by Iler Networking & Computing | Oct 30, 2018 | Tech Tips
Spoofing is a fraudulent practice in which a person or malicious program is disguised as a known computer/tablet/phone by cloning device information. The purpose of these attacks is to trick the recipient into allowing the transfer of data or secure transactions. The...
by Iler Networking & Computing | Oct 22, 2018 | Tech Tips
Spyware is one of the most common threats on the internet. It runs quietly in the background collecting your personal data without you even knowing it’s there. It then sends that information over the internet to a third party. It is this type of malicious software...
by Iler Networking & Computing | Oct 15, 2018 | Tech Tips
A Trojan Horse, or, simply, a trojan, is a kind of malware that hides within computer programs and is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network. The infected code is meant to trick you into loading and executing...
by Iler Networking & Computing | Oct 12, 2018 | Tech Tips
Ransomware is a type of malware designed to encrypt, erase, or block access to files on a system, until a ransom is paid by the victim. Payment is most often asked for in crypto-currency, such as Bitcoin, but prepaid cards or gift vouchers are sometimes...
by Iler Networking & Computing | Oct 1, 2018 | Tech Tips
Cyber scams are increasing every month and the techniques used are becoming more advanced. Phishing is one of the oldest and most common attacks used today. These schemes typically come by email, disguised as a trusted individual or entity. Some scams target specific...