During the COVID-19 pandemic there have been quite a few different types of scams. At first, most of the scams centered around economic relief money...
Reciprocal Technologies Blog Hackers • Page 5
When Your Contacts Aren’t Your Contacts – Display Name Spoofing
Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you...
Microsoft Thwarts Major Hacking Attempt
With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft...
Tip of the Week: 5 Warning Signs of a Phishing Attack
Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from...
Don’t Get Tricked: Phishing Attacks Pretending to be Voicemail Attachments
Human beings are naturally inquisitive creatures, which makes it all the easier for us to be convinced of different things. Cereal mascots promise...
There’s a Reason Some Scams are Painfully Transparent
“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share...
Cyberattacks are Up at the World Health Organization
The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had...
Windows 7 Still Causing Issues
Millions of people are still using the Microsoft Windows 7 operating system despite it being completely unsupported. When Microsoft pulled the plug...
Security Has to Be a Priority in 2020
Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the...
Three Tricks to Spot Phishing Attempts
Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today...