploit this every-which-way they can, and then some.

Any of those 36 million registered users are now a target for blackmail, private investigators, divorce lawyers, not to mention the multitude of social engineering attacks:

spear-phishing email attacks, fake websites where you can “check if you spouse is cheating on you”, or ways to find out if your own extramarital affair has come out.

 

There has already been phishing emails that claim people can go to a website to find out if their private data has been released.

 

The following link is from a supposedly “reputable” source that you can check if you are on the list:  https://ashley.cynic.al/.

NOTE:  There have been reports that people have checked their names one day and got a “not on the list” verification.  When that person checks the exact same email address the next day, it states that they ARE on the list.

CyberCriminals are going to exploit this situation in many ways – sending spam, phishing and possibly blackmail messages, using social engineering tactics to make people click on links or open infected attachments.  

If your employees open theses at work, these emails will infect your entire network!

 

Be on the lookout for threatening email messages which slip through spam filters that have anything to do with AshleyMadison, or that refer to cheating spouses —

DELETE THESE EMAILS IMMEDIATELY.

 

Feel free to forward this warning to friends, family, colleagues and peers!

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Massive Internet Ad Poisoning

August 18, 2015 by The T By D Team Leave a Comment

PoisonALERT:  Massive Internet Ad Poisoning

The same CyberCriminals that infected the Yahoo site a few weeks ago, have struck again.  This time, infecting sites like DrudgeReport.com and Weather.com.  Both sites have hundreds of millions of visitors per month, and both were serving poisoned web ads  to their visitors, which either dropped CryptoWall ransomware or infected the person’s PC with adware.

 

How It Works

Website advertisers do not sell their website ad-space Ad Networkto one website at a time.  Websites that want to make money, sell their advertising space to an Ad Network.  Advertisers sign contracts with Ad Networks, which then displays the ads on the websites that they bought ad-space on.  The Ad Network sits in the middle between the advertisers and the websites, and they manage the traffic and the payments.

CyberCriminals fool the Ad Networks into thinking that they are a legitimate advertiser, Website Adsbut the ads they give the Ad Network to display are Poisoned.  Once an ad network is subverted, hundreds of millions of poisoned ads are displayed in real-time.  Many of these ads initiate a drive-by attack without you having to do anything.  If you browse to a page with a Poisoned ad on it, it runs the risk of having your PC encrypted with ransomware (which will cost you a minimum of $500 to rid yourself of, unless you have a very recent backup!).  The attack infects the computer literally in seconds.

What to Do
For Single Computers:
  1. Disable “Adobe Flash” on your computer.  Or, at least set the Adobe Flash plug-in to “click-to-play” mode – which blocks the automatic infections.
  2. Update your security patches, and install them as soon as they come out.  A majority of infections are due to security patches not being updated.
  3. Download and install “Ad Blocker” plug-ins for your browser.  These prevent the ads from being displayed in your browser to begin with.  With the massive increase of PC infections, ad blockers are becoming increasingly popular.
For Computer Networks:
  1. Get rid of “Adobe Flash” altogether.  This is a frequent solution for many businesses.
  2. Deploy ad blockers using group policy.  Here is a forum post at the AdBlockPlus site where it is explained how this can be done:  https://adblockplus.org/forum/viewtopic.php?t=29880
Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: A $46 Million CyberHeist, and Why You Should Care

August 10, 2015 by The T By D Team Leave a Comment

Ubiquity Networks Inc

ALERT:

A $46 Million CyberHeist…and Why You Should Care

 

Late last week, Networking firm Ubiquity Networks Inc. disclosed that CyberCriminals recently stole $46.7 Million using an increasingly common scam using spear-phishing.  

