Category: Scams

Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Filed under: Computing Tips,Passwords,Scams,Security - Jun 24 2022
Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Payment apps like Zelle and Venmo are a customer favorite because they are a convenient, fast, and easy way of electronically exchanging money between others. Zelle’s popularity and quick exchange of funds between one bank and another attracts more than just new customers. Unfortunately, it attracts hackers and scammers too.

With so many headlines about Zelle scams on the news lately, many users can’t help but wonder about the platform’s safety. Scammers target Zelle users and siphon off their hard-earned money through phishing scams. The truth is, Zelle is safe as long as you are careful, and you pay attention. 

By the time you’re done reading this article, you’ll know more about Zelle and how you can safely use the platform without falling victim to scammers

What exactly is Zelle?

Zelle is a popular payment application operating a peer-to-peer (P2P) model. It makes it easy for users to move money and pay for things without going to the bank or handling cash. Zelle is the joint effort of several major banks in the US. It’s easy to use through an iPhone and Android app. Zelle also integrates with the mobile app of major banks such as Bank of America, Wells Fargo and Chase.

How does the Zelle scam work?

Zelle scams are mainly social engineering scams. Social engineering is manipulating or influencing people using scare tactics or fraudulent information. Scammers trick consumers into unintentionally authorizing money transfers by making fraudulent claims and promises.

One of the most common Zelle scams involves sending a text message or an email requesting confirmation for what ends up being a fake payment. Most users often respond to try and disprove the transaction. Instead of putting the scammers off, it opens the door for further communication. The scammers then call the user pretending to be from the user’s bank and pretend to give the user instructions that’ll reverse the claim. In reality, the money ends up in the scammer’s account.

Safety precautions when using Zelle

While the news may sound scary, most Zelle scams are social engineering. As long as you heed the precautions below, you should be relatively safe. 

Only use Zelle for people or businesses you trust

P2P payments should not be used to send money to anyone you don’t know and should rarely be used for online purchases. Only use Zelle to send money to your family and friends if possible. Verify that the phone number, email, and recipient’s name are all correct. 

Ignore unsolicited emails and text messages

Your bank will rarely contact you unsolicited. If you received a message from any party posing as a banking representative when you haven’t contacted them, ignore it. Reach out to your bank directly and ask them to check your account for any suspicious activity.

 If you gave out your personal details before you noticed anything, that is, you fell for the phishing scam, call your bank so they can help you secure the account. 

Use two-factor authentication (2FA)

Two-factor, two-step, or multi-factor authentication is a security process that helps secure your accounts by asking users to verify their identity using two different authentication factors. When you authorize 2FA, you’ll need to input a one-time password (OTP) anytime you sign in to your account. You should never share your OTP with anyone, no matter how insistent they appear. Criminals posing as your bank may demand your passcode for various reasons, but no legitimate bank will ever ask for it.

Don’t get pressured by urgent or immediate payments

If you observe any suspicious behavior from someone claiming to be a representative of your bank, a utility, or another institution demanding quick payment, it’s likely a scam. End the call and reach out to the business through official channels.

Scammers also send payment requests from businesses, banks, and utilities you don’t pay with Zelle to trip you up. Confirm from the organization’s official channels that the request is legitimate before paying. 

Be cautious of anyone insisting on using only Zelle

Anyone who insists on transacting only through Zelle should send warning bells to your mind. If they say the only payment option they can accept is Zelle, then make sure the transaction and the individual are genuine before sending any money. 

Don’t send money to yourself

Scammers may try to get you to authorize a reversal by claiming that a payment failed to go through or that your account has been compromised. Remember that banks won’t reach out to you unless you contact them first. 

We’re Here to Help Keep Your Tech Safe

Need more information on staying safe while using online apps? Then visit Computer Techs. Schedule an appointment by calling 775-624-6888

Has Your Computer Been Hacked, or Is It Another Phishing Scam?

Filed under: Scams,Security - Jun 10 2022
Has Your Computer Been Hacked, or Is It Another Phishing Scam?

