Don’t Take the Bait! Avoid “Phishing” Lures to Protect Your Identity

Don’t Take the Bait!  Avoid “Phishing” Lures to Protect Your Identity

So my wife asked me the other day, “Why are we getting this?”  She was referring to an email we received that said, “Your Federal Tax Payment ID:  9387589 is failed.”  I could see she was a little concerned and wanted to resolve it right away.  And that’s exactly what they want.  That’s how they get ya!  Get an unsuspecting but otherwise conscientious person, who has their stuff together, to respond quickly without questioning or verifying things.  They just want to address it and get it resolved.  Normally that’s a good thing.

Poor grammar notwithstanding, I knew without even reading the body of the email that it was a hoax – a scam.  How?  For starters, I don’t owe Uncle Sam any money for taxes last year or the several years prior.  Secondly, the number referenced in the email doesn’t even contain the correct number of digits to be a valid Social Security or tax ID number.  Even if it did, the number they provided was nowhere near my SSN.  Plus, I don’t own a business, so I don’t have a “Federal Tax ID Number” (also called an EIN “Employer Identification Number”).

Among the other clues indicating the request was bogus is the fact that our Federal government does not notify taxpayers of delinquencies, rejected tax returns, or failed electronic payments by way of an email message.  And if by chance they did, I’d hope it wouldn’t come from some random joker named “Francisco Maghee”.  Not to mention, “Francisco’s” email address prefix was a string of gibberish — “ghnqcsuvktecvy” to be exact.  Never mind that a quick Google search of the domain used in the email address (everything after the “@” symbol) revealed that a spammer had been using a legitimate organization’s domain as the “From” address on their spam emails .  And that was a far cry from a “.gov” top-level domain (TLD), which you’d expect to see from a government agency like the IRS.

Another red flag was the attachment, which I did not open!  It was an executable file (its name ended in “.exe”), which you should never click on or open, unless you’re absolutely sure of what the file contains and that it came from a trusted source.  Since neither of those conditions were the case, there’s a good chance the sender’s objective was to get one of us to click on, and therefore open, the attached file.  Opening the attachment would launch or run the executable file, possibly containing a virus, trojan, spyware, or other form of malware.  Malware can slow down or break your computer, and can be costly and time-consuming to repair.  Malware could also run a program in the background, without your knowledge, and gather your personally identifiable information (PII) for use without your consent, for evil purposes, and/or to steal your identity.

Identity theft occurs when your PII is stolen, taken without your permission, or obtained under false pretenses.  Your information is then used to do any number of things including making unauthorized purchases on your credit card, opening new credit or bank accounts, and applying for and obtaining a loan, just to name a few.

So, what if you get a “phishy” email like the one I received?  Simple.  Delete it immediately and do not open any attachments!

BOTTOM LINE:  Be skeptical.  Question everything.  Don’t be so quick to respond to inquiries received in an email.  That is, if you even respond at all.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Cell Phones for Teens: Smart or Dumb?

Cell Phones for Teens:  Smart or Dumb?

As parents, my wife and I recently hit a milestone. Our oldest child became a teenager last month. As we all know, your world changes when you hit “Teendom”! But as the world changes, so does the list of “Things That Change When You Become a Teenager.” One item that wasn’t on our lists when we went through this rite of passage was getting our first cell phone. A what phone? I know, right?

So here we are. Several of our son’s friends have already had their own cell phones, some for a year or two before they hit their teens. So naturally, the number one thing on our soon-to-be teen’s birthday wish list was a phone of his own.

Our first question: “Is a 13-year old mature and responsible enough for his own cell phone?” Well, we felt that he’d demonstrated the requisite responsibility and he’d patiently waited long enough. He had earned the opportunity to prove us right or wrong, as the case may be. So that decision was easy. But the questions get tougher. There are many more decisions to make, like, “what type of phone?” A smart phone or a feature (dumb) phone? Uhh…

This question raises much debate but there’s probably no one right or wrong answer. Many parents feel a child should not have a smartphone, with all its functionality, until they are of driving age. Among some of the concerns about giving your child a smartphone (at any age), include:

  • Games and apps can be addicting and discourage socialization and interaction with others. Not to mention, if that’s your child’s primary use of the smartphone, you’re paying a lot of money for a toy.
  • A lot of time spent on a smartphone can discourage a child from getting up and moving around. This lack of exercise can lead to overweight or obese children.
  • Too much time spent looking at small screens can weaken a child’s eyesight.
  • During the adolescent years, high exposure to smartphones can adversely affect brain development, possibly leading to shortened attention spans.
  • “Checking-in” publicly to places or from locations via social media platforms or apps, such as Facebook or Foursquare, can potentially jeopardize your child’s safety and security by making their whereabouts known to predators lurking online.
  • Smartphones can be used to bully other kids or lend to your child becoming the victim of cyber-bullying, whether it’s through social media platforms, texting, instant messaging, or other apps.

