Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.
Mobile? Grab this Article!
Security Business Computing Technology Productivity Data Backup Outsourced IT Best Practices Data Recovery Tip of the Week IT Support Network Security Hosted Solutions IT Services Managed IT Services Business Continuity Small Business Software Cloud Data Innovation Managed IT Services Upgrade Malware Cloud Computing VoIP Cybersecurity Email Business Privacy Managed IT Internet of Things Hardware Efficiency Paperless Office Communications Managed Service Provider Collaboration Computer Redundancy Saving Money Hackers Project Management Healthcare Phishing Save Money Compliance Vendor Management Internet Backup Windows 7 Document Management Business Management Managed Service Microsoft Software as a Service IT Support Disaster Recovery BDR Tech Term Mobility Help Desk Passwords Social Media Ransomware Customer Relationship Management Mobile Device Laptops Password Wi-Fi Data Management Assessment Network Data loss Company Culture Remote Monitoring SaaS Windows 10 Downtime Consultation Electronic Health Records Unified Threat Management Browser Training Google Proactive File Sharing Communication Bandwidth Remote Monitoring and Management Files Net Neutrality Applications Gadgets Mobile Devices IoT Analytics Productivity Bookmarks Cortana Address Unified Threat Management Recovery Patch Management Geography Meetings Internet Exlporer Disaster Resistance Permissions Virtual Assistant Trending Two-factor Authentication Chrome Mobile Computing Dark Web Fleet Tracking Information Remote Worker Remote Work Favorites Employer-Employee Relationship Virtualization Social Networking Display Uninterrupted Power Supply Active Directory Recycling Vulnerability Technology Tips High-Speed Internet Telephony Proactive Maintenance Robot Proactive IT Fraud Utility Computing Router VoIP Multi-Factor Security Managing Stress Employees Scam Data Warehousing Asset Tracking Server Smartphone Monitoring Statistics File Management Operating System Conferencing Windows Server 2008 Smart Technology Motherboard MSP Word Wireless Technology Windows Server VPN IT Consulting Unified Communications Android Cyberattacks Microsoft Office End of Support Zero-Day Threat Automation Firewall Consulting BYOD Government Risk Management Solid State Drive Co-Managed IT Procurement User Management Access Control Operations Management Digital Payment Telephone Cables RMM Data Breach The Internet of Things Cost Management Voice over Internet Protocol Storage Travel Business Telephone Data Security Content Filtering Antivirus Mobile Device Management Miscellaneous Business Technology Going Green Enterprise Resource Planning Mobile VoIP Mail Merge Regulations Wires Smartphones Processor Infrastructure Remote Computing Technology Laws Hard Drive Migration Vulnerabilities Holiday Backup and Disaster Recovery Techology Remote Workers Artificial Intelligence Professional Services Hacking Manufacturing WPA3 Printing Flexibility Batteries Downloads Mobile Transportation Spyware Avoiding Downtime Cyber security Black Friday Spam Botnet Cameras Tech Terms Disaster Touchscreen Hosted Solution Return on Investment Staff Cache Personal Information Work/Life Balance Smart Devices Chatbots Politics Human Error Employer/Employee Relationships Licensing Twitter Digitize Star Wars Automobile Features Tech Support How To Money Authorization Hard Disk Drives Customer Service Computers Credit Cards Superfish Nanotechnology Public Cloud Information Technology Maintenance Websites Scalability Virus History Students Social Network Cyber Monday Regulation Machine Learning Physical Security Theft Legal Hacker User Error Gmail Mobile Security Identity Theft WIndows Chromebook Law Enforcement Sensors Identity Webcam Permission Software Tips Shadow IT App WiFi Quick Tips Wasting Time IT Technicians Solid State Drives Google Maps Wireless USB Holidays Screen Reader Apps ROI IBM Crowdsourcing Teamwork Supercomputer CrashOverride Hard Drives Office CCTV PDF Financial Bitcoin Tip of the week Notifications Printer Augmented Reality Hotspot eWaste Sync YouTube Payment Cards Mouse Development Point of Sale Windows 10 Test Database Management IT Management Video Games Processors Outsourcing GPS iPhone Database Value of Managed Services Google Calendar Mirgation Enterprise Content Management Gadget Cybercrime Thank You Options Firefox IT Networking Microsoft Excel Smart Tech OneNote Cleaning Text Messaging Notes Corporate Profile Bluetooth Instant Messaging Shared resources IT Budget Emergency Distributed Denial of Service Modem Relocation Taxes Google Drive Hard Disk Drive Heating/Cooling Hacks Language Mobile Device Managment Settings Emoji Virtual Private Network Comparison Advertising GDPR Cabling Time Management Alert Current Events Alerts Encryption Tracking Health Read Only Managed Services Outlook Legislation Bring Your Own Device Office 365 Congratulations Users 5G User Tips Connectivity Employee-Employer Relationship Computer Care Office tips Managed Services Provider PowerPoint WannaCry Avoid Downtime Virtual Reality Finance OneDrive Tablet How To Business Growth Optimization Managed IT Service Website Private Cloud IT Consultant Security Cameras Servers Data Storage SharePoint Wearable Technology Computing Infrastructure Printers Digital Computing Specifications Web Server Electronic Medical Records Network Management Samsung Projects Cooperation Administrator HaaS Workplace Tips Vendor Shortcut Motion Sickness Facebook Wireless Internet Big Data Black Market IT Assessment Blockchain Staffing Social E-Commerce Monitors Update G Suite Search Authentication Apple IT Service Virtual Machines Lenovo Break Fix Cookies Error Education Server Management Telephone Systems HIPAA