How many times has this happened to you? You’re on your computer reading, catching up with friends on Facebook, or searching the internet when a pop-up window shows up claiming that your browser has been hacked or blocked. 

If it’s your first time seeing such a message splash across your screen, you’ve been lucky until now. Every day millions of computer users all over the globe see such messages whenever they surf the internet. And no, it doesn’t mean that your browser has been compromised. It’s simply pop-up phishing designed to scare you into calling the number, which scammers use to target unsuspecting victims. 

What Is Pop-Up Phishing?

Pop-ups are generated by websites to offer users additional information or guidance (such as how to fill in a form, how to apply a discount code, etc.) 

With pop-up phishing, you get something malicious disguised as a scare message to get you to act. Pop-up phishing occurs when criminals hijack legitimate websites with malware code, causing the website to spring up these “your computer has been hacked” messages whenever a new user visits the website. 

Pop-up phishing is usually so effective because of the type of message that “pops up” and the content of the message. They typically provide a phony warning to an unsuspecting website visitor, claiming that the visitor’s computer security has been compromised. The visitor is then asked to either download a necessary tool to remedy the “security threat,” such as an antivirus program (often malware in disguise), or contact a phony phone number for “help.”

How Does Pop-up Phishing Work?

Fake pop-ups inform users that their computer is under attack or has a technical problem. They direct visitors to call a phone number listed on the pop-up to get a professional that can help resolve the danger, one that never existed in the first place.

Cybercriminals make a lot of money from pop-up phishing scams yearly. They target unsuspecting users worried about their computer’s security to extort money from them and “fix problems and resolve threats” that do not exist.

How to identify fake pop-ups

Here are different ways of spotting a fake pop-up:

Spelling Mistakes

One of the simplest ways to spot a fake pop-up is to pay attention. They are often littered with all sorts of spelling mistakes. If there’s an image on the pop-up, it’ll likely look unclear or unprofessional.

Compare it to a legitimate pop-up.

Some pop-up phishing notifications claim to be from your internet service provider. Being able to differentiate between a genuine notification from a fake can save you a lot of trouble. 

If you haven’t been paying attention to pop-ups from your antivirus software, you should start doing that now. That way, whenever you come across a fake, you can quickly tell. If you’re confused and don’t know the difference, just ignore the pop-up, open your antivirus program, and do a deep scan to see if there’s anything wrong. 

Close your browser

Most fake pop-ups put your browser in full-screen mode, and to make matters more annoying, you may find yourself unable to minimize or close your browser. This is usually a sure sign that it’s a scam. If this happens, close the browser using the Ctrl+W keyboard keys, task manager, or shut down/restart your computer. 

How To Protect Yourself Against Pop-up Phishing Scams

If a scam pop-up message appears on your screen, here’s what you should do:

  • Avoiding calling any number shown on the pop-up
  • Do not click the pop-up for any reason.
  • Close your browser using the Ctrl+W keyboard keys, task manager, or shut down/restart your computer. If you’re unable to do that, you can press-and-hold your computer’s power button to shut it down.
  • Do not share your payment and personal details with anyone.
  • Make sure your operating system and browser are up to date.
  • Before downloading any app or browser plugin, read the reviews from other users. It may just save you from downloading something dangerous.
  • Never open any attachments in spam emails, or click to “unsubscribe” from them.
  • Only go to trusted sites to download your software and apps.
  • Do not click on any links in messages, emails, or websites you aren’t familiar with. 
  • Examine the permissions that the app you wish to download is requesting to ensure it is legitimate.

For more information on how to stay safe while surfing the internet, contact us.

4 Dangerous Scam Text Messages You Should Delete Immediately

Filed under: Passwords,Scams,Security - May 20 2022
4 Dangerous Scam Text Messages You Should Delete Immediately

Email open rates typically range between 20 and 30 percent while SMS stands at a staggering 98 percent. 90 percent of texts are opened within three seconds of receipt. The average text is read within 90 seconds of receipt while that number is 90 minutes for email. This characteristically rapid response for text messages makes them a popular avenue for SMS scams and phishing – sometimes called “smishing”. Scams after all require that the target respond quickly before they have a change of heart or think their decision through. 

