M.A. Polce

Phishing

Phishing

An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

New .zip Top-Level Domain Used In Phishing Attacks

Recently, Google introduced eight new top-level domains available for purchase, including .zip. However, cybersecurity experts are concerned about the potential for malicious activity with this TLD. The similarity to the…

SECURITY HINTS & TIPS: The Dangers of Using Messaging Apps on Work Devices

Messaging apps such as WhatsApp, Discord, and WeChat are a great way to keep in touch with friends and family. But not all messaging apps are safe to use on…
Red key on a keyboard that reads personal information.

SCAM OF THE WEEK: Callback Phishing Scams

The Dangers of Callback Phishing Scams While making a phone call may seem harmless, you should always consider who's on the other end of the line. Cybercriminals can use callback…

M.A. Polce’s IT Threat Glossary

M.A. Polce Consulting’s IT Threat Glossary Understand what threats are in store for your business. The Internet can be a dangerous place, especially now that hackers are taking advantage of…

Phishing – How Many Ways Can You Be Baited?

Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent transactions, or to trick someone into downloading malware. According…

Download the "How Strong is Your Cybersecurity Culture?" Checklist!

Name(Required)