Search Results for "Fake Tech Support"


  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day:  Google Privacy Check-up Chef’s Special: Blocked Message WyzMail Spoofing Phish Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspiciou...
  • Robocalls At All-Time High – Is There Any Relief?
    I hate robocalls.  I got rid on my land line phone because the ONLY people who called me on it were robocallers, fraudsters, and political campaigns (more fraudsters?). Now up to 80% of my cellular phone calls are robocalls.  If it seems that there are more robocalls then ever, this is not an illu...
  • Don’t Get Emotional!
    Social engineers have many tricks up their sleeves, and we have covered many of them in previous articles.  The biggest trick is phishing emails, of course, coupled with replica landing pages on hijacked websites.  Other methods include phone calls, such as fake tech support calls.  There are tex...
  • Top Cyber-Attack Vectors – Past, Present, and Future
    Are you wondering what exploits represent the biggest threats in 2019?  It can be difficult and expensive to defend against everything.  If your company is budget-constrained, it may make more sense to defend against what is “likely” instead of everything that is “possible.”...
  • Six Simple Malware Removal Tips Anyone Can Use
    You think you just got a malware infection on your computer, but you’re not sure, and you aren’t sure what to do.  Take it to the Geek Squad or another qualified IT shop?  If only there were simple things you could try on your own.  The good news is there are, and we will show you som...
  • Should I Report My Cyber-Crime To the Cops?
    If you have been the victim of a ransomware scam, or fake tech support scam, or other computer incident, intrusion, or breach, you may be wondering if you should report it to the police. If you report your crime to the police, it is unlikely that it is going to be solved and the perpetrator arrested...
  • What About Security Warnings?
    A recent article from Naked Security said that people ignore legitimate security warnings on their computer a whopping 87% of the time.  But on the flip side, I know from experience that a good percentage of people will fall for a pop-up of the fake tech support variety all too often. What is goin...
  • Mac Users Targeted By Cyber-Attackers
    The Apple OSX platform has long held the cache of being invulnerable to attack.  Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012.  The reason for this, as explored in a recent article on SiliconBeat, is that Apple users tend to have more dis...
  • Does Your Computer Have A Malware Infection?
    Today we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection. Visual Symptoms These are signs that you will see on your computer display, and are the most obvious symptoms. Ransomware  – The last stage of a ransomware or cryptowa...
  • Cybersecurity Awareness Training
    Last week we took an in depth look at social engineering, and looked a phone and email examples in depth. Cybersecurity awareness training is one of the most effective ways to combat these threats. Not everyone engaged in cybersecurity practice agrees about the effectiveness of this solution, but I...
Page 2 of 11 12345...»