Many of the concerns about teens with smartphones aren’t much different from those that exist for kids with iPod Touches or other mobile Wi-Fi enabled devices, like tablets. A few differences between smartphones and iPods or tablets include costs and managing Internet access. Wi-Fi mobile devices are generally less expensive than smartphones, mainly because there is no requirement for a monthly data plan as with cell phones. Additionally, since Wi-Fi service is required, the iPods and tablets are more likely to be used at home, where parents can more closely monitor online activities.

So, if you can work through the list of cons and none of them are show stoppers for you, take a look at the convenience and accessibility that smartphones offer. Smartphones provide many advantages to parents, as well as children, including the following non-exhaustive list:

  • Parental controls are available for smartphones. Some are included in the operating system. Apple’s iOS allows you to turn on or off everything from the Safari Internet browser to YouTube to multi-player games in the Game Center. iOS restrictions also allow you to control access levels to movies, songs, and apps based on their ratings. For smartphones on other platforms like Android, the controls aren’t part of the operating system but there are several apps available for parents to control access and monitor activity.
  • Smartphones also allow you to keep tabs on your child using mobile apps and desktop programs like Google Latitude. Assuming their devices are with them, you can use smartphones to track your kids’ whereabouts at all times to make sure they are safe. This can be done without using any of the check-in services from one of the many social networking platforms. All the major wireless phone carriers have services that let you track the location of family members. There are several free apps that allow you to do this with no service fees, such as Apple’s Find My iPhone or the family app Life360 Family Locator.
  • Another benefit of smartphones is they provide access to additional learning resources, including apps for arts, math, science, spelling, foreign languages, and many more.
  • Smartphones also enable your child to easily find phone numbers or information they need online.
  • Google Navigation means your child shouldn’t get lost (or at least won’t stay lost for long).
  • Smartphone calendars can assist your child in remembering homework due dates, other important events and teach them how to manage their time and schedules.

It’s also becoming more and more difficult to find non-smartphone offerings from the phone carriers. The choices for feature phones are dwindling and the cost differences between the two types of phones are narrowing. It costs nearly as much to purchase a “dumb” phone as it does a smartphone. Pretty soon, that decision will be a moot point, as the decision will be made for you.

The bottom line is, for good or for bad, smartphone technology is here to stay. The key is to make it work for you and your family. Parental instruction and guidance about this technology are the most important parts of the equation. Establish rules and expectations for your teen’s cell phone usage and the potential consequences for failing to abide by those requirements. Clearly stating what constitutes appropriate use, as well as unacceptable activities, are important elements. Explain to your child that you want them to have the best communication tools available but that their use of them is a privilege and not a teenage right.

Formalize this notion by having a written cell phone agreement or contract that your child signs to indicate their acknowledgment of the rules, expectations, and consequences that govern their cell phone usage. Consider including stipulations in the agreement, such as a statement that they are not to share their location (aka check-in via social networking apps) with anyone other than your family and/or your tight network of friends.

Above all, don’t dread hooking your teen up. Help them get connected but do it on your terms by managing it and everything will work out just fine! How do you feel about the whole “cell phones for teens debate?” Smart or Dumb?

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

New But Infected with Nitol

New But Infected with Nitol

Is nothing sacred anymore? Apparently not! When you buy a brand spankin’ new computer, you expect it to be pristine. You also expect it to work perfectly and be free of any infections or viruses. But that’s no longer a given. There’s a chance that fabulous new machine you just paid several Benjamin’s for could be infected with malware, even before you take it out of the box and remove all the packing.

Now, this doesn’t warrant a widespread panic but it is worth a little attention, especially if you’re in the market for a new computer and you’re a bargain hunter who shops the Internet looking for a deal.

The hubbub is all about the recent report of malware called Nitol. The malicious computer code was found on brand new computers purchased in China. In a nutshell, this all came to light when a team of researchers from Microsoft’s digital crimes unit began an investigation last year. They were looking into the sale and distribution of counterfeit copies of the Windows operating system software. The team purchased twenty new computers from retailers in China. They later found the computers were all equipped with counterfeit copies of Windows. Four of the machines already had malware of some variety on them, and one contained the active Nitol infection.