The average text is read within 90 seconds of receipt. That metric is 90 minutes for email.

The speed and regularity of reading and responding to texts is why you should delete scam texts immediately. If they lie around your inbox too long, you could unintentionally click on the fraudulent link at some future date. Scam SMS comes in diverse forms. Knowing SMS scammers’ modus operandi is critical to avoiding falling victim. Check out these types of texts you should get rid of without hesitation.

1. A Friend’s Friend You’ve Never Heard Of

Scammers know they have a good shot at success if they can convince you that you are someone they may know and can trust. Since they cannot guess the origin and nature of your friendships, their best bet is to pose as someone referred to you by your friend or acquaintance. For the average adult, friends and acquaintances garnered through life can number in the hundreds or thousands. 

So, if the scammer sent you a text message purporting to be a referral from your friend Melissa or Michael, chances are you have someone by that common name that you have at the minimum, a distant connection to. You would feel compelled to take a look and respond to the message to avoid embarrassing your friend or friend’s friend by stating you don’t remember them. 

Now, this type of text could very well be genuine. But as with virtually all scam texts, if it includes a URL the sender wants you to click on, delete it immediately.

2. A Package You Were Not Aware Of

Who doesn’t love surprise gifts and just incoming packages in general? When we order something at online stores such as Amazon, there’s a palpable excitement as we anticipate its arrival. If you get a text message claiming you have a package waiting for you, it is tempting to click on the link to see the details, claim it and/or specify the destination. Yet, this is one of the most common SMS scams. 

While the link could be a trigger for the download of malware to your phone, it is often a means of extracting confidential personal information from you via a fake webform. Armed with that data, the scammers can execute elaborate identity theft, empty your account, and max out your credit card.

3. Your Bank Account or Credit/Debit Card is On the Verge of Closure

Our bank accounts and credit/debit cards are a key driver of our everyday quality of life. You may be sent into a panic if you receive a text message claiming your bank account or card will be closed in case you do not urgently confirm your PIN, password, and other information. Often, there will be a narrow deadline such as the need to provide the information within hours of receipt. 

Bank accounts and cards do get closed for various reasons. So, once again, this rides on a realistic scenario. Still, account closure is unlikely to happen with such urgency. There will be a lead time of at least weeks or months. To check if it’s a scam, call the bank directly on their official listed phone numbers (you can find these on their website’s Contact Us section), or on the back of the card. If it doesn’t check out, delete it promptly.

4. You’ve Won an Award You Did Not Know You Were in the Running For

This plays on the elation that accompanies an unexpected gift. But nothing comes that easy. Nearly all notable awards require that you formally and intentionally enter the contest before you are assessed against other participants. Few organizations would want to go through the painstaking process of identifying a winner only for the selected candidate to reject it. 

What does this all mean? If you receive a text message about an award you’ve won, it’s likely scammers looking to cash in at your expense. Do not click on the link they ask you to even if it is apparently the only means to claim your award. Usually, these text messages download malware to your phone that would need removal.

Conclusion

These are some of the common types of scam texts but this is not an exhaustive list. Other types of scam SMS range from claims that your videos/photos have been posted somewhere, to inauthentic COVID-19 pandemic updates. Irrespective of the type of message, take a screenshot of the message for later review by an IT professional, then delete the message. Under no circumstances should you click the links, respond to the text or call the sender.

Think you have been a target of scam texts? Most people have. Contact us if you need assistance.

How Can I Tell If My PC Might Be Infected with Malware?

Filed under: Scams,Security - May 13 2022
How Can I Tell If My PC Might Be Infected with Malware?

Data theft, file loss/corruption, system disruption, email/SMS spam, unauthorized popup ads and remote control. When your PC is infected by malware, these are some of the major risks you could be exposed to. Prevention is the best-case scenario. But no antivirus can guarantee 100 percent protection from malware.

No antivirus can guarantee 100 percent protection from malware

You must brace for instances when malware does seep through any defenses you may have. It’s vital that you know the telltale signs of malware infection. Whereas malware is designed to be as unnoticeable to the end user as possible, it is after all an alien and unwelcome application. Most times, you can pick up warning signs that something feels off. Here are some of the major red flags.

