Phishing scams As the holiday season fast approaches so do the inevitable phishing scams. What's a phishing scam? Fraudsters may use a practice called phishing to try to obtain your sensitive data such as usernames, passwords, and credit card information. These fraudsters impersonate legitimate companies or people, sending emails, text messages containing links that attempt … Continue reading Holiday season phishing
I'm not a tech-person per se but from time to time friends and family ask me to help them out with their 'computer problems.' Recently a friend told me that her laptop fan was always running. She had been told by a local tech store the fan was to protect her laptop from over-heating, which is … Continue reading Why is the fan on my computer always running?
Spam the world! Recently a data security researcher known as Benkow found millions of emails and credentials on a spambot server. Your email address, your password, your name, your other online details are probably on that server. So, what is a spambot and why do crooks use them? Or more importantly, why do crooks need huge lists … Continue reading Why you should not open phishing emails
I love Twitter! I get much of my news from Twitter; it's fast-paced; it's short word count allows creativity and wit; now there is one more reason to love Twitter. Twitter has suspended accounts that spammed or stole other peoples Tweets. Some of these thieves had millions of followers, which is just crazy. Is this … Continue reading Twitter turns tables on tweetdeckers
Bots are a big part of the Internet An Internet Bot, also known as web robot, WWW robot or simply bot, is a software application that runs automated tasks over the Internet. Wikipedia Whilst bots may be used to perform repetitive jobs on the Internet, such as indexing a search engine, they often come in … Continue reading 5 ways to recognise a social media Bot
Crypto-mining malware is when hackers and fraudsters covertly infect your computer with software to do the calculations needed to generate cryptocurrencies, such as Bitcoin, Monero or Ethereum and the fraudsters keep any crypto coin proceeds for themselves. Why did my laptop slow down when I used it in Starbucks? If you join a public WiFi … Continue reading Why your daily coffee can make money for crypto-hackers
Your employees are your most valuable asset. But they can also be the weakest link in your security chain. Often gaps in employee knowledge and cybersecurity are only identified when full-scale problems arise. Small business owners can learn from the 'human error' mistakes of big organisations by training employees to detect and identify cyber dangers. … Continue reading Why the Netflix brand hijack is good for small business
Think you are safe from cyber attack because you have antivirus software? Think again! Research undertaken by The Australian Small Business and Family Enterprise Ombudsman indicates that 22 percent of small businesses breached by the WannaCry and Petya ransomware campaigns were so affected they could not continue operating. The research also states that 60 percent of small business that … Continue reading Stay safe online: 3 tips for small business