Targeting businesses using spear-phishing isn’t a new tactic of CyberCriminals (see past ALERTs:  Resume Ransomware, Banking Email Scam, Email Attachment “Fax”, etc.), but it has become increasingly common.Fax Scam

In this specific CyberHeist, CyberCriminals used fake communications from “executives” at the victimized firm in order to initiate unauthorized international wire transfers.  Ubiquity, a San Jose, USA networking technology maker for service providers and enterprises, disclosed the attack in a quarterly financial report, which they filed this week with the U.S. Securities and Exchange Commision (SEC).  Ubiquity states is discovered the fraudulent CyberHeist on June 5/15, and reported that the incident involved employee impersonation and fraudulent requests from an outside entity targeting the company’s finance department.  Ubiquity stated:

“This fraud resulted in transfers of funds aggregating $46.7 million held by a Company subsidiary incorporated in Hong Kong to other overseas accounts held by third parties…As soon as the Company became aware of this fraudulent activity it initiated contact with its Hong Kong subsidiary’s bank and promptly initiated legal proceedings in various foreign jurisdictions.  As a result of these efforts, the Company has recovered $8.1 million of the amounts transferred.”

Wire Transfer fraudPreviously known as “CEO Fraud“, and “Business Email Compromise“, the CyberHeist that hit Ubiquity is a sophisticated, and (unfortunately) increasingly common one, targeting businesses working with foreign suppliers and/or businesses and that regularly use wire transfer payments.  In January 2015, the FBI warned the public about CyberHeists that resulted in CyberCriminals stealing almost $215 million from businesses in the previous  1 1/2 years.  In those CyberHeists, the CyberCriminals spoofed or hijacked email accounts of company business executives or employees.

Although Ubiquity did not disclose how they were victimized, usually CyberHeists of this kind are performed using spear-phishing company employees to first gain information about the company’s upper echelon, as well as information about which employees have access to and/or regularly perform financial transactions/wire transfers with suppliers/other businesses.  They then either send fake emails spoofing those upper echelon or the employees (previously mentioned), in order to gain access to, or spoof wire transfers.  In any case, the CyberCriminals are in search of money.

Why You Should Care

I know, you’re wondering what any of this has to do with you, because your business doesn’t have $46 million to lose…But that’s just it.  $46 million obviously didn’t bankrupt Ubiquity, but a much smaller amount might bankrupt your business. 

In any of these cases, ANY of these victimized companies could have been prevented by effective Employee Security Awareness training.

Think of all the Internet/I.T. security a big company like Ubiquity likely has…and the CyberCriminals still got in.  Now think of the Internet/I.T. security your company has…scared yet?  No, the bad guys that went after Uqibuity likely won’t come after your company.  BUT there are CyberCriminals that are lower on the CyberHeist skill level scale that ARE targetting companies…JUST LIKE YOURS.  And there are MORE of these CyberCriminals out there.

Not sure if you’re company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags” to see a general indication of, and what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Search Toolbar is a Malware Conduit

August 7, 2015 by The T By D Team Leave a Comment

Baidu ToolbarALERT:  Security Firm Warns Search Toolbar is Malware Conduit

The toolbar distributed by Chinese-language search engine Baidu, is being targeted by opportunistic attackers and use to exfiltrate corporate secrets, says Rob Eggebrecht, president and CEO of security firm InteliSecure.

Baidu, like all major search engines, including Bing, Google, and Yahoo, distributes a toolbar that can be used to speed up search engines.  But Eggebrecht says that multiple organizations have traced data breaches to an intrusion that began when outsiders used the Baidu toolbar to sneak data-stealing malware into their company.  Refusing to specify, he says that one recent victim was a U.S. pharmaceutical firm, from which attackers compromised research and development work worth millions of dollars.Baidu

Eggebrecht’s firm believes that the attacks can be traced back to individuals associated with the Chinese government.  

“Our take on it, not trying to directly pick on the Chinese, is that…when users hit certain links, attackers drop down…malware, or phone-home technology, that starts capturing information.”

Eggebrecht states the toolbar-enabled data exfiltration comes at a time when his firm has witnessed a spike in attacks against corporate networks – and not just those targeting toolbars – by what appear to be attackers with ties to China.  To date, hacking U.S. and Canadian organizations seems to trigger few, if any, penalties against either Chinese individuals or the government itself.

APT-style attacks – often beginning with a phishing email, and relying on targets to execute attachments and thus infect their systems with malware – are seen as the hallmark of corporate espionage.  But attackers have never been adverse to employing simpler options when available.  Eggebrecht states:

Targeting the toolbar “was an opportunistic way for the Chinese government to capture information in a very nonchalant manner, because…they know they have a good expat user base in the research community” that is going to rely on a Chinese-language search engine.  