1. Unexpected Pop Ups

Have you ever been working on your PC when suddenly, a window pops up on the screen with an alarming message? That could very well be a sign of malware. Typically, the notification will declare your computer is virus infected. It will propose that the only way you can get rid of the unwelcome message is by clicking on the highlighted button.

It’s a classic trick where someone purports to offer you assistance against malware whereas in the real sense, they want to use your uninformed consent to gain entry, steal information and propagate infection. 

2. Phishing Emails

It’s difficult for an email user to completely avoid phishing messages. Spam filters do a good job of preventing many phishing emails from getting to our inboxes, but a few will break through. A phishing email is not necessarily a sign of malware infection. What you should pay attention to is an uptick of these scam emails

If you were getting one phishing email per month but now have to grapple with five a week, then that could be because malicious software on your PC is aiding that nefarious effort.

3. Slowing Performance

If you regularly use your computer, then you already have an idea of what ‘normal’ looks like as far as processing speed and response time is concerned. Against this baseline, a slow computer could mean a virus problem. Certain forms of malware will overload your computer by occupying a significant proportion of your processor’s and memory’s capacity.

Slowing performance that has no clear cause may be due to malicious software

There may be valid reasons why your PC would suddenly slow down. But these can be tied to definitive changes such as a recently installed application. If you do notice slowing performance that has no clear cause, malicious software may be at play. 

4. Frequent Crashing

Malware aims to perform or facilitate unauthorized activity but without overly disrupting the PC user’s experience. That is easier said and done though so the presence of unwelcome apps will sometimes lead to unresponsiveness and/or unexpected rebooting. Also, malware may deliberately initiate a reboot to further embed itself in your computer’s system. 

Crashing does not always mean malware infection. Bug-plagued or poorly configured apps can destabilize your PC’s operating system too.

5. Changed Browser Homepage

Your browser’s homepage is not something you will regularly change. For most people, it remains with the default setting throughout. In many instances, that would be a major search engine page such as Google.com or Bing.com.

So, if your browser’s home page changes and you do not remember doing it, that is likely because of a virus. Often, trying to change it back to the default won’t help much as the malware will amend the setting again to the page it prefers. This will happen until the virus itself is removed.

6. Antivirus Warnings

Fake infection popups are a sign of malware. But so are legitimate alerts from your PC’s antivirus. It’s after all your first line of defense. It’s true that antivirus software developers are in business so they’ll regularly push notifications meant to encourage you to move to a paid plan or subscribe to an additional security product by them. 

Any legitimate warning from your antivirus should be taken seriously

Still, irrespective of the motive, any legitimate warning from your antivirus should be taken seriously. It’s one of the easier and safer ways to get rid of malware. Your antivirus can detect malware even before it is successfully installed. But no antivirus will ever ask you to call a phone number for assistance.

Wrapping Up

As long as your PC is connected to the Internet, receives email and/or has had a USB flash drive plugged into it, there is always the risk of malware infection. This realization can be a source of anxiety. It doesn’t have to be though. As long as your antivirus is active and up-to-date, you practice safe computing habits and keep an eye on the warning signs of infection, you can rest easy. 

Suspect your PC has a malware problem? Contact us.

Don’t get locked out of your email – add account recovery info now!

Updated 10/18/23 to include other accounts besides email.

You may have signed up for your email account long ago – before additional account recovery information was required. If you get locked out of your email account tomorrow, does your account have enough account recovery information to allow you to easily reset your password and get back into your account?

Account recovery information includes other methods to confirm your identity including:

  • A mobile phone number that can receive a text message
  • A secondary email address
  • Account security questions – i.e. “your first pet’s name”

This year we’ve had several clients get permanently locked out of their AT&T/Yahoo email and other accounts because there wasn’t enough secondary verifiable information to convince the customer support representative to reset the password. Don’t let that happen to you. Log into your email account today – before a hacker does – to update your profile information with a cell phone number that can receive one-time-password verification text messages. Alternatively or additionally you could provide a secondary email address or setup account security questions/answers. If available, setup 2-Step Verification – sometimes called Multi-Factor Authentication – for even better protection.

