<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>scams &#8211; Hopedale Technologies</title>
	<atom:link href="https://www.hopedaletech.com/tag/scams/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.hopedaletech.com</link>
	<description>Computer Sales and Services</description>
	<lastBuildDate>Tue, 27 Jan 2026 20:11:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.hopedaletech.com/wp-content/uploads/2021/06/cropped-ht_logo3-32x32.png</url>
	<title>scams &#8211; Hopedale Technologies</title>
	<link>https://www.hopedaletech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">175068569</site>	<item>
		<title>ClickFix: The Scam That Learned a New Trick</title>
		<link>https://www.hopedaletech.com/clickfix-the-scam-that-learned-a-new-trick/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 20:11:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=12884</guid>

					<description><![CDATA[Most people have finally learned not to open random files or install programs from strange websites. That is real progress.&#160; The problem is that scammers have adapted. They have taken an old attack and reshaped it into something that blends into habits we barely think about, such as passing a CAPTCHA or completing a two-factor [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Most people have finally learned not to open random files or install programs from strange websites. That is real progress.&nbsp;</p>



<p>The problem is that scammers have adapted. They have taken an old attack and reshaped it into something that blends into habits we barely think about, such as passing a CAPTCHA or completing a two-factor step.</p>



<p>This newer version of the ClickFix scam feels routine, which is exactly why it works. As a computer repair business, we are seeing it more often, so here is a clear explanation of how it works and how to avoid it.&nbsp;</p>



<h2 class="wp-block-heading"><strong>The older ClickFix method was easier to spot</strong></h2>



<p>The original version relied on fear. A website would loudly claim your computer had a fault. It would then mention corrupted files or pretend your system was failing, then guide you to open a powerful system tool using a keyboard shortcut that only IT professionals usually touch. Tools such as Command Prompt, PowerShell, and Terminal were never meant for everyday use, which is why the instructions stood out.</p>



<p>Once the tool was open, the page would display a block of characters for you to paste in. It never looked readable, just a jumble that appeared technical enough to trust. Pressing Enter quietly downloaded malware from a criminal server, and you never saw a pop-up or progress bar. The command was encoded so the real action was hidden from view.</p>



<p><strong>READ MORE:</strong>&nbsp;&nbsp;<a href="https://www.hopedaletech.com/how-using-the-slam-method-can-improve-phishing-detection/" target="_blank" rel="noreferrer noopener">How Using the SLAM Method Can Improve Phishing Detection</a></p>



<p>Over time, people learned to ignore dramatic error messages. The scare tactics stopped working, so the scammers changed tactics.</p>



<h2 class="wp-block-heading"><strong>The new version hides inside fake verification steps</strong></h2>



<p>Now, the scam appears inside something that feels legitimate. Instead of warning you about problems, the website pretends it needs to verify that you are a real person. It might look like a Cloudflare check, a Google-style CAPTCHA, or even a verification screen on a site that appears related to a hotel or booking service you actually use. Some victims even reach these pages through links sitting at the top of search results.</p>



<p>Everything looks normal until the page tells you to complete the verification by copying a code into Terminal, Command Prompt, or PowerShell.</p>



<p>Because we are used to extra login steps, the request feels like a mild inconvenience rather than a warning sign. That single line of encoded text is the attack. Once you paste and run it, the computer silently contacts a malicious server, downloads malware, and installs it without any visible sign.</p>



<h2 class="wp-block-heading"><strong>Why this new approach works</strong></h2>



<p>People trust verification steps. CAPTCHA and two-factor checks appear on nearly every major site now, so they feel familiar, and scammers use that trust to their advantage.</p>



<p>Many people believe they are safe as long as they avoid suspicious downloads. This attack sidesteps that habit entirely, as you are not downloading a file yourself but running the command that fetches it for you.</p>



<p>Because the text is encoded, it looks harmless. Random characters do not raise suspicion. Your computer also treats the action as something you chose to do, which makes it harder for security tools to block.</p>



<h2 class="wp-block-heading"><strong>What the malware does once installed</strong></h2>



<p>The malware that arrives through these commands usually aims to steal information. It can pull saved passwords from your browser, capture authentication cookies, or add remote access tools that allow someone else to connect later. Some versions turn your computer into part of a larger network used for other attacks.</p>



<p><strong>READ MORE:</strong>&nbsp;&nbsp;<a href="https://www.hopedaletech.com/how-to-spot-hidden-malware-on-your-devices/" target="_blank" rel="noreferrer noopener">How to Spot Hidden Malware on Your Devices</a></p>



<p>Most victims notice nothing. Their computer behaves normally while sensitive information leaves in the background.</p>



<h2 class="wp-block-heading"><strong>Where these fake pages appear</strong></h2>



<p>The links to these fake verification pages often come from places that seem trustworthy. Some arrive through hacked hotel or booking accounts containing real reservation data.</p>



<p>Others appear in ads at the top of search results or in routine-looking messages and emails. The scam spreads because the doorway into it feels familiar.</p>



<h2 class="wp-block-heading"><strong>The simple rule that protects you</strong></h2>



<p>You do not need to memorize any technical details. Just remember this.</p>



<p>If a website tells you to open Terminal, Command Prompt, or PowerShell and paste in a code, close the page immediately.</p>



<p>No legitimate website will ever ask a normal user to do that as part of a CAPTCHA or verification step.</p>



<h2 class="wp-block-heading"><strong>If you think you may have done this</strong></h2>



<p>Do not panic, but take action. Stop using the computer for banking or shopping until it has been checked. Change your passwords from another trusted device, then contact us so we can inspect the system properly and remove anything harmful.</p>



<p>The sooner we look at it, the easier it is to fix.</p>



<h2 class="wp-block-heading"><strong>Hopedale Technologies can help keep you safe</strong></h2>



<p>We can scan your computer for hidden issues, adjust your settings for better protection, and provide simple guidance to help you avoid attacks like this. If something ever looks unusual, you can contact us before acting on it.</p>



