Search Results for "Fake Tech Support"


  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources.  Falling Chinese Space Station Sometime around April 3—give or take about a week—China’s 9.5-ton Tiangong-1 space station will fall out of orbit and enter Earth’s atmosphere. While media reports for the last few ...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Robot Gains Saudi Citizenship From the Smithsonian.  Last week, Saudi Arabia, became the first in the world to grant citizenship to a robot during a technological summit held in its capital. Sophia, created by Hanson Rob...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Today is Veterans Day – Thanks for Your Service Veteran’s day is a remembrance of all U.S. military veterans – past and present. It is celebrated every November 11th, and has been a federal holiday since 1926. ...
  • Latvian Cyber Crook Extradited for 2010 Star Tribune Malvertising Exploit
    Back in February 2010, the Minneapolis StarTribune website was the victim of a malvertising exploit.  Visitors to the Strib website would download malware that caused the computer to become slow and malfunction.  Then a pop-up window would appear that advised the visitor that their computer was in...
  • What About LinkedIn Scams?
    On Wednesday we took a look at Facebook scams.  But what about LinkedIn?  Because of LinkedIn’s professional focus, the scams are a little different, but use many of the same tactics.  LinkedIn scams are more likely to draw on information from your professional profile, and tend to be emplo...
  • Junkin’ Jack Flash
    Adobe’s Flash program has been a security nightmare. A favorite among malware writers for ages, Flash is useful for doing things like creating fake security pop-up alerts and conning computer users into buying security programs that don’t work and carry malicious content.  And it seems...
  • Top Cybersecurity Threats in 2015
    The cybersecurity threat surface is constantly changing.  Below are listed the top areas of concern among cybersecurity experts.  Some are new, and some have been around seemingly forever. New Threats Emerging technologies and the Internet of Things (IoT).  It seems that all of our new toys are ...
  • Sunday Funnies – Why You Have Computer Problems
    This is from Computerworld Shark Tank, which I read daily.  These are funny stories about computer users from an IT perspective.  Normally I have not shared these funny stories with my readers because this is a bit of IT “inside baseball.”  Plus you might just recognize yourself in th...
  • Beware Pop-Up Security Alert Scam
    I have been getting a lot of calls about this one, and I finally was able to get a screen print of the message.  When this happens to you – DO NOT CALL the provided number.  You will end up allowing them to connect remotely and then they will convince you to spend $300 to fix the problem.  ...
  • Manual Account Hijacking: When It Gets Personal
    The vast majority of account hijacking attempts are an automated variety running on botnets.  Recently Google released a whitepaper that takes a look at a less common, but more damaging threat – manual account hijacking.  The distinction here is that the affected account is hijacked by a...
Page 10 of 11 «...7891011