top of page
  • Writer's pictureCastlecomputer

๐ƒ๐ž๐ฏ๐ข๐ฅ ๐ข๐ง๐ฌ๐ข๐๐ž, ๐ญ๐ก๐ž ๐๐ž๐ฏ๐ข๐ฅ ๐ข๐ง๐ฌ๐ข๐๐ž

A common tactic hackers use is to send an email with an attachment disguised as an invoice or receipt. These attachments usually have a malicious script that downloads and runs malware on your computer.

Do NOT open any attachments unless you are expecting it. If you get an email with attachment from someone you know but you werenโ€™t expecting it, contact them to make sure they sent it.

8 views0 comments

Recent Posts

See All

Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you canโ€™t read an article on cybersecurity without it coming up. Thatโ€™s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal

Bรฌnh luแบญn

bottom of page