<p>If you want your computer checked or need a general security cleanup, we are here to help.&nbsp;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12884</post-id>	</item>
		<item>
		<title>7 New and Tricky Types of Malware to Watch Out For</title>
		<link>https://www.hopedaletech.com/7-new-and-tricky-types-of-malware-to-watch-out-for-2/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 13 May 2025 19:58:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=12507</guid>

					<description><![CDATA[Malware is a huge threat in the digital world. It can cause a lot of damage and cost people a lot of money. As technology advances, so do the tactics used by cybercriminals. In this article, we will explore some of the newest and trickiest types of malware. This malware consists of two main parts: [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Malware is a huge threat in the digital world. It can cause a lot of damage and cost people a lot of money. As technology advances, so do the tactics used by cybercriminals. In this article, we will explore some of the newest and trickiest types of malware.</p>



<ol class="wp-block-list">
<li><strong>Polymorphic Malware</strong><br>Polymorphic malware is a type of malware that changes its code every time it replicates. This makes it hard for antivirus software to detect because it looks different each time. Polymorphic malware uses an encryption key to change its shape and signature. It combines a mutation engine with self-propagating code to change its appearance continuously and rapidly morph its code.</li>
</ol>



<p>This malware consists of two main parts: an encrypted virus body and a virus decryption routine. The virus body changes its shape, while the decryption routine remains the same and decrypts and encrypts the other part. This makes it easier to detect polymorphic malware compared to metamorphic malware, but it can still quickly evolve into a new version before anti malware detects it.</p>



<ul class="wp-block-list">
<li>Criminals use obfuscation techniques to create polymorphic malware. These include:</li>



<li>dead-code insertion</li>



<li>subroutine reordering</li>



<li>register reassignment</li>



<li>instruction substitution</li>



<li>code transposition</li>



<li>code integration</li>
</ul>



<p>These techniques make it harder for antivirus programs to detect the malware. Polymorphic malware has been used in several notable attacks, where it spread rapidly and evaded detection by changing its form frequently. This type of malware is particularly challenging because it requires advanced detection methods beyond traditional signature-based scanning.</p>



<ol start="2" class="wp-block-list">
<li><strong>Fileless Malware</strong><br>Fileless malware is malicious software that works without planting an actual file on the device. Over 70% of malware attacks do not involve any files. It is written directly into the short-term memory (RAM) of the computer. This type of malware exploits the device’s resources to execute malicious activities without leaving a conventional trace on the hard drive.</li>
</ol>



<p>Fileless malware typically starts with a phishing email or other phishing attack. The email contains a malicious link or attachment that appears legitimate but is designed to trick the user into interacting with it. Once the user clicks on the link or opens the attachment, the malware is activated and runs directly in RAM. It often exploits vulnerabilities in software like document readers or browser plugins to get into the device.</p>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/" data-type="link" data-id="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/">5 Red Flags of Phishing Emails: Think Before You Click!</a></p>



<p>After entering the device, fileless malware uses trusted operating system administration tools like PowerShell or Windows Management Instrumentation (WMI) to connect to a remote command and control center. From there, it downloads and executes additional malicious scripts, allowing attackers to perform further harmful activities directly within the device’s memory. Fileless malware can exfiltrate data, sending stolen information to attackers and potentially spreading across the network to access and compromise other devices or servers. This type of malware is particularly dangerous because it can operate without leaving any files behind, making it difficult to detect using traditional methods.</p>



<ol start="3" class="wp-block-list">
<li><strong>Advanced Ransomware</strong><br>Ransomware is a sophisticated form of malware designed to hold your data hostage by encrypting it. Advanced ransomware now targets not just individual computers but entire networks. It uses strong encryption methods and often steals sensitive data before encrypting it. This adds extra pressure on victims to pay the ransom because their data could be leaked publicly if they don’t comply.</li>
</ol>



<p>Ransomware attacks typically start with the installation of a ransomware agent on the victim’s computer. This agent encrypts critical files on the computer and any attached file shares. After encryption, the ransomware displays a message explaining what happened and how to pay the attackers. If the victims pay, they are promised a code to unlock their data.</p>



<p>Advanced ransomware attacks have become more common, with threats targeting various sectors, including healthcare and critical infrastructure. These attacks can cause significant financial losses and disrupt essential services.</p>



<ol start="4" class="wp-block-list">
<li><strong>Social Engineering Malware</strong><br>Social engineering malware tricks people into installing it by pretending to be something safe. It often comes in emails or messages that look real but are actually fake. This type of malware relies on people making mistakes rather than exploiting technical weaknesses.</li>
</ol>



<p>Social engineering attacks follow a four-step process: information gathering, establishing trust, exploitation, and execution. Cybercriminals gather information about their victims, pose as legitimate individuals to build trust, exploit that trust to collect sensitive information, and finally achieve their goal, such as gaining access to online accounts.</p>



<ol start="5" class="wp-block-list">
<li><strong>Rootkit Malware</strong><br>Rootkit malware is a program or collection of malicious software tools that give attackers remote access to and control over a computer or other system. Although rootkits have some legitimate uses, most are used to open a backdoor on victims’ systems to introduce malicious software or use the system for further network attacks.</li>
</ol>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/new-gmail-threats-targeting-users-in-2025-and-how-to-stay-safe/" data-type="link" data-id="https://www.hopedaletech.com/new-gmail-threats-targeting-users-in-2025-and-how-to-stay-safe/">New Gmail Threats Targeting Users in 2025 (and How to Stay Safe)</a></p>



<p>Rootkits often attempt to prevent detection by deactivating endpoint antimalware and antivirus software. They can be installed during phishing attacks or through social engineering tactics, giving remote cybercriminals administrator access to the system. Once installed, a rootkit can install viruses, ransomware, keyloggers, or other types of malware, and even change system configurations to maintain stealth.</p>



