Hackers are smart – and only getting smarter. They are continually honing their attacks and searching for the weakest link – and oftentimes that is a company’s employees.Read More
Move over macros, Office DDE exploits arrive!
Office macros have been the primary choice of attacks by malicious actors for years. IT administrators and users have learned to be cautious before running macros. The Dynamic Data Exchange (DDE) protocol has been around much longer but hadn't been used for attacks. It's a...Read More
It's that time of the year where tax forms are filed and (unfortunately) personal information is sent around via unencrypted email. Internal email, that is email between users in a company on their own email system, can be considered as secure as the server itself for the most part (which one may interpret the degree of...Read More
Yes, it's tax season again. Time to get all your financial documents in order in hopes for a good refund (or at least not owe anything). While many people file their taxes right away, other people sometimes wait a while. Spammers know they have a wide window of opportunity to defraud and spam users and companies during...Read More