Category: Security

Top Tips for Secure Online Holiday Shopping This Gift-Giving Season

Filed under: Passwords,Scams,Security - Nov 25 2022
10 Tips for Secure Online Holiday Shopping This Gift-Giving Season

The holidays are a busy time for online shoppers. According to a recent study, over 60% of consumers said they would do some or all of their holiday shopping online this year. That’s a lot of people clicking away on their keyboards and smartphones, looking for the best deals on gifts.

With all of this online activity, it’s important to remember to stay safe. Here are 10 tips to help you do just that:

Adopt Strong Password Security Practices

One of the easiest ways to protect your online accounts is to use strong, unique passwords for each one. That way, even if a hacker does manage to get one of your passwords, they won’t be able to access your other accounts.

It can be tough to remember a bunch of different passwords, so you might want to consider using a password manager. This will allow you to create strong, random passwords for all of your accounts and only have to remember one master password.

Avoid Clicking On Links In Emails From People You Don’t Know

Phishing emails are a common way for hackers to try to get your personal information. They’ll send you an email that looks like it’s from a legitimate company, but the link in the email will actually take you to a fake website. Once you’re on the fake website, they may try to get you to enter your personal information or login credentials.

If you get an email from a company you do business with, don’t click on any links in the email. Instead, go to the company’s website directly and see if there is any information about the email. Or, give them a call from a number obtained on their website to confirm that the email is legitimate.

Use A Credit Card Instead Of A Debit Card

When you’re making online purchases, it’s best to use a credit card instead of a debit card. This is because credit cards have better built-in fraud protection. If someone hacked your credit card information and made unauthorized charges, you would not be responsible for those charges.

With a debit card, on the other hand, the money is taken directly out of your bank account. So, if someone did make unauthorized charges, you’d have a much harder time disputing the charges.

Don’t Click On Suspicious Links

If you receive a holiday promo in your email from a store you’ve never shopped at before, be wary. It could be a phishing attempt to get your personal information. The same goes for links posted on social media. If it looks too good to be true, it probably is.

If you’re not sure whether a link is safe, you can always hover over it to see where it’s going to take you. If the URL looks suspicious or doesn’t match the store’s website, don’t click on it.

Only Shop Reputable Brand Websites

When you’re looking for holiday deals, it can be tempting to go to less well-known websites that seemingly offer great prices. But, these websites might not be legitimate. They might sell counterfeit goods or they might not even ship the items you ordered.

To avoid getting scammed, only shop at websites for stores that you know and trust. And, if you’ve never heard of the website before, do some research to make sure it’s legit.

Keep Records Of Your Shopping Transactions

After you’ve made an online purchase, make sure to keep a record of the transaction. This can help you keep track of your spending and also act as proof of purchase if there are any problems with the order. If your credit card information is stolen, you can also use these records to dispute any fraudulent charges.

Maintain Good Security Habits

In addition to following the tips above, it’s also important to maintain good security habits in general. This includes keeping your computer and other devices up-to-date with the latest security patches. It also means being cautious about the websites you visit and the email attachments you open.

Consider our Computer Maintenance Plan to keep your computer up-to-date and secure.

By following these tips, you can help ensure that your holiday shopping is safe and secure.

If you have any other questions or need help with your smart speaker don’t hesitate to contact us!

4 Things You Can Learn from Cybersecurity Awareness Month in October

4 Things You Can Learn from Cybersecurity Awareness Month in October

Cybersecurity isn’t just about companies preventing their networks from being breached. It’s something that everyone that uses technology needs to be mindful of. On a personal level, you can think of it as information and device security. 

Stopping hackers from getting to your personal data and keeping dangerous viruses out of your computer requires a personal level of cybersecurity. Being safe online is one part of the equation. The consequences of being lax about things like passwords and using free Wi-Fi without safeguards can be high.

Over 24 million Americans have had online accounts taken over by hackers, this includes workplace retirement apps. It’s scary to think of accounts having to do with your money being emptied by a scammer, but it happens all too often. Last year, account takeovers rose nearly 72%. 

Every October, two US government agencies promote Cybersecurity Awareness Month. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) provide helpful tips and resources for both consumers and businesses to raise cybersecurity awareness.

Why not take some time this October to brush up on your security hygiene? You can visit the Cybersecurity Awareness Month website to get some free resources, and below we’ll highlight four key best practices being promoted this year.

Tips to Be “Cyber Smart” and Protect Your Data

This year’s Cybersecurity Awareness Month theme is “See Yourself in Cyber” and it’s all about breaking the misconception that cybersecurity is just for companies and IT people.

