Social Engineering

Social Engineering is the number one way hackers break into computer systems and networks. As I explain in my blog post, Social Engineering: The Weakest Link In The Chain, the person operating a computing device is the weakest link in the security chain. Someone will click on a phishing email or be tricked into allowing someone onto his or her […]

Five Important Videos You Need To Watch

I want to share five important videos from our YouTube Channel. I realize this post will sound self-promoting but I promise you, it’s based on what we are seeing in Remote and hearing over the phone. Why Do I Have A YouTube Channel? There are a number of reasons I have a YouTube Channel. At the top of this list […]

What Is Clickbait?

What is clickbait? We have been asked this question enough times that I felt I should post about the subject. Let’s have a look! Clickbait Definition Merriam-Webster defines clickbait as “Something (such as a headline) designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest.” However, clickbait is not limited […]

My Computer Was Hacked

We often get phone calls from people telling us “My computer was hacked.” My response normally is, “Not likely!” What Probably Happened Why “My computer was hacked” Is Probably False Despite what you might think, hacking a home computer is rarely high on a hacker’s To-Do list. (He or she is far more likely to work at breaking into servers […]

Spammer Tricks

Today, I want to talk about a number of spammer tricks we are seeing all the time. Have you read my post entitled “Fighting Spam” or watched my YouTube video named “How To Eliminate Spam/Junk Emails?” If you have, you probably know that I recommend marking spam emails “Spam” or “Junk” rather than just deleting them. Unfortunately, that’s not always […]

Ransomware Caused A Panic Which Caused A Gas Shortage…

Or, Why You Should Keep Your Computing Devices And Anti-virus Up-To-Date Even though I’ve talked about ransomware a number of times here in our blog, there were still people who really didn’t understand the term until Colonial Pipeline was hit. At that point, the company shut down their pipelines and they remained closed for almost a week. While the hackers/scammers […]

How To Avoid Smishing Scams

I suppose that before I explain how to avoid smishing scams, it might help to understand the meaning of the word “smishing.” Basically, smishing is phishing through text rather than email. All clear now? That definition works fine if you understand what phishing is. Okay, let’s go to the Mirriam-Webster dictionary to find out the full meaning of “smishing.” (Note: […]

They Still Exist

The 1967 movie starred George C. Scott and Michael Sarrazin (may they both R.I.P.) and was about a confidence man who defrauded people in the South. Appropriately, it was titled “The Flim-Flam Man.” While we rarely hear the term in this computer day and age, flim-flam men (and women) still exist. In fact, they are alive and well. Let’s look […]

Our Most Popular Brochures

Because of the pandemic, we haven’t had any in-person seminars. These training sessions are one place where I often hand-out computing-related brochures. I also distribute them when I speak at local organizations but that hasn’t been happening either. Of course, not everyone could attend these functions even if we were holding them. With that in mind, I thought I’d share […]

Don’t Be A Mule!

According to the website Spana (spana.org), “Mules are one of the most commonly used working animals in the world, highly prized for their hardiness and docile nature.” Even though mules are hardworking and nice, the FBI doesn’t want you to become one. Huh? It’s true, the FBI just issued another warning in an effort to keep you from being tricked […]

Security Notifications

If you use Google Docs, you need to be aware of a new phishing attack. Hackers are creating web pages that appear to be the well-known Google Doc form. These scammers are sending out links to what looks like a Google Doc. However, before you can access the Doc, you are asked to log in to Google. This log-in is […]

Election Hacking?

You may have noticed it’s a presidential election year. I don’t post about politics in this blog and I won’t be approving any comments that have anything to do with those who are running for office. However, what I do talk about in this portion of my website is computing, including hacking which is a concern regarding the election. One […]

Encrypted But Not Legit?

Those nasty scammers. They will do just about anything to try to steal your money. One of the things they’ve started to do is purchase security certificates for their bogus websites. They realize that most computer users have come to understand that the “s” in https:// stands for “secure.” A website is secure when everything transmitted from the site to […]

How Do You Know What To Believe?

This post picks up where the last post stopped! Rule #5 – Don’t rush to broadcast! If you want to be a trustworthy source of information on the Internet, this should be your priority rule. Often times, misinformation spreads over the Net because, in a flurry of emotions, people keep repeating something they haven’t verified. Perfect example: a few years ago, emails were […]

Frustrated and Saddened

Frustrated and Saddened I’m frustrated and saddened.  For more than three years, I’ve been preaching and warning my customers about tech support scams.  As recently as three days ago, in my blog post entitled “Soapbox,” I reiterated how fake pop-ups and unsolicited phone calls trick people into being cheated.  I shared the FBI report on Internet crime which showed computer […]

IC3 2019 Report

As I shared in my post, “Soapbox,” the FBI has released the Internet Crime Complaint Center (IC3) 2019 Internet Crime Report. While my “Soapbox” post was focused on Tech Support Fraud, I think it’s important to share some of the other information found in this compte ren·du. For the record, I’m not passing this information along to scare you; I’m doing […]