How Tooltips Are Being Used For Phishing

It's important that you understand how tooltips are being used for phishing. First, I'll explain terms and then I'll outline the phishing process being used. Definitions Tooltips Are you familiar with the term tooltip? You probably see them all the time when you use a computing device but you might not know the term. Let's …

Continue reading How Tooltips Are Being Used For Phishing

How To Avoid Smishing Scams

I suppose that before I explain how to avoid smishing scams, it might help to understand the meaning of the word "smishing." Basically, smishing is phishing through text rather than email. All clear now? That definition works fine if you understand what phishing is. Okay, let's go to the Mirriam-Webster dictionary to find out the …

Continue reading How To Avoid Smishing Scams

IC3 2019 Report

As I shared in my post, "Soapbox," the FBI has released the Internet Crime Complaint Center (IC3) 2019 Internet Crime Report. While my "Soapbox" post was focused on Tech Support Fraud, I think it's important to share some of the other information found in this compte ren·du. For the record, I'm not passing this information along …

Continue reading IC3 2019 Report

Old Rule Out, New Rule In

Yesterday, I attended a security webinar presented by Lenovo and Intel with special guest speaker Vinny Troia. Vinny is a Computer Forensic Specialist and Certified Ethical Hacker, well-known throughout the computer IT world. Lenovo and Intel presented new ways they are improving hardware to make our computing safer. When it comes to software and user …

Continue reading Old Rule Out, New Rule In