The site notes that cybersecurity is really all about people adopting best practices when using computers, mobile phones, and accessing online accounts.

Here are four simple, but effective ways to improve your cyber hygiene and keep your devices and online accounts from being hacked.

Enable Multi-Factor Authentication

Multi-factor authentication (MFA) is also called two-factor authentication (2FA) and two-step verification. What it means is that there is more than one step to gain access to your account.

MFA is very, very effective at stopping scammers from breaching your online accounts, such as a bank account, Facebook account, Amazon account, and others. Microsoft, which sees about 300 million attempts by hackers to breach its cloud services each day, says that using multi-factor authentication can stop 99.9% of attempted fake sign-ins.

With MFA/2FA, you will receive an additional prompt before you can access your account. This typically will come in the form of a one-time passcode (OTP) that is sent to your mobile phone. 

Once you log in with your username and password, you will normally see a button to send the MFA code. Some systems give you a choice to send via text, email, or automated voice call. This OTP is usually about 5 or 6 digits, and you need to enter it to get access. 

How do you add MFA/2FA to an account?

  • Go to your account settings for an online account.
  • Look for an area for privacy or security.
  • If there is a search option in the settings, search on either “multi-factor, two-factor, or two-step.
  • When you find this, turn this feature on.
  • Go through the prompts to set up a phone number (or another method) to receive the one-time passcode.

Tip: Open a new browser tabs to quickly check your email for a one-time passcode, then go back to the website to enter the passcode you just received.

How and why to use browser tabs

Use Strong Passwords

The #1 cause of data breaches around the world is not some big virus or another form of malware. It’s breached passwords. Hackers are having a field day breaking into personal and business accounts by guessing, stealing, and otherwise compromising weak passwords.

Ditch those easy passwords that you find simple to remember. If they’re easy to remember, then they are easy to hack. You should use strong password best practices to create passwords.

Strong passwords look like this:

  • Have at least 10-12 characters
  • Use at least one uppercase letter
  • Use at least one symbol
  • Use at least one number

The best way to manage strong and unique passwords for every login is to use a password manager. There are both free and paid versions you can find online. Just be sure to use a reputable password management tool. I use LastPass since I can use it on multiple operating systems and devices. You can also use the password manager built into your browser or operating system as long as your devices are password protected.

Recognize Phishing 

Fake emails and text messages can trick you into giving away your login information to a website. They can also cause you to download malware. Phishing can look like a shipping notification from Amazon or an urgent notification to update your email account.

Learn how to recognize phishing so you can avoid falling into its trap. It’s also helpful to use an email system – such as Gmail – with good spam and phishing detection.

Phishing recognition tips:

  • Hover over links without clicking them to see the real URL
  • Any slight misspellings or grammar that is “off”
  • If the email is unexpected (such as a receipt for something you never bought)
  • An email address that uses the company name first, instead of after the @ symbol – for example: (name of bank)@strangedomain.com instead of contact@(name of bank).com

Update Your Software

Software often has vulnerabilities that allow hackers to exploit a device. For example, poorly written code might allow a scammer to use a loophole to take control of your computer or smartphone.

Your best defense against software and operating system vulnerabilities is to keep all software and apps on your devices updated regularly. Those updates will include the latest patches for newly found vulnerabilities that keep hackers from using them.

Get Help With Your Personal Cybersecurity

Computer Techs enjoys working with Reno area residents to improve their cyber hygiene. We can help with virus scan and removal, email filtering to reduce phishing, MFA setup, and much more.  

Contact us today with any questions or computer needs!

Use This Clever Acronym (SLAM) To Identify Dangerous Emails in Your Inbox

Filed under: Passwords,Scams,Security - Jul 08 2022
Use This Clever Acronym (SLAM) To Identify Dangerous Emails in Your Inbox

Cybercriminals are continuously targeting naïve individuals. They do not discriminate when it comes to defrauding people. They’ll obtain money from anyone – young, old, poor, and rich. The American Journal of Public health notes that about 5% of adults get scammed yearly.

In the United States, older adults lose about $40 billion per year due to cyberattacks. Cybercriminals can easily exploit the information of an older adult, which can be obtained through smartphones or computer systems. Unfortunately, senior citizens are easy targets of cybercriminals because of their inexperience with using technology. Many older citizens have social media accounts, surf the internet, and use credit cards online. Unlike the younger generation, older adults are generally less aware of cybercriminals’ activities, and as such, they lack the necessary information to help them stay protected from these malicious activities. 

Cybercriminals may reach out in a non-suspicious manner. They may send a link through a legitimate email and offer to assist them with resolving issues. Or they may send an email posing as a company offering cheap vacation trips, or even coupons or prizes. 

