3aIT Blog

We have seen an uptick of email from unknown sources with PDF attachments of late. It is worth restating that you should be very wary of ANY email from an unknown source regardless of the content. Attempts to compromise machines via email come in many forms. Most frequently, this will either be via a zip attachment, or a link to a malicious website. However, the people engineering these emails know that awareness of attacks in this form is increasing, so are always on the lookout for new ways to trick people into compromising their machines. This recent spate of emails fall into that category.

Having worked in the IT support business for many years, we get all sorts of IT problems to deal with. While these issues are sometimes complex, there's a few things that any computer user can do before having to pick up that phone and contact your IT support team of choice.

Subscribe to our newsletter

Sign up to receive a monthly roundup of our best blogs and latest news.
Fields marked with * are required

Archives