Once powered up and connected to Internet, a computer with Nitol hidden on its hard drive begins searching for other computers over the Internet. Once it finds one, the new computer instantly becomes part of a botnet, or collection of compromised computers, which is a world-wide criminal network that can attack websites, steal personal information, and take money from bank accounts. This is one of the most invasive and persistent forms of cybercrime. More details about the investigation, called Operation b70, can be viewed in a Microsoft blog post.

So, what’s one to do? Try following these tips when purchasing your new computer and you should be one step ahead of the bad guys:

  • Consider the source for your new computer hardware and software purchases. Saving a few bucks up front could cost you a lot more in the long run. It’s not worth buying from a sketchy seller.
  • Make sure you obtain the proper licensing documentation for the software (especially the operating system) that’s installed on your new computer. Don’t accept any excuses or explanations for not receiving it. Even if there’s no malware involved, without a legitimate copy of the operating system, at best you won’t get any technical support for the software and at worst, you won’t be able to activate the software at all.
  • Ensure your operating system is up to date, even on a brand new machine. Several updates may have been issued from the time the operating system was installed on your computer to when you actually use it for the first time.
  • Make sure you have an antivirus software program before you go online or, at least, make that your first order of business on the Internet. Consider an “Internet Security” program, over just an antivirus program, to ensure you also have a firewall component included. However, your Windows operating system does include a firewall, so be sure to use one or the other.
  • Check to see if your antivirus or Internet security program includes a spyware detection feature or an anti-spyware program. If it doesn’t, consider downloading one.
  • Ensure your firewall is software is turned on.

To see additional information about Nitol and botnets visit the following links:

Microsoft taking on aggressive new Nitol botnet
Microsoft takes down another botnet, Nitol

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Home Safety And Social Media

Home Safety And Social Media

I like to think of myself as pretty savvy when it comes to online safety and security, but this post is all about how even the most “wired” people can slip up and expose themselves to the dark side of social media.

When a family member passed away, I used my various social media accounts as an outlet to relieve some of the tension that surrounds an event like this. Facebook, in particular, was a great platform for me to let it all out, and in turn, to hear from friends and family and share stories. I keep my Facebook locked down pretty tight, only letting in actual real-life friends, family members, etc. I’m always checking my privacy settings and tweaking things as necessary, too, so I wasn’t really worried about letting too much information out there since I wouldn’t “Friend” anyone on Facebook if I didn’t know and/or trust them. I do the same thing on my other social media accounts, too, but it’s really only on Facebook where I delve into more personal things with any regularity.

The funny thing about online safety and security, especially regarding social media, is that it’s often the setup of your account that can get you in trouble, not necessarily the details of the message you’re sending out.

On the day of the funeral I posted that I was going, and I even listed what time it was. It seemed pretty innocuous when I posted it, but minutes later a friend messaged me, suggesting that I have someone we trust watch where we live while we’re gone, because there are groups of people who target funeral goers and rob their homes while they’re away for a few hours. She even knows of people who this actually happened to, so her message hits a little closer to home.

That didn’t even occur to me! Here I think I’m Mr. Safety, and someone else points out a security issue to me. In the immortal words of Homer Simpson… D’oh! Granted, I had a lot on my mind, but still… It just helps reinforce that no matter how prepared you are, there’s always a new tip or trick to learn that will help keep things safe and secure, and can come from anywhere and from anyone.

Well I quickly scrambled to find a trusted person to keep an eye on the place, and I’m happy to say that we came back to an unsullied home.

I’ve put together a list of events and activities that could possibly be exploited if you make your plans public. I figured a good bakers dozen would be a fine start, but this is definitely not an exhaustive list.

  • Vacations
  • Weddings
  • Births
  • Funerals
  • Graduations
  • Birthdays
  • Grocery stores
  • Shopping
  • Family visits
  • After-work events
  • Movies
  • Theater performances
  • Concerts

The long and the short of it is that you’d be a lot safer holding off on any pre-event social media messages. Wait until it’s over and then make a post if you want. It’s better to be safe than sorry!

