This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

jcrawford

About Jamie Crawford

This author has not yet filled in any details.
So far Jamie Crawford has created 64 blog entries.

Scam Of The Week: New FBI and IRS Alerts Against W-2 Phishing

By | March 21st, 2017|Categories: Uncategorized|

This year, authorities are warning about a massive wave of W-2 tax form phishing scams. Cyber criminals are sending "spoofed" emails that look like they come from the CEO or another C-level executive and ask for a PDF with the W-2 tax information of all employees. The W-2's have all the information needed to file [...]

New Scam of the Week – Valentine’s Day Scams

By | February 13th, 2017|Categories: Cyber Security|Tags: , , |

It's Valentine's Day and the scammers are out in full force... again. There are many ways these online criminals try to trick you, but the most common are phony florists, online dating scams, phony electronic greeting cards and delivery scams. So, here are the red flags you need to look out for. Do not trust emails or [...]

Scary Double-Ransomware

By | December 12th, 2016|Categories: Cyber Security|Tags: , |

Sophos reported on one of the more scary ransomware strains we have seen lately. It's called Goldeneye and encrypts the workstation twice: both the files and the Master File Table (MFT). It's a phishing attack with two attachments. One is a PDF and the other an Excel file. The Excel file contains a loader that [...]

Fake News: A Content-Based Social Engineering Attack

By | November 28th, 2016|Categories: Cyber Security|Tags: |

Facebook, Google, and Twitter have recently been accused of promoting fake news stories. Depending on your sources and who you believe, fake news played a role in the 2016 presidential election. However, fake news is misused in a number of ways: Propaganda, trying to influence opinion Direct attacks on a political opponent Stock manipulation scams [...]

5 Ways to Shop Smart on Cyber Monday

By | November 28th, 2016|Categories: Cyber Security|Tags: |

Happy Cyber Monday! Today is a great day to find savings, deals and specials on your favorite e-commerce sites and outlets. And while it’s hopefully a bit less hectic than Black Friday, it’s important to make sure you’re being careful when browsing and buying via the web—and doing everything you can to protect yourself from [...]

Watch Out For Fake Apps!

By | November 12th, 2016|Categories: Cyber Security, Mobile|

The holidays are here and the scammers are out in force. Their latest trick is fake apps. Starbucks started the first "retail app" and many stores have followed. But scammers are now creating fake apps, trick you into downloading them to your smartphone or tablet, and ask you to load your credit card information in [...]

The Dangers of Sharing Your Life on Social Media

By | November 8th, 2016|Categories: Cyber Security|

A security researcher decided to see how hard it would be to create a targeted phishing attack on a total stranger. He went to Facebook and found a guy he did not know personally and found a wealth of information, including: He visited Tapley’s Pub in Whistler, British Columbia, on Sept. 20. He visited The [...]

Microsoft Announces Major Patching Changes

By | November 4th, 2016|Categories: Windows|Tags: , , , |

Microsoft has recently updated their decades-old standard patching process, which amounts to what some have called a “seismic” shift in the process. Now, windows patches will be deployed in a cumulative patch, without giving users the option to select and choose (or reject) individual patches throughout the process. Stay tuned to our blog for more [...]