How Tooltips Are Being Used For Phishing

It’s important that you understand how tooltips are being used for phishing. First, I’ll explain terms and then I’ll outline the phishing process being used. Definitions Tooltips Are you familiar with the term tooltip? You probably see them all the time when you use a computing device but you might not know the term. Let’s …

Continue reading How Tooltips Are Being Used For Phishing

Social Engineering

Social Engineering is the number one way hackers break into computer systems and networks. As I explain in my blog post, Social Engineering: The Weakest Link In The Chain, the person operating a computing device is the weakest link in the security chain. Someone will click on a phishing email or be tricked into allowing …

Continue reading Social Engineering

No More Microsoft Passwords

Finally, no more Microsoft passwords! Yes, you read that correctly. You can now delete your Microsoft password forever! Password Troubles Over the years, one of the most aggravating aspects of computer usage has been passwords. Let’s see if you can relate to any of these password troubles: You forgot your password. Your password was lost. …

Continue reading No More Microsoft Passwords

How To Avoid Smishing Scams

I suppose that before I explain how to avoid smishing scams, it might help to understand the meaning of the word “smishing.” Basically, smishing is phishing through text rather than email. All clear now? That definition works fine if you understand what phishing is. Okay, let’s go to the Mirriam-Webster dictionary to find out the …

Continue reading How To Avoid Smishing Scams

Security Notifications

June 19, 2021 Hackers Use Google Doc For Phishing If you use Google Docs, you need to be aware of a new phishing attack. Hackers are creating web pages that appear to be the well-known Google Doc form. These scammers are sending out links to what looks like a Google Doc. However, before you can …

Continue reading Security Notifications

From The FBI

Yesterday, the FBI released a special scam warning regarding COVID-19, Coronavirus Disease. It points out many of the warnings I have already given you here on our blog. However, I think all our blog readers should read what the FBI has to say. I’m going to paste the exact bulletin here: FOR IMMEDIATE RELEASE Thursday, …

Continue reading From The FBI

Smishing & Pharming

In my post, IC3 2019 Report, I shared that the top scam rip-off of 2019 was Phishing/Vishing/Smishing/Pharming. Although I’ve published posts on Phishing and Vishing, I have yet to cover Smishing and Pharming. I’m going to rectify that today! Smishing – Smishing is just like Phishing except the scam comes through text messaging instead of …

Continue reading Smishing & Pharming

IC3 2019 Report

As I shared in my post, “Soapbox,” the FBI has released the Internet Crime Complaint Center (IC3) 2019 Internet Crime Report. While my “Soapbox” post was focused on Tech Support Fraud, I think it’s important to share some of the other information found in this compte ren·du. For the record, I’m not passing this information along …

Continue reading IC3 2019 Report

Old Rule Out, New Rule In

Yesterday, I attended a security webinar presented by Lenovo and Intel with special guest speaker Vinny Troia. Vinny is a Computer Forensic Specialist and Certified Ethical Hacker, well-known throughout the computer IT world. Lenovo and Intel presented new ways they are improving hardware to make our computing safer. When it comes to software and user …

Continue reading Old Rule Out, New Rule In

A Different Kind Of Fishing

On January 29, 2019, I posted about phishing. (https://www.4kcc.com/blog/?p=774) Today, I’m posting about another kind of fishing – catfishing. No, not fishing for the “freshwater or marine fish with barbels resembling whiskers around the mouth, typically bottom-dwelling.” Rather, pretending to be someone else online in an attempt to deceive others. There are some real horror …

Continue reading A Different Kind Of Fishing