From Safety.com. On Monday we shared the beginning of this article by Emily Ferron.
Internet Safety Tips from the Experts
JUN
From Safety.com. On Monday we shared the beginning of this article by Emily Ferron.
Are some common cybersecurity terms racist? Is the personal computer world being attacked by the politically correct world? It seems that’s the accusation being leveled against the terms “blacklist” and “whitelist.”
In a recent post, the United Kingdom’s National Cyber Security Centre (NCSC) announced that it is changing the way it talks about the good and the bad in ...
Continue Reading →The Love Bug virus is 20 years old. It was also known as ILOVEYOU because it spewed itself out in emails with those three words, jammed together as one, in the subject line. This was one of the first mass mailing worms ...
Continue Reading →The video conferencing application Zoom has had it’s share of security related problems lately. Any time they name a cyber-attack after you (Zoom bombing) it’s bound to be a bad thing. Zoom bombing, if you haven’t heard, is the video conference equivalent of photo bombing. Some miscreant sneaks into your meeting and takes over the screen to share some NSFW imagery or hate speech or cat videos. Zoom meeting videos have ...
Continue Reading →Here we are stuck in the middle of the COVID-19 pandemic. If you are working in Information Technology, then you are part of the Critical Infrastructure of this country.
Most of the tech support and cybersecurity peers I have been talking with over the last month have been pretty busy deploying Work From Home (WFM) solutions. But if you are getting to a place where the demand for your services is ...
Continue Reading →Even though the Linux operating system is somewhat more secure than either Windows or even the allegedly “hacker-proof” Mac operating systems, and considerably less expensive to use, it has never been taken up by a significant number or average, every-day users.
Linux has always suffered a bit from being a DIY operating system, with a reputation for requiring some major computer chops ...
Continue Reading →The FBI’s 2019 Internet Crime Report, came out February 25. Email account hijacking, or Business Email Compromise (BEC) is the top money maker for cyber-criminal groups, earning them an estimated $1.776 BILLION with a B. CEOs of companies are top targets for this exploit, and usually it begins with a phishing email.
Even though ransomware is the big noisy topic, in terms of dollar losses, it is not even in the top ten, although a lot of expenses and costs ...
Continue Reading →The heart of a good scam is pretending to be someone you are not. This form of social engineering is known as the impostor scam or impersonation scam. Impostors can take different forms, and may show up on a phone call, or as an email from a trusted friend or family member, business associate, customer or coworker. Often ...
Continue Reading →When a scammer gets your money, it is usually gone for good. There are many ways that scammers use to receive payments from their victims, and often they will use methods that are unusual, such as gift cards, bitcoin, or other currency substitutes.
Today I will describe the different payment methods, and what advantages they offer the scammer. What ...
Continue Reading →Have you fallen for an online or telephone scam? How much money did you lose? I’ve personally known of two cases where the amount lost was $500 and $16,000, but scammers often get more.
If you are above the age of 55, you most certainly have been targeted by telephone callers and cyber-scammers, and received emails, text messages, Facebook ...
Continue Reading →