Seltek

Juice Hacking: Hacking in Plain Sight

Juice Hacking: Hacking in Plain Sight

What is “Juice Jacking”? Written by James Overby, Seltek IT Intern “Juice Jacking,” also known as “Juice Filming,” is a type of cyber-attack introduced within the past 5 years, involving cell phone chargers that serve as a data connection for Learn more
Computer Buying Tips for your High School Grad

Computer Buying Tips for your High School Grad

  COMPUTER BUYING TIPS It’s that time of year, seniors everywhere are preparing for graduation.  Congratulations to the Class of 2019! Along with celebrations, many Moms and Dads (and seniors) are starting to look at what kind of computer is Learn more
Microsoft Ending Support for Windows 7

Microsoft Ending Support for Windows 7

MICROSOFT ENDING SUPPORT FOR WINDOWS 7 by Juanita Nester, IT Support Specialist Someone once said, “All good things must come to an end,” and that applies to technology too. After January 14, 2020, Microsoft will no longer provide security updates Learn more
Cyber Security: How Do I Protect My Business From a Data Breach

Cyber Security: How Do I Protect My Business From a Data Breach

CYBER SECURITY: HOW DO I PROTECT MY BUSINESS FROM A DATA BREACH By Patrick Logan, President and Certified Computer Examiner What is Cyber Security? Cyber Security (or Data Security) concerns the protection of data from accidental or intentional, but unauthorized Learn more
Why Digital Forensics Matters to You

Why Digital Forensics Matters to You

WHAT IS DIGITAL FORENSICS? Digital Forensics can be defined as the investigation, recovery and analysis of data and evidence within digital devices (computers, smartphones, etc.).  Digital forensic investigations should only be performed by trained and certified examiners who can ensure Learn more
Don’t Be a Victim of Whaling

Don’t Be a Victim of Whaling

Anyone can be a victim of a cyber fraud attack, including senior executives.  A “whaling” attack is where cyber criminals attempt to “harpoon” an executive, often CEOs and CFOs, and steal log-in credentials.  In the event their attack proves successful, Learn more
Top Cybersecurity Threats

Top Cybersecurity Threats

What are the Top Cybersecurity Threats For the Near Future? Social Engineering Attacks are how hackers and data thieves cleverly access your secure information through phishing, impersonating other companies and people, and other common tactics.  It is estimated that phishing Learn more
Eavesdropping on Smartphones

Eavesdropping on Smartphones

We are often asked to examine a smartphone that the user believes has software on it that allows activity, such as calls and texts, to be monitored remotely.  Our first question to the user is, “has anyone had physical access Learn more
Computer Fraud Rising

Computer Fraud Rising

  Seltek receives many emails each week from clients asking if a  received call or email is real. Recently, we have noticed an increase in two specific types of computer fraud.   The first is a call from a fake computer Learn more
IoT Impact on  Digital Forensics

IoT Impact on Digital Forensics

The Internet of Things (IoT) is a system of interrelated computing devices and digital objects that are provided with unique identifiers and the ability to transfer data over a network without requiring direct communication between a person and computer.  The growing Learn more