Don’t forget to secure your other accounts

While you’re securing your email account, we also recommend securing your other accounts that could be accessed by hackers. Those accounts include:

  • Wireless cell phone account and number
  • Bank and brokerage accounts where funds could be transferred out by a scammer
  • Social media accounts where someone could take over your identity to scam your friends and family
  • Your Microsoft, Apple and/or Google accounts which are used to login to your computer or mobile device

To secure your accounts as mentioned above, once logged into one of your online accounts, look for a section called profile or security to make the changes and additions. Instructions for some common accounts include:

If you need help, contact us for a security checkup of all of your vulnerable online accounts.

Print This Article Print This Article

What Is a QR Code Used For?

Filed under: Computing Tips,Internet Tips,Scams - Mar 11 2022
What Is a QR Code Used For?

QR is an acronym for quick response – which makes sense as QR codes respond very quickly to requests to use them. Essentially, a QR code is a square-shaped barcode that you can scan with your mobile phone to load a website or application. QR codes can also be used to load phone numbers, login pages, and Wi-Fi details. 

QR codes have their origin in the business world. They were invented to help improve the speed of supply chain processes. Over the last few years, though, QR codes have firmly entered the consumer world. Most recently, QR codes have become an essential part of the pandemic response, helping to facilitate ‘contactless’ services. 

You may have been to a restaurant and noted a QR code sticker on your table. Your server may have asked you to use the QR code to load the menu instead of receiving a paper one. Similarly, QR codes have also been used for contact tracing to help keep track of COVID-19.

While QR codes are really useful, they can seem daunting if you don’t know how to use them. In fact, a YouGov study found 14% of Americans find QR codes to be challenging to use, with adults over the age of 65+ especially are likely to say so (20%). 

Below, we’ll explain how to use QR codes. We’ll also help you to understand which QR codes are safe to use – and which you should be wary of. 

How do I use a QR code? 

Most mobile phones that have cameras have QR scanner capabilities. If you have an older mobile phone, your camera might not come with this capability. In this case, you should be able to download a QR scanning app from the Apple Store or Google Play. If you’d like assistance with this, let us know, and we can help

Once that’s done, it takes just a few simple steps to scan a QR code. 

  1. Open the QR application or the camera on your phone.
  2. Point your camera at the QR code – DO NOT press the shutter button to take a picture. Line up your camera so that all four corners of the code are in view.
  3. Click the link that’s presented.
  4. Your phone will now do the work for you! It should automatically take you to the website, application or data attached to the QR code.

Are QR codes safe?

Legitimate QR codes are safe to use. You need to be wary, though, of fraudulent QR codes that are made by cybercriminals. These codes look like legitimate QR codes but have dangerous consequences. 

A malicious QR code might: 

  • Install malware onto your phone
  • Take you to a malicious website that asks you to hand over personal details or financial information 
  • Make your device join a suspicious Wi-Fi network that allows attackers to see and steal your data 

Because we can’t read QR codes, it’s very easy to fall for a QR code scam. Plus, as these codes are increasingly popular, hackers are betting on the fact that people won’t suspect anything untoward. 

Most recently, the FBI has warned of a scam in Texas, where hackers have been placing fraudulent QR codes near parking meters in Austin. Many civilians have scanned the codes to pay for parking, but the codes actually lead to a fake payment website. Not only are people getting parking tickets, but they’re paying hackers! It’s unknown whether the hackers are also stealing the credit card information given on the fake website – but it’s very possible! 

This type of attack will become increasingly common. We’ll see more and more hackers print malicious QR codes and place them in public in order to trick people. 

Don’t fall victim to a QR code scam!

This kind of scam shouldn’t put you off using QR codes entirely. You just need to be careful about the ones that you use. 

