Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade VoIP AI Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Information Automation Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Encryption Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Data Security Two-factor Authentication Apps Mobile Office Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome BYOD Budget Apple Mobile Device Management Tip of the week App Gmail Networking BDR Office 365 Hacker Avoiding Downtime HIPAA Marketing Access Control Applications WiFi Computing Conferencing Information Technology How To Analytics Office Tips Computers Augmented Reality Healthcare Storage Virtual Private Network Password Website Bring Your Own Device Router Health 2FA Help Desk Retail Operating System Big Data Risk Management Managed IT Services Patch Management Save Money Remote Monitoring Customer Service Cooperation Vulnerability Remote Workers End of Support Vendor Management Physical Security Display Free Resource Printer Project Management Windows 11 Paperless Office Windows 7 Infrastructure Microsoft 365 Firewall Excel Going Green Solutions Document Management Monitoring The Internet of Things Cybercrime Scam Data loss Social Telephone Virtual Desktop Video Conferencing Customer Relationship Management Licensing Data storage Managed Services Provider LiFi Virtual Machines Robot Professional Services Entertainment Outlook Hacking Presentation Money IT Management Humor Telephone System VPN Meetings iPhone Wireless Technology Cost Management Sports Vulnerabilities Computer Repair Mouse Images 101 Word Administration Multi-Factor Authentication Mobility Supply Chain User Tip Modem Mobile Security Processor Machine Learning Settings Employees Safety Printing Integration Wireless Smart Technology Content Filtering Maintenance Antivirus YouTube Saving Time Holidays Cryptocurrency Managed IT Service Data Storage Data Privacy Downloads Google Wallet Employer/Employee Relationships IT Maintenance Browsers Connectivity Break Fix How To PCI DSS Notifications Business Intelligence Navigation Upload Shortcuts Laptop Social Network Gig Economy Travel Multi-Factor Security Windows 8 Drones Teamwork Ransmoware Techology IoT Google Maps Internet Service Provider Competition Dark Web Trends Regulations Compliance Vendors Evernote Be Proactive Halloween Customer Resource management Regulations Unified Threat Management Memes Google Calendar Microsoft Excel SQL Server Workforce Data Analysis Unified Threat Management Star Wars Net Neutrality Gamification Financial Data Staff History User Threats Workplace Strategies Scary Stories Smartwatch Social Networking IT Legislation Network Congestion Hacks Azure Meta Fileless Malware User Error Fun Procurement Content Telework IP Address Wearable Technology Cyber security Amazon Deep Learning Tech Health IT CES Motherboard Point of Sale Communitications Comparison Permissions Outsource IT Education Directions Assessment Supply Chain Management Network Management FinTech Tech Support Recovery Environment Term Media IT Assessment Hard Drives Specifications Monitors Mobile Computing Flexibility Domains Fraud Value Small Businesses Microchip Search Internet Exlporer Username Organization Websites Displays Best Practice Buisness Digital Security Cameras Smart Devices Refrigeration Black Friday Remote Working Public Speaking Electronic Medical Records Legal Memory Outsourcing IT solutions SharePoint Database Lithium-ion battery IT Technicians Data Breach Business Growth Google Play Entrepreneur Workplace Proxy Server Lenovo Videos Cookies Electronic Health Records Cyber Monday Writing Hotspot Virtual Reality Wasting Time Hiring/Firing Cortana Tactics Server Management Mirgation Private Cloud Trend Micro Alt Codes Security Cameras Paperless Co-managed IT Downtime Superfish Nanotechnology Identity Theft Software as a Service Undo Language Twitter Managing Costs Technology Care Hosted Solution Addiction Management Chatbots Error eCommerce Typing SSID Business Communications Virtual Assistant Scams Screen Reader Surveillance Distributed Denial of Service Social Engineering Computing Infrastructure Remote Computing Google Drive Virtual Machine Hybrid Work Knowledge Service Level Agreement Human Resources Reviews Identity Application Medical IT Transportation Cables Bookmark 5G Smart Tech Tablet Development IBM Alerts Alert Google Docs Hypervisor Unified Communications Experience Download Google Apps Running Cable Managed IT Shopping File Sharing Optimization Dark Data Bitcoin PowerPoint

Blog Archive