Select Page

Google docs phishing

A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things.  For example, you can’t block the domain “Google.com”, because it has legitimate purposes.  So a network...

Some Spam to Avoid…

I thought it might be useful to give examples of some of the spam we’re seeing drop into mailboxes instead of the nearest supernova. Without further ado… 1) “Facebook Survey Gift Invite”. Click to Enlarge “You’ve been invited to...

More Phishy Tumblr Fun

Hey look, I have a new follower on Tumblr! I can’t wait to see all their lolcats, spinny gifs and pictures of Batman. Let’s click the link and see what they have for me this ti- Click to Enlarge ….oh. As you can see, their Tumblr account is firing me...