We recommend being wary of all codes posted in public places. Make sure to inspect the code before scanning. It’s also helpful to look at the URL of the QR code if you have scanned it. Legitimate URLs are easy to spot, such as https://computertechsreno.com/ Look at the grammar, punctuation and spelling on the website to make sure it appears legitimate – particularly if the website is asking for payment details.

Malicious URLs tend to have spelling mistakes and are suspiciously long.

If you’re still unsure, don’t scan the QR code. We advise avoiding scanning all codes attached to street poles – as these can’t be trusted.

Generally speaking, QR codes on restaurant tables and in shops can mostly be trusted – but always check with a member of staff if you’re not sure. You can scan QR codes from sources you trust, like on TV, on popular websites, or a trusted person’s business card. 

If you’re not sure about a QR code, don’t hesitate to get in touch with us. We can help you to protect your mobile phone. If you’d like assistance, contact your tech, or scan the following QR code with your smartphone:

Scan the QR Code above from your smartphone to have it take you to
https://computertechsreno.com/contact/

An Antivirus Will Not Protect You from User Error 

Filed under: Scams,Security - Feb 25 2022
An Antivirus Will Not Protect You from User Error

It would be pretty great if antivirus protected us from all the online security threats out there. Unfortunately, though, this isn’t the case.

Often, customers ask us if they should purchase a third-party antivirus software rather than use the basic one that comes with their operating system. Our answer to this question is usually: stick to the antivirus that comes with your computer. 

Let’s take a look at why below.

What antivirus can and can’t do

Antivirus software works by scanning your devices, applications and files for traces of viruses or malware. Viruses are a type of malicious computer program designed to alter how your computer operates. It can, for example, steal sensitive data or lock you out of accessing your files.

Viruses are scary stuff – and antivirus is vital for defending against these types of threats. However, antivirus isn’t a holy grail. It only protects against one type of cyber security threat. There are a whole plethora of other threats out there that you need to watch out for. 

Human error is the biggest security threat out there today 

Recent research found that a massive 85% of data breaches can be traced back to human error. This means that it’s not viruses or malware responsible for most successful cyberattacks; it’s people. 

As humans, we all make mistakes – and this is what today’s cybercriminals count on. Many of today’s cyberattacks focus on manipulating victims into clicking suspicious links or sharing financial information with a fraudulent entity. Here are some examples:

  • Phishing emails: Phishing emails are fraudulent emails criminals send to their victims. Typically, the email will impersonate a trusted brand. It will ask the victim to either call, click a link, download an attachment or share sensitive information. There were 241,342 victims of phishing in the US in 2020 – and those are just the ones that were reported. 
  • Dodgy online advertisements: Malvertising is a type of cyber attack technique where hackers inject malicious code into advertisements. When you visit a website with malvertising the malicious code can launch anything from a harmless yet deceptive warning message, to enabling a hacker to steal your data or even take it for ransom. 
  • Replying to texts from unknown senders: Similar to phishing is what’s known as SMishing. SMishing happens when a cybercriminal sends a fraudulent text to your mobile, pretending to be a trusted entity. The text will usually contain a link, which takes you to a page where you’re asked to share sensitive information – like your bank card information.

The best protection is education

 All of the above cybercriminal tactics are not new. Phishing, malvertising and SMishing have been around for years. However, criminals continue to use these tactics because they have a high success rate. 

While antivirus and other solutions can protect against basic forms of malware, they can’t stop a phishing/SMishing message from landing in your inbox, nor can they prevent you from calling a scammer’s number in a deceptive pop-up ad or message. 

To that end, the best way to protect yourself from today’s cyber threats is through education. Understanding how to spot these threats can ensure you don’t fall victim. 

Here are some tips to bear in mind.

How to spot phishing

Watch out for emails where: 

  • The tone of the email sounds unfamiliar or strange 
  • You don’t recognize the sender address
  • There are spelling mistakes and grammatical errors 
  • The request seems urgent or unusual 

How to spot malvertising

Watch out for pop-ups where: 

  • The advert tells you to call a number to fix a problem with your device
  • There are spelling errors in the copy 
  • The advert promises something too good to be true 
  • The advert doesn’t seem relevant to your recent search history 

How to spot SMishing 

Watch out for texts where: 

  • The message seems too good to be true 
  • The request appears urgent or unusual 
  • There are spelling and/or grammatical errors in the message 

What to do if you’re not sure whether an email or text is genuine

Check out these clues and examples of phishing/SMishing.