If you have any similar stories, or if you can think of a few events or activities that people might want to watch out for when posting, please let us know in the comments below.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Tech-Related Resolutions For 2012

Tech-Related Resolutions For 2012

A new year brings new opportunity for us all to change our old habits for new ones. Take me, for example. I’ve set up a few resolutions for myself that include getting healthier, spending more time with my family, and learning a new programming language. Maybe you want to dedicate more time to a hobby, or finish up that project car that’s been sitting in your driveway since 1998. 🙂

New Year resolutions are kind of a laugh to most people, because we all know that as humans, we’re loathe to change on our own. We all get used to doing things a certain way unless life kicks us in the behind to do something about it. But this year, you and I can make a positive change before something bad happens.

I’ve got 3 super simple things you can do to make the technology-related side of your life better. Each of these will either save your life (seriously), save you from embarrassment &/or identity theft, and save you from the wrath of a loved one for losing important files… like wedding photos, etc. Read on:

  1. Resolve to be safe with technology

    Some of you probably laughed when I said a tech-related resolution could save your life, but this really could: Use your tech and gadgets only when appropriate. I’m looking right at you, car texters. But it goes beyond texting while driving. Stop messing with your GPS devices, using your cell phone without a hands-free device, and even fiddling with your stereo settings while driving. A click here or there to change a station or re-route your GPS is one thing, but I’ve seen a lot of people concentrating more on the gadgets than the road. Don’t be the one who becomes a statistic!

  2. Resolve to change your passwords

    This will be, by far, the easiest and best thing your can accomplish in this resolution list. For every service you use, whether a bank, Facebook, or Amazon.com, change the password. You and I both know that it’s been a while. Maybe not for every login you have, but if you’re like most people then many (or even most) of the services you use haven’t seen a password update since you first signed up.

  3. Resolve to back up your important files

    With services like Dropbox, making backups of important files like your digital photos is easier than ever. And if you’re worried about putting sensitive data in the cloud then do what I did: Buy yourself an external USB hard drive and back them up there. Even if all you did was a straight copy and paste from your desktop or laptop to your external drive, you’d have the peace of mind that your files are safe. I have a friend who lost all of his wedding photos because of a hard disk crash, and let’s just say it wasn’t pretty to hear about the wrath of his lovely wife.

I sincerely hope you take those 3 simple changes to heart. You’ll find that they aren’t tough to do, and you’ll be a lot safer in the long run by doing them. Here’s hoping you and your loved ones enjoy a happy, safe, and technology filled 2012!

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Clever Tactics Against Clever Spyware

Clever Tactics Against Clever Spyware

Malware continues to grow in both complexity and subtlety, and you’ve got to keep a constant vigil against viruses & spyware to protect your computer and tech gadgets. Virus and spyware detection tools (like our own StopSign Internet Security software) are great, but real computer security starts with you. Knowing what malware comes to us as (i.e. in what form it lands on our computer) is a key to recognizing what to click and what to avoid.

Pictures and software downloads have long been associated with malware. This isn’t to say that all pics and downloads are bad, but it’s best to keep an eye on them before you open them up. Especially if you receive them out of the blue or from an unknown source. Listed below are some different PC security tactics you can use when it comes to attempting to weed out any bad software or files from hopping onto your computer. None of them are foolproof, but they can be a big help in getting rid of potential problems.

  • The Browser Shuffle:

    If you maintain 2 or more different browsers (Internet Explorer and Firefox, for example), you can keep one of them locked down for secure usage (no cookies, no JavaScript, no proxies, etc.) and the other for general surfing. If you find yourself needing to browse to new or unfamiliar sites, just switch over to your secured browser. With fewer parts for potential malware to play with, you’ll help yourself by decreasing your chances of getting a computer infection.

  • Cache/Trash Control:

    I always recommend checking the option (if available) to automatically clear our your browser cache when closing the browser. This makes it a easy way to keep any potential snags away from the browser. It also clears up room for newer bits and pieces of the pages you surf.

  • Dropbox Downloads:

    Using a service like Dropbox will help keep your Inbox cleaned up, and it will also limit who you serve your files to, or who you are served files from. For example, if you know your friend Billy is going to send you a file, have him use Dropbox to keep it clean. This way you’ll know that any new files from Billy in your Inbox might be suspect. (Or it could just mean Billy forgot to use Dropbox)

  • Just Say No:

    Maybe you don’t want to download Billy’s latest funny picture or whatever he’s sending you today. Dropbox or no, just don’t click it. The less you bring into your computer, the less likely you’ll be hit by anything nasty like malware. We’ve all got a friend like Billy who likes to send us lots of junk, don’t we? 🙂

It’s all about being smart about who’s files you choose to open up and/or download, as well as what you keep around. Steering clear of unexpected files is a big first step, but there are plenty of ways to still get the ones you want.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.