These fake emails are called phishing. The criminal is trying to fish for victims, just like fishermen fish for bass, trout, etc. The fake emails act as their lures. Phishing is one of the main causes of all types of data breaches, credit card theft, and other cybersecurity issues.

Then, these hackers will proceed to request personal information from the unsuspecting victim. They will use the information generated to access their credit cards and defraud them if successful. 

Scams targeting the elderly population are becoming rampant in the United States, and their effect on them is damaging. For online criminals, scamming the elderly can bring easy monetary rewards. 

One way to protect yourself from these malicious activities is to use the SLAM method of phishing detection. SLAM is an acronym that represents:

  • Sender
  • Links
  • Attachment
  • Message 

How To Identify Dangerous Emails Using The SLAM Method

SLAM is an acronym that guides you to identify if an email is fraudulent. With it, you can easily recognize when cybercriminals use emails to carry out a phishing attempt. 

S- Sender

As a rule, pay attention to the sender’s email address. Cybercriminals often use the email address of a trusted entity to carry out phishing attacks. So, don’t be in haste to open the email. It is best to ascertain the validity of the sender’s email address. You can do this by hovering your mouse over the sender’s name. It gives you appropriate information on the sender. 

Cybercriminals often make little adjustments to the email addresses they want to use in carrying out a phishing attack. Look out for spelling errors or additional letters in the email addresses. If something doesn’t look right, then it probably isn’t.

L- Link

Many phishing emails have links in them. These links prompt the recipients to click on them so that they can reveal sensitive or personal information. Sometimes, the link in the phishing mail looks helpful and could even offer assistance in resolving bank, health, or payment issues. The link then redirects the user to a login page that may look very similar to one they are used to seeing. This is called a spoofed login page. It’s made to trick the victim into inputting their username and password for a specific site.

A-Attachment

Malicious attachments are standard in phishing emails. To stay safe, it is not advisable to open any attachments in your emails that you aren’t absolutely sure are safe and from a legitimate source. When you download a malicious attachment, it enables hackers to gain access to your device and compromise it. Therefore, don’t open an attachment in your email unless you confirm it is authentic.

M- Message

This represents the content of the email. Although many scammers have become very sophisticated in sending messages, many phishing emails have recognizable flaws such as misspellings, punctuation and capitalization errors, wrong or mis-formatted dates, and generic/non-personalized greetings.

Take the phishing quiz to see if you can spot phishing emails

Test how well you can follow the SLAM method by taking the following quiz which will open in a new tab: Phishing Quiz

Before conversing with a stranger/potential scammer, contact us if you have questions about a suspicious email, text or phone call.

Print This Article Print This Article

Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Filed under: Computing Tips,Passwords,Scams,Security - Jun 24 2022
Is Zelle Safe? How To Protect Yourself When Using Payment Apps

Payment apps like Zelle and Venmo are a customer favorite because they are a convenient, fast, and easy way of electronically exchanging money between others. Zelle’s popularity and quick exchange of funds between one bank and another attracts more than just new customers. Unfortunately, it attracts hackers and scammers too.

With so many headlines about Zelle scams on the news lately, many users can’t help but wonder about the platform’s safety. Scammers target Zelle users and siphon off their hard-earned money through phishing scams. The truth is, Zelle is safe as long as you are careful, and you pay attention. 

By the time you’re done reading this article, you’ll know more about Zelle and how you can safely use the platform without falling victim to scammers

What exactly is Zelle?

Zelle is a popular payment application operating a peer-to-peer (P2P) model. It makes it easy for users to move money and pay for things without going to the bank or handling cash. Zelle is the joint effort of several major banks in the US. It’s easy to use through an iPhone and Android app. Zelle also integrates with the mobile app of major banks such as Bank of America, Wells Fargo and Chase.

How does the Zelle scam work?

Zelle scams are mainly social engineering scams. Social engineering is manipulating or influencing people using scare tactics or fraudulent information. Scammers trick consumers into unintentionally authorizing money transfers by making fraudulent claims and promises.

One of the most common Zelle scams involves sending a text message or an email requesting confirmation for what ends up being a fake payment. Most users often respond to try and disprove the transaction. Instead of putting the scammers off, it opens the door for further communication. The scammers then call the user pretending to be from the user’s bank and pretend to give the user instructions that’ll reverse the claim. In reality, the money ends up in the scammer’s account.

Safety precautions when using Zelle

While the news may sound scary, most Zelle scams are social engineering. As long as you heed the precautions below, you should be relatively safe. 

