Netflix Phishing Scam: Don't get caught

Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money, your identity, or both. They also use phishing emails to get access to your computer or network. If you click on a link, they can install ransomware or other programs that can lock you out of your data.

Scammers often use familiar company names or pretend to be someone you know. Here’s a real world example featuring Netflix. Police in Ohio shared a screenshot of a phishing email designed to steal personal information. The email claims the user’s account is on hold because Netflix is “having some trouble with your current billing information” and invites the user to click on a link to update their payment method.

[More]

Why software updates & patches are important

You’re probably no stranger to those little pop-up windows. They tell you software updates are available for your computer, laptop, tablet, or mobile device.

You might be tempted to click on that “Remind me later” button. Don’t do it. Or, at least don’t put off updating your software for long.

Software updates are important to your digital safety and cyber security. The sooner you update, the sooner you’ll feel confident your device is more secure — until the next update reminder.

Why are software updates so important? There are a lot of reasons. Here are 5 that show why it’s important to update software regularly.

[More]

Basic eMail Cybersecurity for Small Business

When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted source – for example, from your company. It’s a practice called spoofing and it packs a double wallop. Not only does it put consumers at risk for identity theft, but spoofing can unfairly damage the reputation for trust you’ve worked hard to earn.

What can you do to protect your company and your customers from business email imposters? That’s just one of the topics covered in the FTC’s new cybersecurity resources for small business.

[More]

Weirdest Tech Stories of 2018

With technology being in every-day life, some oddities are going to occur. Here's a small list that you may not have read about in the main-stream media!

Nap-busting machines, “augmented eating” and more

As we begin a new year, it’s a great time to give our brains a fun treat and look back at some of the strangest tech stories we heard about in 2018.

No sleeping on the job

Hoping to catch a few subtle Z’s in your cube between meetings? If you’re in Japan, you’ll have to get another coffee instead, thanks to a new system that senses if you’re sleeping—and blasts you with cold air to wake you up. The as-yet-named system, a collaboration between Japanese air conditioning manufacturer Daikin and electronics giant NEC, will use facial recognition technology to detect if a worker’s eyelids are making movements that usually happen before dozing off. Why cold air? An initial study found it was the best way to keep people alert (increasing room brightness and spraying aromas were also tested). Daikin hopes to release the system commercially in 2020, so grab your sweater.

[More]

Cybersecurity for Small Business

Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out of the files you need to run your business. When FTC staff met with business owners across the country, you cited ransomware as a particular concern. New resources from the FTC can help protect your company from this threat.

Ransomware: How It Happens

What is a ransomware attack? It can start innocently enough. An employee clicks on a link, downloads an email attachment, or visits a website where malicious code is lurking in the background. With just one keystroke, they inadvertently install software that locks you out of your own files. The cyber crook then demands a ransom, often in the form of cryptocurrency. But even if you pay, there’s no guarantee that hackers will live up to their end of the bargain. They may pocket the payment and vanish without unlocking your files. Meanwhile, the information you need to run your business – and confidential data about your customers and employees – is now in criminal hands.

[More]

More Entries