Seltek

Don’t Be a Victim of Whaling

Anyone can be a victim of a cyber fraud attack, including senior executives.  A “whaling” attack is where cyber criminals attempt to “harpoon” an executive, often CEOs and CFOs, and steal log-in credentials.  In the event their attack proves successful, Learn more
Top Cybersecurity Threats

Top Cybersecurity Threats

What are the Top Cybersecurity Threats For the Near Future? Social Engineering Attacks are how hackers and data thieves cleverly access your secure information through phishing, impersonating other companies and people, and other common tactics.  It is estimated that phishing Learn more
Eavesdropping on Smartphones

Eavesdropping on Smartphones

We are often asked to examine a smartphone that the user believes has software on it that allows activity, such as calls and texts, to be monitored remotely.  Our first question to the user is, “has anyone had physical access Learn more
Computer Fraud Rising

Computer Fraud Rising

  Seltek receives many emails each week from clients asking if a  received call or email is real. Recently, we have noticed an increase in two specific types of computer fraud.   The first is a call from a fake computer Learn more
IoT Impact on  Digital Forensics

IoT Impact on Digital Forensics

The Internet of Things (IoT) is a system of interrelated computing devices and digital objects that are provided with unique identifiers and the ability to transfer data over a network without requiring direct communication between a person and computer.  The growing Learn more