Maybe the ******* was a disgruntled employee who intentionally clicked on the link???The ******* that clicked on that malware link should probably update his LinkedIn account. I'm betting they're looking for a job real soon!
Exactly. Then again, have you used Garmin software?Why would not a large operation like Garmin have a system in which all emails that have attachments are checked for malware before being forwarded to an employee?
Why would not a large operation like Garmin have a protected back-up of all their important software and data?
For the same reason my 590 LM behaves as if it is running on beta software. Like what Carver said.Why would not a large operation like Garmin have a system in which all emails that have attachments are checked for malware before being forwarded to an employee?
Why would not a large operation like Garmin have a protected back-up of all their important software and data?
Ouch. That's entirely possible. That would be more along the line of criminal activity though by the employee. They would have had to have known what the link contained in order to exact their revenge. If there is any suspicion of that happening that person is about to have a microscope up their ***.Maybe the ******* was a disgruntled employee who intentionally clicked on the link???
The 10 million is easier to do...Perhaps instead of 10 million in bitcoin the datanappers would settle for a user friendly version of Basecamp?
Enter your email address to join: