Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Workplace Tips Computer Privacy Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Microsoft Data Backup Small Business Communication Mobile Device Smartphones Business Management Mobile Devices communications Android Workplace Strategy Saving Money Smartphone VoIP Managed IT Services Data Recovery Managed Service Microsoft Office Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Internet of Things Tech Term Automation Artificial Intelligence Cloud Computing Covid-19 Remote Remote Work Server Managed Service Provider Facebook Miscellaneous Windows Gadgets Encryption Spam Outsourced IT Information Holiday Employee/Employer Relationship Windows 10 Government Business Continuity Data Management Current Events Blockchain Wi-Fi Productivity Business Technology Windows 10 Compliance Virtualization Data Security Apps Two-factor Authentication Bandwidth Apple Networking App Employer-Employee Relationship Vendor Office Mobile Device Management Chrome Managed Services Budget Voice over Internet Protocol Gmail How To BDR Computing Applications Information Technology Hacker Avoiding Downtime Access Control Mobile Office Office 365 Conferencing Managed IT Services WiFi Big Data AI Operating System BYOD HIPAA Router Computers Virtual Private Network Risk Management Training Health Website Marketing Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device The Internet of Things Free Resource Cooperation Project Management Social Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring IT Support Tip of the week Excel Document Management Firewall Remote Workers Telephone Scam Data loss Entertainment Vulnerabilities Administration Data Privacy Images 101 Multi-Factor Authentication Telephone System Mobility Robot Cost Management Settings Printing Customer Relationship Management Wireless Content Filtering IT Management Employees VPN YouTube Meetings Hacking Integration Cryptocurrency Presentation User Tip Modem Computer Repair Mobile Security Processor Wireless Technology Holidays Virtual Desktop LiFi Data storage 2FA Data Storage Smart Technology Supply Chain Video Conferencing Outlook Word Managed Services Provider Machine Learning Virtual Machines Money Saving Time Professional Services Humor Managed IT Service Maintenance Antivirus Sports Downloads Safety Mouse iPhone Licensing Telework Cyber security Mobile Computing Social Network Tech Human Resources Multi-Factor Security Search Dark Web CES Communitications Cables Tablet IoT Best Practice Trends Alert Supply Chain Management FinTech Managed IT Customer Resource management Term Google Apps Buisness File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Application IT Assessment Legal Data Analysis IT Maintenance IT solutions Star Wars Value Business Intelligence Business Growth Gamification Notifications Staff Flexibility Organization Shortcuts Travel Social Networking IBM Legislation Cortana Digital Security Cameras Smart Devices Techology Fileless Malware Ransmoware Google Maps Memory Vendors Alt Codes Content Wearable Technology Remote Working Data Breach Health IT Google Play Be Proactive Downtime Unified Threat Management Motherboard Comparison Hosted Solution Assessment Permissions Videos Electronic Health Records Unified Threat Management Directions Workforce Wasting Time Threats Typing Competition Network Congestion Specifications Trend Micro Security Cameras Workplace Strategies Internet Exlporer Knowledge Physical Security Fraud Software as a Service Google Drive User Error Microchip Meta Managing Costs Amazon Username 5G Black Friday User eCommerce SSID Point of Sale Unified Communications Database Experience Surveillance Google Docs Virtual Assistant Outsource IT Virtual Machine Environment Bitcoin Network Management Media Running Cable Tech Support IT Technicians Monitors Cyber Monday Reviews Google Wallet Proxy Server Medical IT Cookies IP Address Tactics Hotspot Development Transportation Small Businesses Hypervisor Displays Windows 8 Laptop Websites Mirgation Shopping Recovery Optimization Drones PowerPoint Nanotechnology Addiction Electronic Medical Records Language Hard Drives SharePoint Employer/Employee Relationships Outsourcing Management Navigation Halloween Chatbots Domains PCI DSS Writing Distributed Denial of Service Gig Economy Lenovo Workplace Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Refrigeration Internet Service Provider Teamwork Hiring/Firing Hacks Server Management Evernote Paperless Scary Stories Private Cloud Identity Public Speaking Regulations Compliance Lithium-ion battery Fun Memes Superfish Bookmark Co-managed IT Identity Theft Smart Tech Deep Learning Download Twitter Alerts Net Neutrality Entrepreneur SQL Server Technology Care Financial Data History Business Communications Error Social Engineering Break Fix Smartwatch IT Browsers Scams Education Connectivity Azure Hybrid Work Upload Remote Computing Undo Procurement

Blog Archive