Only use Zelle for people or businesses you trust

P2P payments should not be used to send money to anyone you don’t know and should rarely be used for online purchases. Only use Zelle to send money to your family and friends if possible. Verify that the phone number, email, and recipient’s name are all correct. 

Ignore unsolicited emails and text messages

Your bank will rarely contact you unsolicited. If you received a message from any party posing as a banking representative when you haven’t contacted them, ignore it. Reach out to your bank directly and ask them to check your account for any suspicious activity.

 If you gave out your personal details before you noticed anything, that is, you fell for the phishing scam, call your bank so they can help you secure the account. 

Use two-factor authentication (2FA)

Two-factor, two-step, or multi-factor authentication is a security process that helps secure your accounts by asking users to verify their identity using two different authentication factors. When you authorize 2FA, you’ll need to input a one-time password (OTP) anytime you sign in to your account. You should never share your OTP with anyone, no matter how insistent they appear. Criminals posing as your bank may demand your passcode for various reasons, but no legitimate bank will ever ask for it.

Don’t get pressured by urgent or immediate payments

If you observe any suspicious behavior from someone claiming to be a representative of your bank, a utility, or another institution demanding quick payment, it’s likely a scam. End the call and reach out to the business through official channels.

Scammers also send payment requests from businesses, banks, and utilities you don’t pay with Zelle to trip you up. Confirm from the organization’s official channels that the request is legitimate before paying. 

Be cautious of anyone insisting on using only Zelle

Anyone who insists on transacting only through Zelle should send warning bells to your mind. If they say the only payment option they can accept is Zelle, then make sure the transaction and the individual are genuine before sending any money. 

Don’t send money to yourself

Scammers may try to get you to authorize a reversal by claiming that a payment failed to go through or that your account has been compromised. Remember that banks won’t reach out to you unless you contact them first. 

We’re Here to Help Keep Your Tech Safe

Need more information on staying safe while using online apps? Then visit Computer Techs. Schedule an appointment by calling 775-624-6888

Keep your smartphone safe

Filed under: Passwords,Security,Tech Support - Jun 24 2022

Today’s smartphones retain a lot of personal data that you likely wouldn’t want to get into the wrong hands. Below is a list of just some of the data that can be accessed if someone got into your smartphone:

  • Someone can receive one-time passwords via text message or authenticator app that can be used to reset account passwords
  • Impersonate you by being able to send and receive calls, email and text messages on your behalf
  • Impersonate you through any social networks apps that you use
  • Access any notes, passwords or private pictures you may have stored
  • Reset your phone and sell it

How you can protect your smartphone

The most important thing you should do is to protect your smartphone with a numeric passcode and/or biometric authentication (finger or facial recognition). 6-digits is better than 4-digits – but 4-digits is definitely better than no passcode. Also, set your smartphone to auto-lock and require the passcode after 5-minutes or less of inactivity (less time is better).

I am surprised by how many clients I’ve helped who had no passcode on their phone. Smartphones are easily lost or misplaced, and a passcode will help keep your data out of the wrong hands. Most people don’t keep their doors unlocked, so why keep their smartphone unlocked?

Other things to keep your smartphone safe include:

  • Only install apps from trusted developers with lots of favorable reviews
  • Treat every text message and email from unknown senders as suspicious – particularly if it’s asking you to do something. Most text messages from financial institutions come from a 5-or-6-digit “short code” – not a 10-digit phone number.
  • Connect your smartphone to Wi-Fi when at home, and make sure you keep the operating system (typically iOS or Android) up-to-date with the latest security patches.
  • You don’t need an antivirus or security app, nor a VPN. Protections are already built into the operating system of your mobile device, and apps are vetted before being made available in the app stores. However, be judicious about the apps that you install, because occasionally stuff gets by the reviewers.
  • Most importantly, password protect your device. You are more likely to lose or misplace your device than getting hacked from the outside.

Do you need help with your mobile device(s). Contact us to discuss your needs.

Print This Article Print This Article

Has Your Computer Been Hacked, or Is It Another Phishing Scam?

Filed under: Scams,Security - Jun 10 2022
Has Your Computer Been Hacked, or Is It Another Phishing Scam?

How many times has this happened to you? You’re on your computer reading, catching up with friends on Facebook, or searching the internet when a pop-up window shows up claiming that your browser has been hacked or blocked. 

If it’s your first time seeing such a message splash across your screen, you’ve been lucky until now. Every day millions of computer users all over the globe see such messages whenever they surf the internet. And no, it doesn’t mean that your browser has been compromised. It’s simply pop-up phishing designed to scare you into calling the number, which scammers use to target unsuspecting victims. 

What Is Pop-Up Phishing?