Often, cybercriminals will impersonate trusted brands in their phony emails and texts. They may pretend to be your healthcare provider or bank and request information urgently. 

If you’re not sure whether such a request is genuine, we advise that you validate any requests over a separate channel. For example, if you receive an email from your bank that you weren’t expecting, call them to check if they sent that email. Always call and verify before engaging with these requests. 

Don’t forget that we are happy to support you with your questions about information security and education. If you have any concerns about phishing and SMishing, we’d be glad to take a look at your device for you. 

As well as this, we can help with improving your computer’s security defenses, so you experience less phishing and pop-up ads. 

Protect yourself from common security threats

Contact us today if you need help with protecting your computer or have any questions about phishing, SMishing, and malvertising. 

Contact us today.

Check these Facebook settings right away

Filed under: Internet Tips,Passwords,Scams,Security - Feb 21 2022

Originally posted February 2022, Updated May 2025

We’ve been receiving lots of reports from clients that their Facebook account has been hacked. In reality, usually it’s just been cloned. Here’s what’s happening. 

If you have a Facebook account, by default your Friends list is set to “Public” – meaning anybody on the internet can see who your Facebook friends are. But miscreants and scammers can use this information along with other public information to impersonate you by creating a new Facebook profile – even with your public profile picture(s). Then they send friend requests to all of your friends. Once your friends become friends with the new “you”, a scammer can persuade your friends that your original Facebook account was hacked and your friends are lead to believe the new account is really you. Scammers will then use your new Facebook profile controlled by them to have your friends confide in “you” to obtain personal/private information and/or gift cards or other financial scams.

What you need to change right away 

We recommend using Facebook’s Privacy Checkup to review your settings, and make sure that scammers can’t use public information from your Facebook account. In Facebook, go to your Account > Settings and Privacy > Privacy Checkup. In “Who can see what you share”, make sure “Who can see your friends list on your profile?” is NOT set to Public. In Privacy Checkup we also recommend going through “How to keep your account secure”, and make sure that you’re using a unique password for Facebook.

An additional step is to make sure that your only “Friends” can see your Followers – it’s set to “Public” by default. Check this setting by click the 3 dots near the top of your Friends list > Edit Privacy > Followers.

Print This Article Print This Article

Watch Computer Techs recommended videos on YouTube

Filed under: Humorous,Internet Tips,Scams,Tech Support - Nov 17 2021

Computer Techs recommended videos is a YouTube playlist consisting of our favorite videos that will educate the viewer about computer and technology related scams, usage tips, and sometimes a funny video that gives us a good laugh. Be sure to press the “Subscribe” button to get notified about new videos that we add from time-to-time.

Whenever you need help with your computer or anything related to technology, please contact your Computer Techs technician.

You can also visit the YouTube playlist in the future by typing youtube.CTreno.com in your web browser address bar.

Internet crimes up over 69% in 2020: Phishing scams more than double and people over 60 the most common victims

Filed under: Internet Tips,Passwords,Scams,Security - Mar 22 2021

The FBI’s Internet Crime Complaint Center has released its annual report. The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion.

Topping the list of types of reported internet crimes was phishing, which more than doubled last year. People over 60 were the most common victims according to the report. Nevada had the 8th most complaints of the states and territories included in the report – yet it is the 32nd most populous.

The phishing category also includes vishing, smishing and pharming – all techniques via email, voicemail, text messaging or via fraudulent websites that attempt to trick victims into divulging personal information such as passwords or credit card numbers.

People over 60 were the most common victim – likely due to the age group growing up in a more trusting society and their less understanding of technology.

Perhaps most surprising is that Nevadans reported the most complaints per thousand people than any other state.

In summary, become educated on how to spot internet crimes so that you or someone you know doesn’t become the next victim.

Print This Article Print This Article
« Previous PageNext Page »