<ol start="6" class="wp-block-list">
<li><strong>Spyware</strong><br>Spyware is malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can monitor your activities, steal your passwords, and even watch what you type. It often affects network and device performance, slowing down daily user activities. Spyware infiltrates devices via app install packages, malicious websites, or file attachments. It captures data through keystrokes, screen captures, and other tracking codes, then sends the stolen data to the spyware author. The information gathered can include login credentials, credit card numbers, and browsing habits.</li>



<li><strong>Trojan Malware</strong><br>Trojan malware is a sneaky type of malware that infiltrates devices by camouflaging as a harmless program. Trojans are hard to detect, even if you’re extra careful. They don’t self-replicate, so most Trojan attacks start with tricking the user into downloading, installing, and executing the malware. Trojans can delete files, install additional malware, modify data, copy data, disrupt device performance, steal personal information, and send messages from your email or phone number. They often spread through phishing scams, where scammers send emails from seemingly legitimate business email addresses.</li>
</ol>



<p><strong>Protect Yourself from Malware</strong><br>Protecting yourself from malware requires using the right technology and being aware of the risks. By staying informed and proactive, you can significantly reduce the risk of malware infections.</p>



<p></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12507</post-id>	</item>
		<item>
		<title>How Scammers Use Your Friends to Steal Your Facebook Account</title>
		<link>https://www.hopedaletech.com/how-scammers-use-your-friends-to-steal-your-facebook-account/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 20:21:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[home computer]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=12141</guid>

					<description><![CDATA[Imagine you receive a message from a friend asking for a little help. They say they are trying to get back into their Facebook account, and they need a special login code that Facebook will send to a trusted friend. It sounds simple, right? You want to help your friend out, but here&#8217;s the catch: [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Imagine you receive a message from a friend asking for a little help. They say they are trying to get back into their Facebook account, and they need a special login code that Facebook will send to a trusted friend. It sounds simple, right? You want to help your friend out, but here&#8217;s the catch: the code they are asking for is actually the key to your account, not theirs. Let&#8217;s dive into how this scam works and how you can protect yourself.</p>



<h2 class="wp-block-heading"><strong>How does this Facebook scam work?</strong></h2>



<p><strong>A friend asking for help</strong></p>



<p>The scam usually starts with a message from someone on your friend list. It could look like they need help recovering their Facebook account or logging in on a new device. They tell you that Facebook will send a verification code to their friends, and they need you to share that code with them.</p>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/time-to-review-your-facebook-settings-again/" data-type="link" data-id="https://www.hopedaletech.com/time-to-review-your-facebook-settings-again/">Time to Review Your Facebook Settings Again</a></p>



<p>The message comes from someone you know, and they&#8217;re asking for help. It seems harmless, maybe even urgent, and who wouldn&#8217;t want to help out a friend in need?</p>



<p><strong>The real danger behind the code</strong></p>



<p>The big problem is that the requested code isn&#8217;t meant for their account. It&#8217;s the code to access your Facebook account. When Facebook sees someone trying to log in from an unfamiliar location or device, it sends a code to the account owner to confirm that it&#8217;s really them trying to log in. This code could be sent via text or email, as part of Facebook&#8217;s two-factor authentication process.</p>



<p>The scammer posing as your friend is actually trying to get into your Facebook account by tricking you into giving them this code.</p>



<p><strong>Where it gets even trickier</strong></p>



<p>This scam can feel especially convincing for a couple of reasons. First, the person reaching out might be using a fake account that looks exactly like your friend&#8217;s, with the same name and profile picture. However, in many cases, the scammer might actually be using your real friend&#8217;s account. They managed to compromise your friend&#8217;s account first, and now they are using it to trick more people – like you. It&#8217;s a chain reaction, where each hacked account leads to more and more victims.</p>



<h2 class="wp-block-heading">How to protect yourself from this scam</h2>



<p><strong>Verify before you act</strong></p>



<p>If a friend messages you asking for a code to help them recover their account, take a moment to verify things first. Don&#8217;t feel rushed. Scammers often rely on creating a sense of urgency. Call your friend directly or message them on another platform to confirm that it&#8217;s really them.</p>



<p><strong>Never share login codes</strong></p>



<p>Remember, any code that Facebook sends to you is meant to protect your account. It should never be shared with anyone, not even friends. If someone asks for a code sent to you, it&#8217;s a red flag.</p>



<p><strong>READ MORE:</strong> <a href="https://www.hopedaletech.com/facebook-cloning-scam/">10 Ways to Protect Yourself from the Facebook Cloning Scam</a></p>



<p><strong>Look out for cloned accounts</strong></p>



<p>If you receive an unusual request from a friend, check their profile. Look at their recent posts, photos, or activity. If anything feels off or incomplete, it could be a fake account designed to look like your friend.</p>



<p><strong>What to do if you fall victim to the scam</strong></p>



<p>If you&#8217;ve already shared a code and suspect someone might have accessed your Facebook account, here are the steps you should take immediately:</p>



<p>Change your password. Update your Facebook password as soon as possible. Make it something unique and hard to guess.<br>Enable two-factor authentication. This adds another layer of security to your account. You can set it up so that login attempts require a code from your phone.<br>Report the incident. Inform Facebook that your account may have been compromised. They can help secure your account and investigate further.</p>



<p><strong>We&#8217;re here to help keep you safe online</strong></p>



<p>Navigating the internet can be tricky, and scams like this are getting more sophisticated every day. If you need help securing your devices, give Hopedale Technologies a call. We&#8217;re here to look after you and make sure your online experience stays as trouble-free as possible.</p>



<p><strong>Stay alert, stay safe</strong></p>



<p>Remember, a little bit of caution can go a long way towards keeping your accounts and personal information safe. If you&#8217;re ever in doubt about a message or request, it&#8217;s always better to double-check. Scammers count on us to act quickly without thinking things through. Let&#8217;s not give them the chance.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12141</post-id>	</item>
		<item>
		<title>Learn How to Spot Fake LinkedIn Sales Bots</title>
		<link>https://www.hopedaletech.com/learn-how-to-spot-fake-linkedin-sales-bots-2/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 15 Aug 2023 13:49:00 +0000</pubDate>
				<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=7291</guid>