Pop-ups are generated by websites to offer users additional information or guidance (such as how to fill in a form, how to apply a discount code, etc.) 

With pop-up phishing, you get something malicious disguised as a scare message to get you to act. Pop-up phishing occurs when criminals hijack legitimate websites with malware code, causing the website to spring up these “your computer has been hacked” messages whenever a new user visits the website. 

Pop-up phishing is usually so effective because of the type of message that “pops up” and the content of the message. They typically provide a phony warning to an unsuspecting website visitor, claiming that the visitor’s computer security has been compromised. The visitor is then asked to either download a necessary tool to remedy the “security threat,” such as an antivirus program (often malware in disguise), or contact a phony phone number for “help.”

How Does Pop-up Phishing Work?

Fake pop-ups inform users that their computer is under attack or has a technical problem. They direct visitors to call a phone number listed on the pop-up to get a professional that can help resolve the danger, one that never existed in the first place.

Cybercriminals make a lot of money from pop-up phishing scams yearly. They target unsuspecting users worried about their computer’s security to extort money from them and “fix problems and resolve threats” that do not exist.

How to identify fake pop-ups

Here are different ways of spotting a fake pop-up:

Spelling Mistakes

One of the simplest ways to spot a fake pop-up is to pay attention. They are often littered with all sorts of spelling mistakes. If there’s an image on the pop-up, it’ll likely look unclear or unprofessional.

Compare it to a legitimate pop-up.

Some pop-up phishing notifications claim to be from your internet service provider. Being able to differentiate between a genuine notification from a fake can save you a lot of trouble. 

If you haven’t been paying attention to pop-ups from your antivirus software, you should start doing that now. That way, whenever you come across a fake, you can quickly tell. If you’re confused and don’t know the difference, just ignore the pop-up, open your antivirus program, and do a deep scan to see if there’s anything wrong. 

Close your browser

Most fake pop-ups put your browser in full-screen mode, and to make matters more annoying, you may find yourself unable to minimize or close your browser. This is usually a sure sign that it’s a scam. If this happens, close the browser using the Ctrl+W keyboard keys, task manager, or shut down/restart your computer. 

How To Protect Yourself Against Pop-up Phishing Scams

If a scam pop-up message appears on your screen, here’s what you should do:

  • Avoiding calling any number shown on the pop-up
  • Do not click the pop-up for any reason.
  • Close your browser using the Ctrl+W keyboard keys, task manager, or shut down/restart your computer. If you’re unable to do that, you can press-and-hold your computer’s power button to shut it down.
  • Do not share your payment and personal details with anyone.
  • Make sure your operating system and browser are up to date.
  • Before downloading any app or browser plugin, read the reviews from other users. It may just save you from downloading something dangerous.
  • Never open any attachments in spam emails, or click to “unsubscribe” from them.
  • Only go to trusted sites to download your software and apps.
  • Do not click on any links in messages, emails, or websites you aren’t familiar with. 
  • Examine the permissions that the app you wish to download is requesting to ensure it is legitimate.

For more information on how to stay safe while surfing the internet, contact us.

4 Dangerous Scam Text Messages You Should Delete Immediately

Filed under: Passwords,Scams,Security - May 20 2022
4 Dangerous Scam Text Messages You Should Delete Immediately

Email open rates typically range between 20 and 30 percent while SMS stands at a staggering 98 percent. 90 percent of texts are opened within three seconds of receipt. The average text is read within 90 seconds of receipt while that number is 90 minutes for email. This characteristically rapid response for text messages makes them a popular avenue for SMS scams and phishing – sometimes called “smishing”. Scams after all require that the target respond quickly before they have a change of heart or think their decision through. 

The average text is read within 90 seconds of receipt. That metric is 90 minutes for email.

The speed and regularity of reading and responding to texts is why you should delete scam texts immediately. If they lie around your inbox too long, you could unintentionally click on the fraudulent link at some future date. Scam SMS comes in diverse forms. Knowing SMS scammers’ modus operandi is critical to avoiding falling victim. Check out these types of texts you should get rid of without hesitation.

1. A Friend’s Friend You’ve Never Heard Of

Scammers know they have a good shot at success if they can convince you that you are someone they may know and can trust. Since they cannot guess the origin and nature of your friendships, their best bet is to pose as someone referred to you by your friend or acquaintance. For the average adult, friends and acquaintances garnered through life can number in the hundreds or thousands. 

So, if the scammer sent you a text message purporting to be a referral from your friend Melissa or Michael, chances are you have someone by that common name that you have at the minimum, a distant connection to. You would feel compelled to take a look and respond to the message to avoid embarrassing your friend or friend’s friend by stating you don’t remember them. 

