Understanding and Avoiding Rogue Websites Like Dragonorders.com
The internet is filled with various websites offering a wide range of content and services. While most websites are legitimate…
Understanding and Resolving Error 49244 on Mac
Mac computers are renowned for their reliability and performance, but like any technology, they are not immune to errors and…
ITFunk Archives: Will World War 3 be a Cyberwar?
Malware attacks against digital voting booths, weapons systems and critical infrastructure. Have the seeds already been sewn for a catastrophic…
Cyber Threats and Homeschooling: How can we keep our kids safe while they’re learning online
Prior to COVID-19, children spent most of the day at school. That’s where many were first introduced to Internet safety…
ITFunk Archives: The Threats Targeting Your Home Office
Cyber attacks against telecommuters are on the rise. As more of us begin working from home, what can we do…
Is the Government Sponsoring Phishing Attacks via NetWalker?
Google is warning users of an increase in government-sponsored phishing attacks using NetWalker ransomware during the COVID-19 pandemic With people…
LokiBot Information Stealer
In a new twist, ransomware scammers are fooling victims with emails purporting to be associated with business continuity plans amid…
ITFunk Archives: REvil Attacks a Law Firm
The hacking group REvil attacks a law firm with a client base that includes Elton John, Robert DeNiro and Madonna…
Sarwent Malware: Unmasking the Threat
A new version of Sarwent malware can open Remote Desktop Protocol ports, giving hackers hands-on access to victims' computer When…
Tycoon Ransomware: A Comprehensive Overview of the Threat
Recent reports show another ransomware going after PC's loaded with the Windows and Linux operating systems in what appears to…