					<description><![CDATA[LinkedIn has become an invaluable platform for professionals. People use it to connect, network, and explore business opportunities. But with its growing popularity have come some red flags. There has been an increase in the presence of fake LinkedIn sales bots. These bots impersonate real users and attempt to scam unsuspecting individuals. This is one [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>LinkedIn has become an invaluable platform for professionals. People use it to connect, network, and explore business opportunities. But with its growing popularity have come some red flags. There has been an increase in the presence of fake LinkedIn sales bots.</p>



<p>These bots impersonate real users and attempt to scam unsuspecting individuals. This is one of the many scams on LinkedIn. According to the FBI, fraud on LinkedIn poses a “significant threat” to platform users.</p>



<h3 class="wp-block-heading">Identifying Fake LinkedIn Sales Connections</h3>



<p>Social media scams often play on emotions. Who doesn’t want to be thought of as special or interesting? Scammers will reach out to connect. That connection request alone can make someone feel wanted. People often accept before researching the person’s profile.</p>



<p>Put a business proposition on top of that, and it’s easy to fool people. People that are looking for a job or business opportunity may have their guard down. There is also an inherent trust people give other business professionals. Many often trust LinkedIn connections more than Facebook requests.</p>



<p>How can you tell the real requests from the fake ones? Here are some tips on spotting the scammers and bots.</p>



<p><strong>Incomplete Profiles and Generic Photos</strong><br>Fake LinkedIn sales bots often have incomplete profiles. They’ll have very limited or generic information. They may lack a comprehensive work history or educational background. Additionally, these bots tend to use generic profile pictures, such as stock photos or images of models.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE: </strong><a href="https://www.hopedaletech.com/beware-of-fake-meeting-requests/" target="_blank" rel="noreferrer noopener">Beware of Fake Meeting Requests</a></p>



<p>If a profile looks too perfect or lacks specific details, it could be a red flag. Genuine LinkedIn users usually provide comprehensive information. They do this to establish credibility and foster trust among their connections.</p>



<p><strong>Impersonal and Generic Messages</strong><br>One of the key characteristics of fake sales bots is their messaging approach. It&#8217;s often impersonal and generic. These bots often send mass messages that lack personalization. They may be no specific references to your profile or industry. They often use generic templates or scripts to engage with potential targets.</p>



<p>Legitimate LinkedIn users, typically tailor their messages to specific individuals. They might mention shared connections, recent posts, or industry-specific topics. Exercise caution If you receive a message that feels overly generic. Or one that lacks personalization. Be sure to scrutinize the sender&#8217;s profile before proceeding further.</p>



<p><strong>Excessive Promotional Content and Unrealistic Claims</strong><br>Fake LinkedIn sales bots are notorious for bombarding users. You’ll often get DMs with excessive promotional content and making unrealistic claims. These bots often promote products or services aggressively. Usually without offering much information or value.</p>



<p>They may promise overnight success, incredible profits, or instant solutions to complex problems. Genuine professionals on LinkedIn focus on building relationships. They try to provide valuable insights and engage in meaningful discussions, instead of resorting to constant self-promotion.</p>



<p>Be wary of connections that focus solely on selling and that don’t offer any meaningful content or engagement.</p>



<p><strong>Inconsistent or Poor Grammar and Spelling</strong><br>When communicating on LinkedIn, pay attention to the grammar and spelling of messages. You may dismiss an error from an international-sounding connection, but it could be a bot.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:  </strong><a href="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/" target="_blank" rel="noreferrer noopener">5 Red Flags of Phishing Emails: Think Before You Click</a></p>



<p>Fake LinkedIn sales bots often display inconsistent or poor grammar and spelling mistakes. These errors can serve as a clear sign that the sender is not genuine. Legitimate LinkedIn users typically take pride in their communication skills. They try to maintain a high standard of professionalism. </p>



<p>If you encounter messages with several grammatical errors or spelling mistakes, exercise caution. Investigate further before engaging with the sender.</p>



<p><strong>Unusual Connection Request and Unfamiliar Profiles</strong><br>Fake LinkedIn sales bots often send connection requests to individuals indiscriminately. They may target users with little regard for relevance or shared professional interests.</p>



<p>Be cautious when accepting connection requests from unfamiliar profiles. Especially if the connection seems unrelated to your industry or expertise.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE: </strong><a href="https://www.hopedaletech.com/how-to-stay-safe-while-being-social/" target="_blank" rel="noreferrer noopener">How to Stay Safe While Being Social</a></p>



<p>Take the time to review the requesting profile. Check their mutual connections, and assess the relevance of their content. Legitimate LinkedIn users are more likely to have a connection. They typically send connection requests to others with shared interests or professional networks.</p>



<p><strong>Need Training in Online Security?</strong><br>Spotting fake LinkedIn sales bots is crucial for maintaining a safe online experience. By being vigilant, you can protect yourself from potential scams.</p>



<p>Need help with personal or team cybersecurity training? Hopedale Technologies can improve your scam detection skills.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7291</post-id>	</item>
		<item>
		<title>Stop Using Windows 8.1 and Windows 7</title>
		<link>https://www.hopedaletech.com/stop-using-windows-8-1-and-windows-7/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 06 Jun 2023 17:00:49 +0000</pubDate>
				<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[updates]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=7092</guid>

					<description><![CDATA[Few of us are big fans of change. It can be easier to keep going down that same path or use that same computer software; it’s comfortable and familiar. However, as of January 10, 2023, Microsoft has stopped providing support for Windows 8.1, which means you need to change. It’s time. If you&#8217;re still on [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"></h3>



<p>Few of us are big fans of change. It can be easier to keep going down that same path or use that same computer software; it’s comfortable and familiar. However, as of January 10, 2023, Microsoft has stopped providing support for Windows 8.1, which means you need to change.</p>



<p>It’s time.</p>



<p>If you&#8217;re still on Windows&nbsp;7, you are long overdue. Microsoft stopped providing security updates and technical support for that in January 2020. Microsoft did launch an extended service update (ESU) period for Windows&nbsp;7, but that&#8217;s over, and there&#8217;s no ESU program for Windows&nbsp;8.1.</p>



<p>Microsoft recommends moving to a new device that can run Windows&nbsp;11. They warn against &#8220;performance and reliability issues&#8221; with older, unsupported operating systems. Another option? Upgrade your current device and install a newer operating system on it.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong><a href="https://www.hopedaletech.com/http-www-hopedaletech-com-upgrade-or-buy-new/" target="_blank" rel="noreferrer noopener">Should I Upgrade or Buy a New Computer?</a></p>



<p>You might be suspicious, thinking, &#8220;They just want more of my money,&#8221; but the manufacturer has already supported these tools for ten years. Plus, computing is changing enough that they must keep up with new iterations of Windows. Then, they focus on keeping the latest releases updated and secure.</p>



<h3 class="wp-block-heading"><strong>Benefits of Upgrading to Windows 11</strong></h3>



<p>Statcounter data in 2023 shows that Windows 11 is only on 15.44 percent of Windows systems. Windows 10 has the majority (over 70 percent), but if you&#8217;re one of just under 10 percent of users still on Windows 7, make the change now.</p>



<p>Cybercriminals know that people will wait to make the change, and they find ways to exploit the weaknesses of unsupported software. You are particularly vulnerable when relying on Windows 7 or Windows 8.1.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong><a href="https://www.hopedaletech.com/end-of-windows-7-protect-yourself-from-tech-support-scams/" target="_blank" rel="noreferrer noopener">End of Windows 7:&nbsp; Protect Yourself From Tech Support Scams</a></p>



<p>Windows&nbsp;11 is the latest Microsoft offering. They have worked to reduce risk from the latest cybersecurity threats. With Windows&nbsp;11, you can better protect your files and cut the risk of today&#8217;s viruses and malware.<br><br>The new operating system is built to be more efficient. Microsoft has tweaked the Windows layout and navigation to help users find what they need and perform tasks more efficiently.</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong><a href="https://www.hopedaletech.com/cool-windows-11-features-that-may-make-you-love-this-os/" target="_blank" rel="noreferrer noopener">Cool Windows 11 Features That May Make You Love This OS</a></p>



<p>Not sure what version of Windows you&#8217;re using? In the bottom left of your screen, click the Start Menu and press the Windows button on your keyboard. Then, type &#8220;system.&#8221; Click either the System or System Information icon. Your Windows version is listed at the top of the open window.</p>



<p>Upgrading to Windows&nbsp;11 from 7 or 8 isn&#8217;t free. Only Windows&nbsp;10 users can upgrade at no cost. Also, to upgrade to a Windows&nbsp;11-compatible device, you&#8217;ll need to get a security chip called TPM&nbsp;2.0. You&#8217;ll unlikely find that chip on a computer over four years old.</p>



<p>Hopedale Technologies stocks desktops and laptops with the newest chip technology. We also can special order just what you need from our suppliers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7092</post-id>	</item>
		<item>
		<title>Don&#8217;t Fall for Deepfake Voice Scams</title>
		<link>https://www.hopedaletech.com/dont-fall-for-deepfake-voice-scams/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 02 May 2023 17:21:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6988</guid>

					<description><![CDATA[Deepfake voice scams are increasingly common. And they are convincing. You might get a call from a family member, a celebrity, or a tech support rep who wants your help urgently. Be cautious. Find out more about this new way of accessing your personal information or financial data.  Deepfake has gone mainstream. You&#8217;ve probably seen [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Deepfake voice scams are increasingly common. And they are convincing. You might get a call from a family member, a celebrity, or a tech support rep who wants your help urgently. Be cautious. Find out more about this new way of accessing your personal information or financial data. </p>



<p>Deepfake has gone mainstream. You&#8217;ve probably seen a movie or TV show with a character complaining about images or videos that look real. You should also be wary of deepfake voice scams.</p>



<p>Deepfake is a mashup of the words&nbsp;<em>deep learning</em>&nbsp;and&nbsp;<em>fake</em>. The technology uses artificial intelligence and machine deep-learning algorithms. This can create convincing representations of people for special effects or silly videos, but these fake videos or images can also be more dangerous.</p>



<p>Malicious deepfakes spread false information or can defame or scam people. We&#8217;d like to discuss that in more detail here: Deepfake voice scams.</p>



<p>This type of scam manipulates synthesized speech to convince you someone is saying something they didn&#8217;t actually say. This increasingly common scam tricks you into providing sensitive information or sending money.</p>



<p>Criminals first record a voice sample from their victim. They might use speeches, TikTok or YouTube videos, podcasts, or phone conversations. Then, they turn to a tool such as ElevenLabs, Resemble, Overdub, ReadSpeaker, or Voice.ai. These platforms analyze speech patterns and create a voice mimicking the original. The bad actors can then generate a new speech that sounds like the original speaker said it. They script it, and the Ai voice says it.<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:&nbsp;</strong> <a href="https://www.hopedaletech.com/dont-be-scammed-by-smishing/" target="_blank" rel="noreferrer noopener">Don&#8217;t&nbsp; Be Scammed by Smishing</a></p>



<p>Examples of deepfake scams include creating a voice that mimics a family member. They&#8217;ll script a request for help in an emergency. Or you might get a call from a lawyer claiming to need payment to help defend a family member.</p>



<p>You might also hear from a celebrity who wants you to donate to their charity. The fake voice might also ask for sensitive information such as banking details. After all, who wouldn&#8217;t trust Liam Neeson if he called personally?<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong>&nbsp; <a href="https://www.hopedaletech.com/4-simple-tips-for-safe-internet-banking/" target="_blank" rel="noreferrer noopener">4 Simple Tips for Safe Internet Banking</a></p>



<p>A tech support scam is another common one. The scammer creates a voice for a customer support rep from a prominent company. They request remote access to your computer to &#8220;fix&#8221; a non-existent problem. Instead, they&#8217;ll steal sensitive information such as login credentials or install malware.</p>



<h3 class="wp-block-heading">How to defend against deepfake scams?</h3>



<p>This technology does a good job, and the scam can be very convincing. Be cautious of unexpected requests for personal information or money made by phone. Be especially suspicious if the request appeals to you emotionally to act now.<br><br><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4a1.png" alt="💡" class="wp-smiley" style="height: 1em; max-height: 1em;" />READ MORE:</strong>&nbsp; <a href="https://www.hopedaletech.com/6-ways-to-combat-social-phishing-attacks/" target="_blank" rel="noreferrer noopener">6 Ways to Combat Social Phishing Attacks</a></p>



<p>Confirm before you share sensitive data or transfer money. For example, if you&#8217;re asked to pay a lawyer to help out your grandson in an accident, check in with him first. Or, if someone calls from your internet service provider, use a trusted phone number to confirm their authenticity.<br><br>We can help you combat deepfake scams. We can install email and web filtering, multi-factor authentication (MFA), and endpoint protection. Hopedale Technologies can also watch networks for signs of attack and respond to cut potential damage. Call us today at <strong>508-478-6010</strong>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6988</post-id>	</item>
		<item>
		<title>Don&#8217;t Get Reeled In By Holiday Phishing Attacks</title>
		<link>https://www.hopedaletech.com/holiday-phishing-attacks/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 18:46:00 +0000</pubDate>
				<category><![CDATA[Education]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6080</guid>

					<description><![CDATA[We expect the holiday season to be a time of good cheer,&#160;peace, and goodwill to all, right? Except cyberattackers didn&#8217;t get the memo. They are more likely to attack businesses with phishing attempts during the holidays.&#160;Prevent issues by knowing what to expect. Cybercrime research shows the season “dramatically impacts” the volume of phishing attacks. Phishing [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>We expect the holiday season to be a time of good cheer,&nbsp;peace, and goodwill to all, right? Except cyberattackers didn&#8217;t get the memo. They are more likely to attack businesses with phishing attempts during the holidays.&nbsp;<a href="https://www.hopedaletech.com/phishing-protection/" target="_blank" rel="noreferrer noopener">Prevent issues by knowing what to expect.</a></p>



<p>Cybercrime research shows the season “dramatically impacts” the volume of phishing attacks. Phishing attacks &#8220;spiked to more than 150% above average” the week before Christmas. After the holidays, the number of attacks dwindled significantly.</p>



<p>Why would hackers target a business during the holidays? Because they know things can slow down and people aren&#8217;t paying the same diligent attention. They&#8217;re already mentally out the door sipping eggnog and planning where to do last-minute shopping. Oops! They click on a malicious link or fill out a form seeking sensitive information.&nbsp;<a href="https://www.hopedaletech.com/safe-shopping-online/" target="_blank" rel="noreferrer noopener">Learn how to stay safe shopping online this holiday season.</a></p>



<p>Or they expect you&#8217;re overwhelmed, trying to get everything done before the holidays. Purchase orders, bills, and emails are flying around. They bank on people overlooking details.</p>



<h2 class="wp-block-heading">The Basics of Phishing</h2>



<p><a href="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/" target="_blank" rel="noreferrer noopener">Do you know the 5 red flags of phishing?</a>&nbsp;Phishing uses social engineering to expose security weaknesses and leverages potential vulnerabilities. The hacker dupes someone into responding to a fake request from a bank, vendor, or colleague. They are hoping to get a nibble from unsuspecting employees who don&#8217;t think to:</p>



<ul class="wp-block-list"><li>check the spelling of the URLs in email links;</li><li>be wary of URL redirects to fake sites made to look legitimate;</li><li>question why Jamie in HR needs their access credentials;</li><li>contact the sender of a suspicious email for confirmation before responding.</li></ul>



<p>During this season at the office, everything can feel urgent, and employees are more likely to fall for emails telling them to do something right now. They might not notice that the invoice from a usual supplier has a new bank account number, or they could fall for something dumb because they are distracted or too busy.</p>



<p>Top email subject lines that target employees for phishing attempts include:</p>



<ul class="wp-block-list"><li>&#8220;Undelivered mail&#8221;</li><li>&#8220;HR: Your Action Required&#8221;</li><li>&#8220;HR: Download your W2 now&#8221;</li><li>&#8220;Microsoft Teams: Rick sent you a message.&#8221;</li></ul>



<p>It&#8217;s easy to imagine how someone would click on those without thinking twice.</p>



<h2 class="wp-block-heading">What to Do About Phishing</h2>



<p>You can communicate with employees about the dangers of phishing and educate them about prevention. Also, reiterate policies around payment, wire transfer, data sharing, and sending confidential data.&nbsp;</p>



<p>Other preventative measures include:</p>



<ul class="wp-block-list"><li>Make sure all security updates are current and installed to patch known vulnerabilities.&nbsp;<a href="https://www.hopedaletech.com/why-your-windows-updates-are-more-important-than-ever/" target="_blank" rel="noreferrer noopener">Check out why Windows Updates are more important than ever.</a></li><li>Set up automated filters to check the safety of links in inbound emails before they get to the user.</li><li>Test your infrastructure to identify any weak points.</li></ul>



<p>Finally, if you hire any temporary staff to handle a holiday crush, be sure to limit their access. Then, when their contracts expire, immediately revoke their systems and network access.</p>



<p><strong>If your business is too busy to focus on phishing prevention, we can help.</strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6080</post-id>	</item>
		<item>
		<title>Stay Safe Shopping Online This Holiday Season</title>
		<link>https://www.hopedaletech.com/safe-shopping-online/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Wed, 24 Nov 2021 18:21:00 +0000</pubDate>
				<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Personal Technology]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6055</guid>

					<description><![CDATA[Retail research tells us that over 75% of people are shopping online each month, and, with the holiday season upon us, you’re likely to be one of them. But don’t let the appeal of convenience distract you from the need to stay safe when shopping online. The number of digital buyers is steadily climbing. In [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Retail research tells us that over 75% of people are shopping online each month, and, with the holiday season upon us, you’re likely to be one of them. But don’t let the appeal of convenience distract you from the need to stay safe when shopping online.</p>



<p>The number of digital buyers is steadily climbing. In 2020, according to Statista, more than two billion people purchased goods or services online. During the same year, e-retail sales surpassed $4.2 trillion U.S. dollars worldwide.</p>



<p>Retailers are embracing the change in consumer behavior. But, do you know who else is taking advantage? Cybercrooks. Before you buy, consider these strategies to stay safe.</p>



<h2 class="wp-block-heading">#1 Question that great deal</h2>



<p>If a deal looks &#8220;too good to be true,&#8221; it probably is. You&#8217;re not going to get a new Apple laptop for $29.99 or the latest Beats headphones or Xbox gaming console for under $20. Anyone offering that price is trying to lure you to their site to enter your payment details, so don&#8217;t be surprised when your product never arrives!</p>



<h2 class="wp-block-heading">#2 Review seller feedback</h2>



<p>While scrolling social media, you see ads for perfect gifts for someone on your list. And it&#8217;s so easy to click the link and buy! Still, before purchasing, take the time to research the seller.</p>



<p>Read the feedback from other buyers on independent sources. It adds only a few moments to check sites such as&nbsp;<a href="https://www.yelp.com/" target="_blank" rel="noreferrer noopener">Yelp</a>&nbsp;and&nbsp;<a href="https://www.google.com/" target="_blank" rel="noreferrer noopener">Google</a>.</p>



<h2 class="wp-block-heading">#3 Research the business domain</h2>



<p>Think about it: who are you more likely to trust with your sensitive data? Someone who has been in business ten years or someone who set up shop ten days ago? Quickly check how long a business website has been around. Enter the URL into the&nbsp;<a href="https://lookup.icann.org/" target="_blank" rel="noreferrer noopener">Internet Corporation for Assigned Names and Numbers&#8217; lookup tool</a>.</p>



<h2 class="wp-block-heading">#4 Watch out for&nbsp;<a href="https://www.hopedaletech.com/phishing-protection/" target="_blank" rel="noreferrer noopener">email scams</a></h2>



<p>Before clicking on any offer links in emails, check the URL. You can hover over the link before actually redirecting there and check the target. Double-check that the address is to the site you&#8217;re expecting.</p>



<p>Also, slow down and be sure that the address doesn&#8217;t have any typos or atypical endings. You don&#8217;t want to confuse www.nike.com with www.n1ke.co and end up a victim of identity theft instead of the proud owner of the latest Air Max.</p>



<h2 class="wp-block-heading">#5 Check payment site security</h2>



<p>There are several ways to verify the security of a payment site. These include:</p>



<ul class="wp-block-list"><li>verifying that the site uses an SSL certificate – it will start with &#8220;HTTPS&#8221; instead of &#8220;HTTP&#8221;;</li><li>checking for a physical address and phone number – call the contact number to confirm it&#8217;s not fake;</li><li>reviewing the Terms and Conditions and Return and Privacy policies – any reputable brand has these!</li></ul>



<h2 class="wp-block-heading">#6 Pay with Online Payments</h2>



<p>When you do decide to buy, prefer to pay using PayPal or another online payment tool. You won&#8217;t be giving the seller your credit card details. If you can&#8217;t take this approach, use a credit card from a credit account rather than debit. You will have more protection this way. You can start a chargeback through your credit card company when the item isn&#8217;t as advertised, and the seller&#8217;s customer service doesn&#8217;t help.</p>



<p>Before online shopping, at any time of the year, update your&nbsp;<a href="https://www.hopedaletech.com/why-your-windows-updates-are-more-important-than-ever/" target="_blank" rel="noreferrer noopener">operating system</a>, and keep your&nbsp;<a href="https://www.hopedaletech.com/antivirus/" target="_blank" rel="noreferrer noopener">antivirus software</a>&nbsp;current, too.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6055</post-id>	</item>
		<item>
		<title>7 Tips For Better Cybersecurity</title>
		<link>https://www.hopedaletech.com/7-tips-for-better-cybersecurity/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 12 Oct 2021 17:50:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6017</guid>

					<description><![CDATA[KEEP SOFTWARE CURRENT: Your best bet to protect against viruses, malware, and online threats is to keep your antivirus, browser, and&#160;operating system&#160;up to date.&#160; PROTECT ALL INTERNET DEVICES:&#160; Computers, smartphones, and gaming systems&#160;need antivirus protection. Don&#8217;t forget to use your antivirus software to scan USBs and external devices too. USE AUTHENTICATION WHEN AVAILABLE: Secure&#160;your online [&#8230;]]]></description>
										<content:encoded><![CDATA[
<ol class="wp-block-list"><li>KEEP SOFTWARE CURRENT: Your best bet to protect against viruses, malware, and online threats is to keep your antivirus, browser, and&nbsp;<a href="https://www.hopedaletech.com/why-your-windows-updates-are-more-important-than-ever/" target="_blank" rel="noreferrer noopener">operating system</a>&nbsp;up to date.&nbsp;</li><li>PROTECT ALL INTERNET DEVICES:&nbsp; Computers, smartphones, and gaming systems&nbsp;need antivirus protection. Don&#8217;t forget to use your antivirus software to scan USBs and external devices too.</li><li>USE AUTHENTICATION WHEN AVAILABLE: Secure&nbsp;your online accounts by enabling the most robust&nbsp;<a href="https://www.hopedaletech.com/2-factor-authentication/" target="_blank" rel="noreferrer noopener">authentication</a>&nbsp;tools available, such as biometrics, security keys, or a unique one-time code through an app on your mobile device.</li><li>UNIQUE ACCOUNT, UNIQUE PASSWORD: Different&nbsp;<a href="https://www.hopedaletech.com/got-a-case-of-password-exhaustion/" target="_blank" rel="noreferrer noopener">passwords</a>&nbsp;for every account helps to thwart cybercriminals.&nbsp;Use a password manager such as&nbsp;<a href="https://www.lastpass.com/?irclickid=11oRuc2PzxyIU-LSYLyQdQ62UkBXKlwRuVrB2g0&amp;irgwc=1&amp;clickid=11oRuc2PzxyIU-LSYLyQdQ62UkBXKlwRuVrB2g0&amp;utm_source=impact-radius&amp;utm_medium=affiliate&amp;utm_campaign=affiliate-program" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;to help keep track.&nbsp;</li><li>IF SOMETHING LOOKS SUSPICIOUS, DELETE IT:&nbsp; Links in&nbsp;<a href="https://www.hopedaletech.com/5-red-flags-of-phishing-emails-think-before-you-click/" target="_blank" rel="noreferrer noopener">emails</a>, social media posts, and online advertising are&nbsp;how cybercriminals try to steal your information.&nbsp;</li><li>GET SAVVY ABOUT WI-FI HOTSPOTS: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine.</li><li>PROTECT YOUR $$: When&nbsp;<a href="https://www.hopedaletech.com/4-simple-tips-for-safe-internet-banking/" target="_blank" rel="noreferrer noopener">banking</a>&nbsp;and shopping, check to ensure the site is security enabled. Look for web addresses with “https,” which means the site takes extra measures to help secure your information. “Http” is not secure</li></ol>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6017</post-id>	</item>
		<item>
		<title>Don&#8217;t Be Scammed By Smishing!</title>
		<link>https://www.hopedaletech.com/dont-be-scammed-by-smishing/</link>
		
		<dc:creator><![CDATA[Chris Seaver]]></dc:creator>
		<pubDate>Tue, 05 Oct 2021 17:35:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[Safety and Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.hopedaletech.com/?p=6013</guid>

					<description><![CDATA[Cybercriminals take advantage of current events. So, right now, there are more&#160;“smishing” scams&#160;where crooks claim to have a delivery for you. They text or message you to learn personal details or get you to download malware onto your phone. Beware! Smishing is high up on the list of words that do not sound as intimidating [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals take advantage of current events. So, right now, there are more&nbsp;“smishing” scams&nbsp;where crooks claim to have a delivery for you. They text or message you to learn personal details or get you to download malware onto your phone. Beware!</p>



<p>Smishing is high up on the list of words that do not sound as intimidating or threatening as they should. Smashing the word fishing together with the “SM” for short messaging service (aka text), smishing is a cyberscam.</p>



<p>Especially with online shopping skyrocketing during the pandemic, delivery smishing has gained traction. Don’t fall victim to this type of cyberattack.</p>



<h2 class="wp-block-heading">What does smishing look like?</h2>



<p>You&#8217;ll get a text message that appears to be from a shipping company. You&#8217;re told you have a package coming but that more information is needed to ensure delivery. You&#8217;ll squeal, &#8220;a package!&#8221; OK, maybe you won&#8217;t squeal, but you&#8217;ll feel the anticipation and click on the link to help deliver that package to your door.</p>



<p>You might already be expecting a package. After all, as recently as June 2021, PWC was describing a &#8220;dramatic shift&#8221; toward online shopping. According to its most recent consumer survey, in the last twelve months:</p>



<ul class="wp-block-list"><li>44% of those surveyed bought online using a mobile phone or smartphone;</li><li>42% used smart home voice assistants to shop online;</li><li>38% used a tablet for online shopping;</li><li>34% bought something online via PC.</li></ul>



<p>So, you might not think twice about clicking on a link appearing to be from a major delivery service.</p>



<p>Don&#8217;t do it!</p>



<h2 class="wp-block-heading">What happens next?</h2>



<p>You click on the link and are asked for personal information, even a credit card number or password. Otherwise, clicking on the link will download malware onto your phone. The bad guys use their access to snoop and/or send your sensitive data to its servers without you knowing it.</p>



<p>The smishing scam is a global one:</p>



<ul class="wp-block-list"><li>March 2021 saw a 645% jump in Royal Mail-related phishing attacks, equating to an average of 150 per week.</li><li>UPS warns about this type of fraud on its website.</li><li>FedEx has tweeted the reminder, &#8220;We do not send unsolicited texts or emails requesting money, packages, or personal information. Suspicious messages should be deleted without being opened and reported to abuse@fedex.com.&#8221;</li></ul>



<p>Package delivery isn&#8217;t the only common smishing tactic either. You might also see:</p>



<ul class="wp-block-list"><li>urgent messages saying your bank account is locked;</li><li>a warning from your credit card company about a fraud alert;</li><li>something promising that you&#8217;ve won a great prize;</li><li>an unusual activity report from a company where you have an account.</li></ul>



<p>All that would get your attention, right? So, what do you do about smishing? That&#8217;s covered next.</p>



<h2 class="wp-block-heading">Protect against smishing</h2>



<p>Avoid getting drawn in by the urgency or emotional appeal of the SMS. Don&#8217;t click the link, and don&#8217;t call the number in the message either. Instead, look through your bills or go online into your account for information on contacting that company.</p>



<p>Reputable mail carriers and financial institutions won&#8217;t send text messages asking for credentials, credit card numbers, ATM PINs, or banking information.</p>



<p>Look at the sender more closely. A message from a number with only a few digits was likely sent from an email address, which can flag that it&#8217;s a scam.</p>



<p>Also, don&#8217;t store personal banking or credit card information on your mobile phone. That way, the criminals can&#8217;t access it, even if they get you to download malware onto your phone.</p>



<p>You can help others not to fall victim to smishing as well. Report any attempts to your wireless&nbsp;carrier.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6013</post-id>	</item>
	</channel>
</rss>