Now, this type of text could very well be genuine. But as with virtually all scam texts, if it includes a URL the sender wants you to click on, delete it immediately.

2. A Package You Were Not Aware Of

Who doesn’t love surprise gifts and just incoming packages in general? When we order something at online stores such as Amazon, there’s a palpable excitement as we anticipate its arrival. If you get a text message claiming you have a package waiting for you, it is tempting to click on the link to see the details, claim it and/or specify the destination. Yet, this is one of the most common SMS scams. 

While the link could be a trigger for the download of malware to your phone, it is often a means of extracting confidential personal information from you via a fake webform. Armed with that data, the scammers can execute elaborate identity theft, empty your account, and max out your credit card.

3. Your Bank Account or Credit/Debit Card is On the Verge of Closure

Our bank accounts and credit/debit cards are a key driver of our everyday quality of life. You may be sent into a panic if you receive a text message claiming your bank account or card will be closed in case you do not urgently confirm your PIN, password, and other information. Often, there will be a narrow deadline such as the need to provide the information within hours of receipt. 

Bank accounts and cards do get closed for various reasons. So, once again, this rides on a realistic scenario. Still, account closure is unlikely to happen with such urgency. There will be a lead time of at least weeks or months. To check if it’s a scam, call the bank directly on their official listed phone numbers (you can find these on their website’s Contact Us section), or on the back of the card. If it doesn’t check out, delete it promptly.

4. You’ve Won an Award You Did Not Know You Were in the Running For

This plays on the elation that accompanies an unexpected gift. But nothing comes that easy. Nearly all notable awards require that you formally and intentionally enter the contest before you are assessed against other participants. Few organizations would want to go through the painstaking process of identifying a winner only for the selected candidate to reject it. 

What does this all mean? If you receive a text message about an award you’ve won, it’s likely scammers looking to cash in at your expense. Do not click on the link they ask you to even if it is apparently the only means to claim your award. Usually, these text messages download malware to your phone that would need removal.

Conclusion

These are some of the common types of scam texts but this is not an exhaustive list. Other types of scam SMS range from claims that your videos/photos have been posted somewhere, to inauthentic COVID-19 pandemic updates. Irrespective of the type of message, take a screenshot of the message for later review by an IT professional, then delete the message. Under no circumstances should you click the links, respond to the text or call the sender.

Think you have been a target of scam texts? Most people have. Contact us if you need assistance.

How Can I Tell If My PC Might Be Infected with Malware?

Filed under: Scams,Security - May 13 2022
How Can I Tell If My PC Might Be Infected with Malware?

Data theft, file loss/corruption, system disruption, email/SMS spam, unauthorized popup ads and remote control. When your PC is infected by malware, these are some of the major risks you could be exposed to. Prevention is the best-case scenario. But no antivirus can guarantee 100 percent protection from malware.

No antivirus can guarantee 100 percent protection from malware

You must brace for instances when malware does seep through any defenses you may have. It’s vital that you know the telltale signs of malware infection. Whereas malware is designed to be as unnoticeable to the end user as possible, it is after all an alien and unwelcome application. Most times, you can pick up warning signs that something feels off. Here are some of the major red flags.

1. Unexpected Pop Ups

Have you ever been working on your PC when suddenly, a window pops up on the screen with an alarming message? That could very well be a sign of malware. Typically, the notification will declare your computer is virus infected. It will propose that the only way you can get rid of the unwelcome message is by clicking on the highlighted button.

It’s a classic trick where someone purports to offer you assistance against malware whereas in the real sense, they want to use your uninformed consent to gain entry, steal information and propagate infection. 

2. Phishing Emails

It’s difficult for an email user to completely avoid phishing messages. Spam filters do a good job of preventing many phishing emails from getting to our inboxes, but a few will break through. A phishing email is not necessarily a sign of malware infection. What you should pay attention to is an uptick of these scam emails

If you were getting one phishing email per month but now have to grapple with five a week, then that could be because malicious software on your PC is aiding that nefarious effort.

3. Slowing Performance

If you regularly use your computer, then you already have an idea of what ‘normal’ looks like as far as processing speed and response time is concerned. Against this baseline, a slow computer could mean a virus problem. Certain forms of malware will overload your computer by occupying a significant proportion of your processor’s and memory’s capacity.

Slowing performance that has no clear cause may be due to malicious software

There may be valid reasons why your PC would suddenly slow down. But these can be tied to definitive changes such as a recently installed application. If you do notice slowing performance that has no clear cause, malicious software may be at play. 

