It may surprise you to know that ransomware uses geolocation tech to now customize payloads and then target individuals.  Geolocation – for those that don’t know – obtains an approximate location of a connection by referencing a devices IP address against several databases. Those databases are maintained by Internet Service Providers as wellRead More →