Overview Malware has been detected from a company called Red Canary. The malware has been tracked since September 2021 and has infected company computer networks. Infection The malware is stored on an infected USB drive and contains a malicious .LNK file. Once the drive is plugged in to your computer it will run a process …
10 Steps To Identify A Phishing Email
Phishing emails are dangerous and can give us major headaches if we become a victim to one of their campaigns. In order to combat the frequency of such attacks, Jellie Tech has made a quick list of 10 identifying marks of a phishing email. Step Number 1: Verify the sender email address Phishing emails may …
Malware: A Discussion – Part 3
Part 3: What To Do If You Have Malware On Your Device Already in our discussion we have considered what malware is and how you can protect yourself. Keeping a watchful eye on your system is always the first step to keeping safe. View yourself as your device's first firewall. Even with our best efforts …
Malware: A Discussion – Part 2
Part 2: How To Protect Yourself From Malware If you hate spam and phishing then this article is for you. No, we are not talking about artificial meat or putting bait on hooks. Spam and Phishing are common tactics hackers will use to harm your device. As we discussed in our previous topic, malware is …
Malware: A Discussion – Part 1
Part 1: What is it? In its most simple terms, Malware is software that make its way on to your device with the intent to disrupt your device's normal operation. The severest forms of Malware can damage or destroy your computer or cyber criminals can use Malware to steal your private data. Like human illnesses, …