4. Frequent Crashing

Malware aims to perform or facilitate unauthorized activity but without overly disrupting the PC user’s experience. That is easier said and done though so the presence of unwelcome apps will sometimes lead to unresponsiveness and/or unexpected rebooting. Also, malware may deliberately initiate a reboot to further embed itself in your computer’s system. 

Crashing does not always mean malware infection. Bug-plagued or poorly configured apps can destabilize your PC’s operating system too.

5. Changed Browser Homepage

Your browser’s homepage is not something you will regularly change. For most people, it remains with the default setting throughout. In many instances, that would be a major search engine page such as Google.com or Bing.com.

So, if your browser’s home page changes and you do not remember doing it, that is likely because of a virus. Often, trying to change it back to the default won’t help much as the malware will amend the setting again to the page it prefers. This will happen until the virus itself is removed.

6. Antivirus Warnings

Fake infection popups are a sign of malware. But so are legitimate alerts from your PC’s antivirus. It’s after all your first line of defense. It’s true that antivirus software developers are in business so they’ll regularly push notifications meant to encourage you to move to a paid plan or subscribe to an additional security product by them. 

Any legitimate warning from your antivirus should be taken seriously

Still, irrespective of the motive, any legitimate warning from your antivirus should be taken seriously. It’s one of the easier and safer ways to get rid of malware. Your antivirus can detect malware even before it is successfully installed. But no antivirus will ever ask you to call a phone number for assistance.

Wrapping Up

As long as your PC is connected to the Internet, receives email and/or has had a USB flash drive plugged into it, there is always the risk of malware infection. This realization can be a source of anxiety. It doesn’t have to be though. As long as your antivirus is active and up-to-date, you practice safe computing habits and keep an eye on the warning signs of infection, you can rest easy. 

Suspect your PC has a malware problem? Contact us.

How to Browse Privately if You Don’t Want Relentless Advertisements 

Filed under: Internet Tips,Security - Apr 08 2022
How to Browse Privately if You Don’t Want Relentless Advertisements

Have you ever looked at a product on an e-commerce website and noticed that, later, an advertisement appears for that same product on another website? 

This is the work of advertising ‘cookies’ and other tracking tools, which monitor your online browsing activities to present you with relevant, targeted advertisements. 

This can be a great thing. Targeted advertisements can help you to discover new products and makes the browsing experience feel more personalized. 

In line with this, 71% of consumers prefer ads to be targeted to their interests and shopping habits, and 3 out of 4 consumers prefer fewer, but more personalized ads. 

However, while some people enjoy targeted advertisements, many also feel like their online privacy is being invaded. A different research study found that 79% of Americans on the web worry about companies infringing their online privacy.

It’s easy to see why. Personal ads can make you feel a little like you’re living in the world of ‘big brother’. Not everyone wants to be monitored 24/7 – and that’s ok. 

Moreover, let’s say you are researching birthday gifts to buy for your partner. Targeted ads mean that your partner could end up seeing an ad about the proposed gift – which would ruin the surprise! 

As people have become more aware of their online privacy, the leading web browser players have released private browsing options. 

Below, we’ll explore how private browsing sessions work – and how you can set one up on your computer.

What is a Private Browsing Session? 

A private browsing session is a feature available in most popular web browsers. When you switch on private browsing mode, your browser creates a one-time, isolated session that is kept separate from your main browser.

While your main browser collects your browsing history and data, the private browser essentially only has a short-term memory. It won’t save any of the data about the websites you visit or things you buy. Once you finish the session, the data is gone for good. 

Going back to the birthday use case, you can see why private browsing is useful! It ensures that no one else who uses your computer can see what you’ve been looking at online. 

When Did Private Browsing Mode Begin?

Apple was the first manufacturer to release a private browsing mode. In 2008, it launched a ‘private browsing’ feature. Following this launch, the private browsing mode grew in popularity, leading to other big players like Microsoft and Google launching similar features. 

How To Start a Private Browsing Session

It’s simple to get started with a private browsing session. Here’s how to launch it on each of the most popular web browsers.

Google Chrome: Launch Google Chrome as you would normally. Then, near the top right hand of the screen, click the 3-dot menu “Customize and control Goole Chrome”. You’ll see an option that says “New Incognito Window” click this to launch private browsing mode. Then, browse the web as you normally would. 

Safari: Open Safari as you would normally. In the top left hand of the screen, click the “File” button. Then click the option to open a “new private window”. This will take you to private browsing mode. 

Microsoft Edge: Launch your Edge browser, then click on the three dots button in the top-right corner. Then, click on “New InPrivate window” to open a browser in private mode. 

