The FTC has been cracking down on deceptive tech support operations that call or send pop-ups to make people think their computers are infected with viruses. Scammers ask for access to computers, then charge people hundreds of dollars for unnecessary repairs. In Ope...
The best way to avoid falling for scams, phishing, fake websites, and getting infected with malware/virus is knowing how to spot fake email and avoid clicking on anything that is suspicious.
You are the last line of defense in keeping your devices, information, and identity safe!
Social Engineering R...
A must read for everyone, although some mitigation options listed are quite expensive and others only possible in highly-managed Enterprise environments.
Full SEI Article -
https://insights.sei.cmu.edu/sei_blog/2017/05/ransomware-best-practices-for-prevention-and-response.htmlThink you got an email from a business you know? Scammers sometimes use emails that look legit to trick you into sending money to them.
The email might say it’s from a real estate professional you’re working wit...
Federal Trade Commission - HOW TO SPOT A TECH SUPPORT SCAM:
Learn how to spot and report Tech Support Scams:
Do not give sensitive information to others unless you are sure that they are indeed who they claim to be and that they should have access to the information.
Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent. When troubleshooting problems with your computer, you may discover that the source of the problem is spyware software that has been installed on you...
While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know.
When vendors become aware of vulnerabilities in their products, they often issue patches to fix the problem. Make sure to apply relevant patches to your computer as soon as possible so that your system is protected.
Explore the resources in this section to learn more about cybersecurity and to better secure your home and small-business networks - Provided by US-CERT: