Podcast 1708 The Taxman Cometh! Phiting Phishing! and Live Open Line Q&A

[vc_row][vc_column][vc_single_image image=”13704″ img_size=”large” alignment=”center”][vc_separator color=”black” border_width=”3″][vc_cta h2=”Click below to listen to this week’s podcast.”]
  1. Click here to listen to this week’s podcast
  2. Clicking on the link at the bottom of this page
  3. Subscribe to “Internet Advisor Podcast Feed”  on iTunes
  4. Use your favorite Podcast App or
  5. Find our shows at Podcast Detroit.com
[/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text]Cal Carson has some timely tips for you folks who have not gotten  you incoming tax return done yet. He will share files that you need to prep and talk about income tax prep software.  It’s inevitable: the Taxman Cometh!!!

 

Click Here to Listen to Tax Preparation[/vc_column_text][vc_separator color=”black” border_width=”3″][vc_column_text]

Five ways to spot a phishing email  (from CIO Magazine)

1. Expect the unexpected

In a 2016 report from Wombat Security, organizations reported that the most successful phishing attacks were disguised as something an employee was expecting, like an HR document, a shipping confirmation or a request to change a password that looked like it came from the IT department.

Make sure to scrutinize any such emails before you download attachments or click on any included links, and use common sense. Did you actually order anything for which you’re expecting a confirmation? Did the email come from a store you don’t usually order supplies from? If so, it’s probably a phishing attempt.

Don’t hesitate to call a company’s customer service line, your HR department or IT department to confirm that any such emails are legitimate – it’s better to be safe than sorry.

2. Name check

If you receive an email or even an instant message from someone you don’t know directing you to sign in to a website, be wary, especially if that person is urging you to give up your password or social security number. Legitimate companies never ask for this information via instant message or email, so this is a huge red flag. Your bank doesn’t need you to send your account number — they already have that information. Ditto with sending a credit card number or the answer to a security question.

You also should double-check the “From” address of any suspicious email; some phishing attempts use a sender’s email address that is similar to, but not the same as, a company’s official email address.

3. Don’t click on unrecognized links

Typically, phishing scams try to convince you to provide your username and password, so they can gain access to your online accounts. From there, they can empty your bank accounts, make unauthorized charges on your credit cards, steal data, read your email and lock you out of your accounts.

Often, they’ll include embedded URLs that take you to a different site. At first glance, these URLs can look perfectly valid, but if you hover your cursor over the URL, you can usually see the actual hyperlink. If the hyperlinked address is different than what’s displayed, it’s probably a phishing attempt and you should not click through.

Another trick phishing scams use is misleading domain names. Most users aren’t familiar with the DNS naming structure, and therefore are fooled when they see what looks like a legitimate company name within a URL. Standard DNS naming convention is Child Domain dot Full Domain dot com; for example, info.LegitExampleCorp.com. A link to that site would go to the “Information” page of the Legitimate Example Corporation’s web site.

phish email3IDG

A phishing scam’s misleading domain name, however, would be structured differently; it would incorporate the legitimate business name, but it would be placed before the actual, malicious domain to which a target would be directed. For instance, Name of Legit Domain dot Actual Dangerous Domain dot com: LegitExampleCorp.com.MaliciousDomain.com.

To an average user, simply seeing the legitimate business name anywhere in the URL would reassure them that it was safe to click through. Spoiler alert: it’s not.

4. Poor spelling and/or grammar

It’s highly unlikely that a corporate communications department would send messages to its customer base without going through at least a few rounds of spelling and grammar checks, editing and proofreading. If the email you receive is riddled with these errors, it’s a scam.

You should also be skeptical of generic greetings like, “Dear Customer” or “Dear Member.” These should both raise a red flag because most companies would use your name in their email greetings.

phish email1IDG

5. Are you threatening me?

“Urgent action required!” “Your account will be closed!” “Your account has been compromised!” These intimidation tactics are becoming more common than the promise of “instant riches”; taking advantage of your anxiety and concern to get you to provide your personal information. Don’t hesitate to call your bank or financial institution to confirm if something just doesn’t seem right.

And scammers aren’t just using banks, credit cards and email providers as cover for their scams, many are using the threat of action from government agencies like the IRS and the FBI to scare unwitting targets into giving up the goods. Here’s the thing: government agencies, especially, do not use email as their initial means of communication.

 

1708 Phishing Watch list[/vc_column_text][vc_separator color=”black” border_width=”3″][vc_column_text]

 MiTechNews Headlines for March 4, 2017

Mike Brennan 5-1-16Click Here to subscribe to this FREE weekly tech newsletter.

Click Here to Listen to MiTechNews Headlines for 3-4-17

Catch Mike Brennan and Matt Roush on their new podcast: M2 TechCast, live, Mondays at 3PM on PodcastDetroit Network.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_separator color=”black” border_width=”3″][vc_column_text]

Show Notes

Hour 2: Answering Listener Questions

Foster, Gary, Cal and ED

We finally have all of the crew back from either cruising the high seas (Cal and Shane) or looking for a boat with which to eventually cut the waves (Gary).

If you would like to have us answer your questions, please send us your inquiries through the Contact Us form at the top right hand corner of our homepage or through the Comment Section at the bottom of the Show Notes right next to the podcast download button.

We love to hear from you and have a wealth of information about Mac systems (Cal), Windows OS (Ed, Gary and Shane) and Social Media sites (Sheri Kam).

 

Click Here to Listen to Hour 2 Listener Q&A[/vc_column_text][vc_separator color=”black” border_width=”3″][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]

Welcome Network Affiliates

WJRW

AM

1340

Grand Rapids

Sun 1p-2p

WJIM

AM

1240

Lansing

Sun 2p-4p

WKMI

AM

1360

Kalamazoo

Sun 12p-1p

WKLQ

AM

1490

Whitehall/

Muskegon

Sat 4p-6p,

Sun 12p-2p

o.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

computer-nerdTrusted Local Computer Repair Shops 

These local computer shops have been recommended by you the listeners for good, honest service and reasonable costs.  Let us know your favorite local computer shop so we can share it with your neighbors and friends.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

(Visited 220 times, 1 visits today)