Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.
Mobile? Grab this Article!
Security Tip of the Week Technology Productivity Business Computing Best Practices Network Security Data Cloud IT Support Privacy Data Backup Hosted Solutions Software IT Services Internet Efficiency Email Data Recovery Business Managed IT Services Hackers Outsourced IT Malware Mobile Device Google User Tips Small Business Computer Collaboration Cybersecurity Innovation Workplace Tips Hardware Phishing Cloud Computing Backup Business Continuity Microsoft Mobile Devices Smartphone Upgrade Communication Business Management Android Tech Term VoIP Managed Service Smartphones Windows 10 Managed Service Provider Disaster Recovery Quick Tips Managed IT Services Covid-19 Paperless Office Ransomware Communications Office 365 Browser Network Save Money Data Management Passwords Remote Work Server BDR Internet of Things Social Media Encryption Saving Money Managed IT Users Remote Monitoring Business Technology Wi-Fi Help Desk Artificial Intelligence Compliance Document Management Holiday WIndows Government Productivity Chrome Microsoft Office Windows 7 Virtualization Wireless Training Automation Healthcare Employer-Employee Relationship Money Apps Data Security Machine Learning Mobility Laptops Applications Unified Threat Management Blockchain Office Health Miscellaneous BYOD Infrastructure Analytics Gadgets Facebook File Sharing Scam Project Management Files Maintenance Avoiding Downtime IT Support Processor Meetings Work/Life Balance Tip of the week IT Management Bandwidth Windows 10 Company Culture Remote Information Vendor Management Mobile Office Antivirus Two-factor Authentication Big Data Redundancy Data loss Remote Computing Customer Service Storage Computing Employee-Employer Relationship SaaS VPN Information Technology Website Managed Services RMM Hard Drive Regulations Networking Access Control Password Hosted Solution OneDrive Router IoT Virtual Private Network Politics Recovery Word Downtime App Risk Management Net Neutrality Tablet Software as a Service Firewall Customer Relationship Management Vulnerability Mobile Device Management Proactive Internet Exlporer Bring Your Own Device Smart Technology Instant Messaging Voice over Internet Protocol Uninterrupted Power Supply Remote Monitoring and Management Data Storage Unified Communications Cooperation Managed Services Provider G Suite Flexibility Consultation VoIP Remote Workers Automobile HIPAA Vendor Data Breach The Internet of Things Professional Services Spam Mobile Computing Operating System Free Resource Hacker WiFi End of Support Chromebook Gmail Recycling Time Management Settings Utility Computing Social Network Images 101 Remote Worker Display How To Managing Stress Point of Sale Office tips Augmented Reality Holidays Patch Management Electronic Health Records Cybercrime Network Management File Management Monitoring Digital Payment Dark Web Solid State Drive Employees Mobile Security Apple Server Management Payment Cards Search Management Travel Content Filtering Co-Managed IT Consulting Virtual Reality Assessment Private Cloud Printer Hotspot Administrator Procurement Samsung Current Events Video Conferencing Web Server Shared resources Websites Connectivity Telephone Gifts Black Market GDPR Wearable Technology Enterprise Resource Planning Business Telephone Mouse Read Only Motion Sickness IT Consulting Staffing Optimization Google Calendar PowerPoint Telephone Systems Going Green Wires Remote Working Microsoft Excel Error Education IT Service 5G Language Security Cameras Google Maps Migration Projects Vulnerabilities Biometric Distributed Denial of Service Botnet Finance Cameras Cortana IBM Statistics Mobile VoIP CES Electronic Medical Records Mobile IT Assessment Comparison Cookies WPA3 CRM Staff Cache Virtual Machines Outlook Legislation E-Commerce How To Batteries Budget Backup and Disaster Recovery Computers Wireless Internet YouTube SharePoint Printing Identity Theft Firefox Chatbots Return on Investment Geography Gamification Managed IT Service Authentication Physical Security Manufacturing Corporate Profile Bluetooth Star Wars Cyber security Tech Terms Robot IT Budget Tech Support Digitize Mail Merge Specifications Telephony Bookmarks Webcam Transportation Law Enforcement Hard Disk Drive Heating/Cooling Nanotechnology Smart Devices Fleet Tracking Technology Laws Credit Cards Shortcut Features Virtual Assistant Crowdsourcing Cabling Google Drive Social Networking Regulation Techology Human Error Employer/Employee Relationships Downloads Wireless Technology Identity Active Directory High-Speed Internet Lenovo Break Fix Authorization CCTV Hard Disk Drives WannaCry Video Games Theft GPS Processors IT Technicians Shadow IT Address Black Friday Favorites Servers Screen Reader Sensors Asset Tracking Banking Unified Threat Management eWaste Gadget Wasting Time Motherboard MSP Peripheral Disaster Resistance Permissions Permission Proactive Maintenance Digital Windows Server 2008 Customer Relationships ROI Windows Server Development Outsource IT Superfish Relocation Solid State Drives Monitors Hacking User Error Financial Tracking Alert Bitcoin Mirgation Enterprise Content Management Outsourcing Cyber Monday Conferencing Emoji Teamwork Social Smart Tech OneNote Reviews Spyware Operations IT Technology Tips Cyberattacks Database Disaster Touchscreen Modem Value of Managed Services PCI DSS Proactive IT Fraud Test Computer Care Database Management Cost Management Multi-Factor Security Notes Data Storage Licensing User Management Cables Laptop Data Warehousing Zero-Day Threat Options Trending Personal Information Update Software Tips History Emergency Twitter Supercomputer CrashOverride Printers Scalability Virus PDF Public Cloud Computing Infrastructure Legal iPhone Thank You Text Messaging USB Sync Notifications Advertising Hard Drives Congratulations Students Cleaning Mobile Device Managment Hacks Taxes HaaS Avoid Downtime Alerts IT Consultant Business Growth