Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Covid-19 Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Vendor Two-factor Authentication Apps Data Security Mobile Office BYOD Gmail Tip of the week Employer-Employee Relationship Chrome Budget Networking Apple Managed Services App Voice over Internet Protocol Mobile Device Management Computing HIPAA Information Technology WiFi Applications Access Control Office 365 Conferencing Hacker Avoiding Downtime How To BDR Marketing Operating System Virtual Private Network Risk Management Router Big Data Health 2FA Office Tips Analytics Augmented Reality Help Desk Retail Storage Password Computers Bring Your Own Device Managed IT Services Website Healthcare Firewall Vendor Management Cybercrime Free Resource Project Management Physical Security Windows 7 Display Printer The Internet of Things Microsoft 365 Paperless Office Windows 11 Infrastructure Solutions Social Excel Monitoring Document Management Customer Service Scam Data loss Telephone Remote Workers Cooperation Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Content Filtering Telephone System Vulnerabilities Cost Management IT Management VPN Meetings YouTube Images 101 Cryptocurrency Safety Multi-Factor Authentication Mobility Computer Repair Virtual Desktop User Tip Modem Data storage LiFi Mobile Security Processor Supply Chain Outlook Employees Machine Learning Integration Money Customer Relationship Management Humor Smart Technology Holidays Saving Time Maintenance Sports Hacking Antivirus Mouse Data Storage Presentation Managed IT Service Video Conferencing Managed Services Provider Downloads Administration Wireless Technology Data Privacy Virtual Machines Professional Services Licensing Entertainment Robot Word Settings iPhone Printing Wireless Workforce Cyber security Unified Threat Management Tech Social Networking Legislation Telework Hosted Solution Public Speaking CES Typing Lithium-ion battery Threats Communitications Fileless Malware Content Wearable Technology Network Congestion Supply Chain Management Workplace Strategies Entrepreneur Meta Knowledge Health IT User Error Term Motherboard Google Drive Comparison FinTech Permissions Amazon IT Assessment Directions Assessment Point of Sale Flexibility Undo Value 5G Outsource IT Experience Google Docs Specifications Organization Unified Communications Fraud Tech Support Digital Security Cameras Bitcoin Environment Smart Devices Running Cable Microchip Media Internet Exlporer Network Management Username Google Wallet Monitors Remote Working Memory Small Businesses Data Breach Google Play Black Friday Websites Videos Windows 8 Displays Electronic Health Records Laptop Application Database IT Technicians Drones Wasting Time IBM Outsourcing Trend Micro Proxy Server SharePoint Security Cameras Cookies Cyber Monday Electronic Medical Records Hotspot Software as a Service Halloween Tactics Lenovo Mirgation Writing Workplace Managing Costs Hiring/Firing eCommerce SSID Nanotechnology Virtual Reality Language Private Cloud Hacks Surveillance Scary Stories Paperless Virtual Assistant Addiction Server Management Virtual Machine Fun Management Superfish Chatbots Identity Theft Competition Co-managed IT Reviews Deep Learning Technology Care Medical IT Screen Reader Distributed Denial of Service Twitter Computing Infrastructure Error Development Business Communications Transportation Service Level Agreement Hypervisor Identity Social Engineering Education Scams Shopping Hybrid Work Optimization User Bookmark PowerPoint Smart Tech Remote Computing Alerts Mobile Computing Human Resources Employer/Employee Relationships Download Search Navigation Tablet PCI DSS Cables Gig Economy Best Practice IP Address Browsers Connectivity Break Fix Alert File Sharing Dark Data Internet Service Provider Buisness Google Apps Teamwork Upload Managed IT IT Maintenance Social Network Evernote Legal Multi-Factor Security How To Regulations Compliance IT solutions Business Growth Business Intelligence Memes Recovery IoT Dark Web Notifications Travel Net Neutrality Hard Drives Shortcuts SQL Server Trends Ransmoware History Cortana Customer Resource management Techology Regulations Google Maps Google Calendar Financial Data Domains Smartwatch Alt Codes Vendors IT Data Analysis Star Wars Microsoft Excel Staff Unified Threat Management Procurement Downtime Refrigeration Be Proactive Azure Gamification

Blog Archive