Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.
Mobile? Grab this Article!
Security Tip of the Week Technology Productivity Business Computing Best Practices Network Security Cloud Data Data Backup Privacy IT Support IT Services Hosted Solutions Software Efficiency Business Data Recovery Email Outsourced IT Internet Malware Managed IT Services Hackers Computer Cloud Computing Innovation Microsoft Business Continuity Small Business Hardware Cybersecurity User Tips Upgrade Tech Term Backup Mobile Devices Collaboration Google Business Management Windows 10 Phishing Communication Workplace Tips Managed Service Provider Managed IT Services Mobile Device VoIP Ransomware Smartphones Paperless Office Office 365 Disaster Recovery Quick Tips Smartphone Android Managed Service Server Save Money Communications Remote Monitoring Internet of Things Browser BDR Encryption Managed IT Data Management Network Compliance Social Media Productivity Business Technology Holiday Wi-Fi Healthcare Government Help Desk Passwords Remote Work Windows 7 Training Artificial Intelligence Document Management Virtualization Saving Money Employer-Employee Relationship Mobility Automation Unified Threat Management BYOD Users Health Miscellaneous Laptops File Sharing Microsoft Office Facebook Data Security Applications WIndows Meetings Apps Machine Learning Windows 10 Tip of the week Two-factor Authentication Redundancy IT Management Office Processor Scam Project Management Vendor Management Antivirus Infrastructure Information Avoiding Downtime Analytics Bandwidth IT Support Work/Life Balance Data loss Money Company Culture Chrome Blockchain Maintenance SaaS Politics Router Wireless Software as a Service Downtime RMM App Word Vulnerability OneDrive Covid-19 Risk Management Proactive Firewall Mobile Device Management VPN Storage Employee-Employer Relationship Computing Tablet Website Regulations Gadgets Access Control Hard Drive Virtual Private Network Big Data Customer Relationship Management IoT Password Hosted Solution Files Recovery Chromebook Automobile Uninterrupted Power Supply Gmail Recycling VoIP Consulting Consultation Utility Computing Patch Management Managing Stress Operating System Dark Web Augmented Reality Managed Services Provider Mobile Security Solid State Drive Management Point of Sale Settings Smart Technology Social Network Professional Services Cybercrime Time Management Mobile Office Office tips Bring Your Own Device Digital Payment Unified Communications File Management How To Networking Remote Monitoring and Management Remote Computing Travel Network Management Cooperation Payment Cards Search Remote Worker Virtual Reality Data Breach The Internet of Things Remote Workers Flexibility Private Cloud HIPAA Apple Server Management Co-Managed IT Internet Exlporer Electronic Health Records Mobile Computing Monitoring G Suite Assessment Net Neutrality Information Technology Employees Managed Services Data Storage Customer Service Law Enforcement Test Database Management Lenovo Break Fix Social Networking Regulation Optimization Robot Cyberattacks Database Downloads Going Green Remote Working Address Black Friday Identity High-Speed Internet Mobile VoIP Notes How To Unified Threat Management Projects Biometric Crowdsourcing Zero-Day Threat Options IT Technicians Vendor Procurement Google Maps Identity Theft Disaster Resistance Permissions Screen Reader Asset Tracking IT Assessment Wireless Technology Instant Messaging Shared resources IBM Physical Security Statistics Budget GDPR WiFi Superfish Motherboard MSP Virtual Machines Video Games Processors Read Only Voice over Internet Protocol Telephony Webcam eWaste Batteries YouTube Cyber Monday Development Cyber security End of Support PowerPoint User Error Return on Investment Gamification 5G Technology Tips Mirgation Enterprise Content Management Smart Devices Security Cameras Firefox Proactive IT Fraud Smart Tech OneNote Digitize Google Drive Finance Corporate Profile CCTV Bluetooth Emoji Electronic Medical Records IT Budget GPS Data Warehousing Modem Credit Cards Alert Hard Disk Drive Heating/Cooling Multi-Factor Security Operations Cables E-Commerce Gadget Cabling Printer Hotspot Cost Management Active Directory Backup and Disaster Recovery Wireless Internet Mouse Sensors Printing IT Consulting Connectivity Shadow IT Data Storage Authentication Manufacturing Relocation WannaCry Google Calendar Wearable Technology Enterprise Resource Planning Peripheral Tech Terms Tracking Microsoft Excel Holidays Samsung Bookmarks Transportation Servers Human Error Employer/Employee Relationships Content Filtering Digital Computer Care Distributed Denial of Service Wires Windows Server 2008 Black Market Features Virtual Assistant Language Windows Server Social Outsource IT Hacking Comparison Migration Vulnerabilities IT Service Outsourcing Telephone Systems Authorization Hard Disk Drives Monitors Outlook Legislation Mobile Value of Managed Services PCI DSS Personal Information Cortana Theft Display Administrator Cookies WPA3 IT Favorites Web Server Permission Proactive Maintenance Spyware Staffing Managed IT Service Spam Wasting Time Disaster Motion Sickness Touchscreen SharePoint Staff Cache User Management Laptop Error Education Trending Mail Merge Specifications Chatbots Geography Telephone Computers ROI Licensing Technology Laws Star Wars Current Events Video Conferencing Solid State Drives Shortcut Tech Support Financial Bitcoin Techology Nanotechnology Fleet Tracking Business Telephone Hacker Conferencing Teamwork Botnet Cameras Websites Public Cloud USB Software Tips CRM Hard Drives PDF Notifications Supercomputer CrashOverride iPhone Thank You Text Messaging Sync Hacks Advertising Printers Cleaning Congratulations Alerts Avoid Downtime Business Growth Mobile Device Managment Taxes HaaS Emergency Update IT Consultant Students Twitter Computing Infrastructure Scalability Virus History Legal