by itresource@sca-atl.com | Jul 20, 2023 | Atlanta IT Companies, Cyber Security
Recently, Meta launched a text-based social networking app called Threads. It has been deemed the “Twitter killer”, since it functions almost identically to Twitter. With its growing popularity among users, Threads is becoming the perfect phishing opportunity for...
by itresource@sca-atl.com | Jul 20, 2023 | Business IT Support Atlanta, Cyber Security
You may have taken measures to secure your organization’s computers and network from cybercriminals. But have you ever considered the threat posed by your printers and fax machines? If you’re not careful, cybercriminals can use your printers and fax machines to access...
by itresource@sca-atl.com | Jul 20, 2023 | Best Atlanta IT Support, Cyber Security
Cybercriminals use images in phishing emails to impersonate real organizations. By using images like official logos and promotional materials, cybercriminals hope to trick you into thinking the email is legitimate. In a recent scam, cybercriminals have been spoofing...
by itresource@sca-atl.com | Jul 18, 2023 | Atlanta IT Support, Cyber Security
Recently, cybercriminals have taken advantage of Soda PDF, a PDF viewing service. Using Soda PDF, cybercriminals are sending malicious PDF files to try to trick you into sharing your phone number and payment information. Because Soda PDF is a legitimate service, this...
by itresource@sca-atl.com | Jun 20, 2023 | Best IT Support Atlanta, Cyber Security
Verizon’s DBIR always has a lot of information to unpack, so I’ll continue my review by covering how stolen credentials play a role in attacks. This year’s Data Breach Investigations Report has nearly 1 million incidents in their data set, making it the...
by itresource@sca-atl.com | Jun 12, 2023 | Best IT Support Atlanta, Cyber Security
Recently, malware researchers discovered a trojan app on the Google Play Store. Trojans are apps or software that appear legitimate but are actually malicious. Thousands of users downloaded this app before knowing it was malicious. So, it’s important to learn how to...