All browser toolbars should be blocked by default, states Alan Woodward, a computer science visiting professor at the University of Surrey, and a cybersecurity adviser to Europol, the association of European police agencies.  

“These so-called ‘helper’ add-ins, I mean, god knows what they’re doing.  It’s a well-known attack vector.”

Ask your I.T department if toolbars are blocked through your security settings.

Ask us about our Core Security Solution Package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Windows 10 Upgrade Offer Installs Ransomware

August 5, 2015 by The T By D Team Leave a Comment

Dont worry were from the internetALERT:  

Microsoft Windows 10 Upgrade Offer

Installs Ransomware!

 Microsoft is in the process of releasing their new Windows 10 Operating System (OS).  This is an upgrade you do not pay for, and promises to fix problems with earlier versions, and claims to be more secure.  They plan to upgrade over 1 billion computers, causing inevitable confusion among PC users.

Cybercriminals are trying to exploit this confusion, with phishing scams and criminal call centres.
  • Criminals are making phone calls, claiming to be from Microsoft tech support.  They ask for your credit card number “in order to charge you for the upgrade”.
  • CyberCriminals are sending emails claiming to be from Microsoft, with links claiming to link you to “your Windows 10 Upgrade”.  When you click on the link, you download CBT-Locker Ransomware onto your computer.
If you would like the Windows 10 Upgrade, go directly to the Microsoft website for more information.
Here is the direct link, or copy & paste the link into your address bar:  http://www.microsoft.com/en-us/windows/windows-10-upgrade.

However, you might want to wait on upgrading to Win10, until more field-testing is completed.  See why on our review.

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: AshleyMadison Hack & Phishing Scam

July 21, 2015 by The T By D Team 1 Comment

AshleyMadison

ALERT:  AshleyMadison Hack & Phishing Scam

 

A few months ago, the Adult Friend Finder (AFF) website was hacked and faced a multitude of phishing scams.
Now, AFF’s biggest competitor, AshleyMadison (AM), is facing the very same problem.

 

With 37 million registered users, AM’s online cheating site whose slogan is “Life is short.  Have an affair”,  is one of the most heavily-trafficked websites in America.

Large amounts of data has been stolen from AM, and has been posted online, by hacker(s) that go by the name “The Impact Team”.  The data posted online includes sensitive internal data stolen from Avid Life Media (ALM), the Toronto-based firm that owns Ashley Madison as well as related hookup sites Cougar Life, and Established Men.

“The Impact Team” also claims to have completely compromised the AM’s user databases, financial records, and other proprietary information.

Impact Team

 

Avid Life Media released a statement yesterday reporting:

We have always had the confidentiality of our customers’ information foremost in our minds, and have had stringent security measures in place, including working with leading IT vendors around the world.

At this time, we have been able to secure our sites, and close the unauthorized access points.  We are working with law enforcement agencies, which are investigating this criminal act.  Any and all parties responsible for this act of cyber-terrorism will be held responsible.  Using the Digital Millennium Copyright Act (DMCA), our team has now successfully removed the posts related to this incident as well as all Personally Identifiable Information (PII) about our users published online.

 

The Problem:
CyberCriminals are going to exploit this in many ways, sending spam, phishing emails, and possibly blackmail emails.  

 

They are going to use social engineering tactics to scare people into clicking on infected links or opening infected attachments.  

 

Any 1 of these 37 million registered users of AM, is now a target for a multitude of social engineering attacks.  People that have extramarital affairs can be pressured into clicking on links that threaten to “out” them.  Blackmail, spear phishing emails, emails with links to sites claiming to show people if their private data has been leaked, or emails with links claiming can prevent their private information from being leaked.  

And you can bet that jilted spouses, divorce attorneys, and private investigators are undoubtedly going to pour over the leaked data.

 

BEWARE of any emails with threatening messages about AshleyMadison, or the company’s member list, or pictures, or information.
DO NOT click on any links or open any attachments.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 15
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in