{"id":3663,"date":"2023-01-31T07:33:00","date_gmt":"2023-01-31T15:33:00","guid":{"rendered":"https:\/\/computertechsreno.com\/tips\/?p=3663"},"modified":"2023-12-18T07:28:24","modified_gmt":"2023-12-18T15:28:24","slug":"social-engineering-scams-becoming-more-common-than-computer-viruses-what-you-need-to-know-to-avoid-them","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/social-engineering-scams-becoming-more-common-than-computer-viruses-what-you-need-to-know-to-avoid-them\/","title":{"rendered":"Social engineering scams becoming more common than computer viruses &#8211; What you need to know to avoid them"},"content":{"rendered":"\n<a href=\"https:\/\/computertechsreno.com\/tips\/social-engineering-scams-becoming-more-common-than-computer-viruses-what-you-need-to-know-to-avoid-them\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/social-engineering-scams-becoming-more-common-than-computer-viruses-what-you-need-to-know-to-avoid-them\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n\n\n\n<p>When I started Computer Techs in 2003, the most common danger on the computer was the virus. The computer virus was often spread through email attachments. Fast forward 20 years, now the most common danger is social engineering scams. And what was once just random guesses of people\u2019s email addresses, now scammers also use phone numbers to call or send messages to contact their potential victims.<\/p>\n\n\n\n<p>These days scammers and hackers have a lot more information about you due to website data breaches and the treasure trove of information that has been exposed about you &#8211; such as your name, email\/physical address, phone number &#8211; and sometimes passwords. They often use that information to send emails, text messages or phone calls to persuade you to that there\u2019s a problem that needs immediate attention. Examples of what they want you to do include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click a link or open an email attachment. Links often lead to look-alike websites in which you are asked to provide personal information &#8211; such as username and password &#8211; or even financial information<\/li>\n\n\n\n<li>Call a number provided in the email or message so that you can dispute a (false) charge or purchase that was made<\/li>\n\n\n\n<li>Request remote access to your computer or smartphone to fix or help with an account problem<\/li>\n<\/ul>\n\n\n\n<p>When you receive such messages or calls &#8211; do not act immediately, it\u2019s likely a scam. Instead read the following information to help you determine the authenticity of what you just received.<\/p>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/can-you-spot-a-phish-check-out-these-phishing-and-fake-email-examples\/\" target=\"_blank\" rel=\"noreferrer noopener\">Can you spot a \u201cphish\u201d? Check out these phishing and fake email examples &#8211; Computer Techs<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-014\" target=\"_blank\" rel=\"noreferrer noopener\">Avoid Social Engineering and Phishing Attacks &#8211; CISA<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\">What is Social Engineering? Examples and Prevention Tips &#8211; Webroot<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/this-years-top-5-scams-to-watch-out-for\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top 5 computer and phone scams to watch out for &#8211; Computer Techs<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I started Computer Techs in 2003, the most common danger on the computer was the virus. The computer virus was often spread through email attachments. Fast forward 20 years, now the most common danger is social engineering scams. And what was once just random guesses of people\u2019s email addresses, now scammers also use phone [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,9,14,13,4],"tags":[],"class_list":["post-3663","post","type-post","status-publish","format-standard","hentry","category-computing-tips","category-internet-tips","category-passwords","category-scams","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=3663"}],"version-history":[{"count":3,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3663\/revisions"}],"predecessor-version":[{"id":3680,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3663\/revisions\/3680"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=3663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=3663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=3663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}