I stumbled across this one night and very glad I found it. Hopefully it can help you as well. Adobe has the capability to read to you!!!! Don’t believe me, here it is straight from Adobe. This article can be found at http://www.adobe.com/products/acrobat/tutorials/acr6araccessibility.html.
Category Archives: Records
New SpearPhishing Activity – Bogus NATO Messages
Reports have been received reports of malicious messages appearing to originate from NATO. These bogus e-mail’s contain hyperlinks directing the recipient to “additional information” regarding current operations in Africa. Once accessed, these links download Malware that could compromise the victim’s workstation; and by extension, the network. Ensure you have the proper countermeasues in place toContinue reading “New SpearPhishing Activity – Bogus NATO Messages”
Lock It down!
Hackers usually leave a “back-door” program in your computer which allows them to control your computer and attack other computers on the network. If this happens, you will lose your network connection until you “clean-up” your computer.