Firefox: Open Firefox, click the 3-dash menu button near the upper-right, then click New Private Window.

The Benefits of Private Mode

 If you’re concerned about your online privacy, then private browsing is a great way to reduce your worries. Private browsing is convenient for:

  • Not having cookies saved from the websites that you visit, so that you won’t get related adverts later on
  • If you’re using someone else’s computer to login to your email or financial institution, your browsing history is not saved
  • Avoiding rising prices on items by viewing the same item repeatedly

If you want to feel more in control over your data and online privacy, private browsing mode is definitely a great option. 

Get Help Improving Your Online Safety & Privacy

Computer Techs enjoys working with Reno area residents to help them get more from their technology while also keeping their personal data secure. We can help keep you better protected online.  


Also read: Use a DNS filter and DNS encryption to block malicious websites, and keep the websites you visit private from others on your network and internet service provider.


Contact us today with any questions or if you’d like help with Private browsing, DNS filtering or encryption.

Avoid Online Surveys If You Don’t Want to Be Profiled

Filed under: Computing Tips,Internet Tips,Security - Mar 25 2022
Avoid Online Surveys If You Don’t Want to Be Profiled

The next time you’re browsing on your computer, and you see a quiz on Facebook or another social media site that looks appealing, think before you click.

With the political season back upon us, you need to be aware of how the data you share in these quizzes might be used. 

You might not think that a quiz about your favorite foods or personality type will be beneficial to political parties but, these days, you never know. Any data you share could ultimately be used for political profiling.

What is political profiling?

Profiling is a method of analyzing individuals’ data to classify them into groups or sectors. Political parties have used profiling techniques for decades, but it has entered a new realm in light of the internet.

With tools like artificial intelligence and data analytics, political parties can create detailed profiles about individuals and groups, which could even be used to unethically manipulate their political choices through fake news and social media advertisements.

It sounds scary – and it is! Most of us may remember the Cambridge Analytica scandal of 2018. 

In this event, Cambridge Analytica collected the data of millions of people via an app called This Is Your Digital Life. The app was an online survey that asked users questions about their political preferences and personality traits. All of the answers given in this quiz were then used for data analysis during the 2016 presidential election campaign. 

As a side note, if you’re worried about third parties having access to your data, contact us. We can help you improve your online data privacy and reduce unwanted advertisements. 

How do political parties use profiling? 

Profiling is used as the basis for targeted online content that is aimed at specific, tailored audiences. With Facebook ads, political parties can create highly personalized content and choose who to share it with, so they know it will have the most impact. 

Unfortunately, because Facebook and other social media sites allow such targeted ads, this means that end users don’t get a complete or fair picture of the political sphere. You may only see specific messages over and over again, which can lead to misinformation and swing votes unfairly. 

What should I do to avoid being profiled?

Aside from avoiding online surveys, you can do a few things to help prevent the spread of misinformation during the political season. You might think that these ads won’t target you, but older citizens are actually a prime demographic for political parties. 

Research shows that older adults were exposed to more misinformation on Twitter during that election. Plus, older voters in the U.S. are also consistently more likely to vote than younger groups.

To ensure fair political outcomes, it’s important to educate yourself on the spread of false information. While players like Facebook and Twitter are working to stop the spread of fake news, you also need to do your own due diligence. 

  1. Always fact check before sharing a post on social media. This will make sure that you only spread accurate, legitimate news and stories.
  2. Check the source of the news or story before your share. Mainstream news is the best source you can rely on. Information shared by a friend or relative – unless it is a first person account – is not always reliable, as you don’t know where they might have shared the story from. 
  3. Look out for what the story is trying to prove or disprove. Often, fake news stories will have a clear agenda, such as discrediting a person or group of people. If a story is hammering into one person or group, there may be bias motivations behind it. You should also be wary of stories from a specific political party or candidate, as they have a clear agenda to show themselves in a better light and discredit their opponents. 
  4. Watch out for highly emotive stories. While some news stories may make you feel sad or shocked, some fake news pieces are designed to elicit an emotive response. By making you feel something, fraudsters are hoping you will react quickly – without thinking it through. 
  5. Be aware of your own confirmation bias. If you see a story that aligns with your views and emotions, you’re more likely to believe it. This phenomenon is known as confirmation bias. In line with this, people over 65 were more likely to share false or misleading content on Facebook during the 2016 presidential campaign. If your data is being used for profiling, you’ll likely see many stories like this. Just by being aware of profiling and confirmation bias, you can prevent the spread of misinformation. 

Improve your online privacy today!

If you want support with improving your online privacy and data protection, reach out to us.

« Previous PageNext Page »