Tag Archives: phishing

spam calls

Block Unwanted Calls, Texts, and Email

By Tracey Dowdy

Recently, I’ve been getting non-stop text messages addressed to someone named Alyssa, who is on her “last chance” to renew her warranty. They are as annoying as they are relentless. I’ve blocked the number and deleted the text without opening it dozens of times. 

I’m not alone. According to YouMail, there were over 58 billion robocalls in 2019. The scams are almost as plentiful as the calls themselves – you’ve won a Caribbean vacation, your PC has a virus, your identity has been stolen, you’ve been selected for a unique opportunity, or won the lottery. You may even get messages purporting to be from a government agency like the IRS. However, the IRS will not call, email, or text you – they communicate almost exclusively through snail mail. 

Wireless carriers are using SHAKEN/STIR technology to identify and block spam calls, on both their respective networks and between phone providers. 

Software giants like Apple have added features that prevent unknown callers from ringing you. Google has made its Call Screen feature more robust by routing suspicious calls to Google Assistant before your phone even rings. When Android 11 is released, it will Include even more robocall identification and prevention features beyond the default Android Phone app. 

If you’re receiving a lot of spam text messages, not just calls, you can forward the message to the number 7726 (spells SPAM). Though it doesn’t immediately prevent the number from texting you, it will allow your carrier to investigate and possibly intervene.

There’s no way to block every spam or robocall, but the FCC suggests taking the following measures to limit the number of calls you receive. 

  • Don’t answer calls from numbers you don’t recognize – let them go to voicemail.
  • Don’t answer calls from blocked or unknown numbers – this tells scammers your number is real, and they can then sell your number to another company, or begin targeting your number more often. 
  • Don’t assume an incoming call is from a local number just because it looks like it is. “Spoofing” technology allows scammers to trick your caller ID into displaying false information like a local area code.
  • Don’t respond to any questions that can be answered with a “Yes.”
  • If someone calls you and claims to be with ABC company, hang up immediately. Use the company’s website to find an official number and call them to verify.
  • If you answer a call and hear a recording such as, “Hello, can you hear me?” hang up.
  • If you’re asked to press a number before being connected to a representative, hang up.

All the major carriers offer some form of call-blocking technology, some free, some fee-based.

AT&T’s Call Protect app is available for iOS and Android. 

Verizon’s Call Filter app is automatically enabled for Android users on a postpaid plan. It’s built into most Android devices out of the box and is available in the App Store for iOS users.

T-Mobile’s Scam ID is free to all customers and includes Scam Block. To enable it, dial #662# from your phone.  

Sprint’s Call Screener Basic was recently launched with a free option for its customers. 

Tracey Dowdy is a freelance writer based just outside Washington DC. After years working for non-profits and charities, she now freelances, edits, and researches on subjects ranging from family and education to history and trends in technology. Follow Tracey on Twitter.

Teach Your Kids Digital Safety With Google’s ‘Be Internet Awesome’ Program

By Tracey Dowdy

 As parents, one of our most significant challenges is teaching our children how to navigate the wild and wonderful web. Part of the problem is simply keeping up with both rapidly changing technology and but understanding the apps and software that seems to come so easily to our kids. Let’s face it, they’re digital natives, so it’s not uncommon for them to be one step ahead of us.

That’s where Google’s “Be Internet Awesome” tools come in. Be Internet Awesome “teaches kids the fundamentals of digital citizenship and safety so they can explore the online world with confidence.”

The tools are separated into several categories with resources for families, educators, digital safety, slide presentations, and Interland, an online game that teaches internet safety and teaches appropriate online behavior.

The resources are based on five principles:

  • Be a positive presence online, just like IRL (in real life).
  • Think before you post.
  • Protect your secrets.
  • Donʼt assume that people online will see you the way you think theyʼll see you.
  • It’s always important to respect other people’s privacy choices, even if they aren’t the choices you’d make yourself.

The Be Internet Awesome Family Guide provides families with the tools and resources to learn about online safety and digital citizenship together. The lessons are simple, straightforward, and engaging, making it fun to learn how to incorporate positive digital habits into your child’s life. There’s even a pledge you can print off for everyone to sign as a commitment to putting into practice what they learn. There are also bilingual workshops for parents in partnership with the YMCA.

The resources for educators in the Be Internet Awesome curriculum provides the tools and methodology to teach basic digital safety ground rules. Google developed the program in partnership with iKeepSafe enabling educators to bring the most vital aspects of internet safety into the classroom. All elements of Be Internet Awesome are free, align with ISTE standards, require no personal information or login, and can be used across devices and operating systems.

Perhaps of greatest appeal to your child is Interland, an immersive digital world divided into four games, each teaching an aspect of online safety and etiquette. In Mindful Mountain, players learn the consequences of being an “oversharer” with warnings like, “Information travels at the speed of light.”  Kind Kingdom teaches children what to do about cyberbullying, and Tower of Treasure shows both the importance of and how to create a strong password. Reality River will teach your kids how to spot fake news, recognize the signs of a scam, and understand phishing. 

Tracey Dowdy is a freelance writer based just outside Washington DC. After years working for non-profits and charities, she now freelances, edits and researches on subjects ranging from family and education to history and trends in technology. Follow Tracey on Twitter.

How To Protect Your Privacy Online

Simple Steps Can Thwart the Hackers

By Tracey Dowdy

Unless you’ve just stepped out of a time machine or awakened from a coma, you are aware that several celebrities had their personal photos shared without their consent last week. The hack garnered media attention mainly because celebrities were involved: higher profile hack = higher profile coverage + higher profile attorneys. Unfortunately, this isn’t uncommon in an age of revenge-porn and sites like My Ex where individuals post nude photos in retaliation for break-ups.

While most of us don’t have nudies we’d like to keep out of the public eye, we have plenty of other personal information and photos we’d prefer to keep private. These tips should help:

Be Proactive.

PC Magazine recently posted a list of the best antivirus software solutions for 2014, including both free and paid options. Microsoft includes a basic antivirus system in Windows 8 but keep in mind that Microsoft simply wants everyone to have a baseline. Windows Defender on its own is not enough. Mac’s tend to be much harder to hack than PC’s due to built-in security protections such as XProtect, Gatekeeper and “Malware Removal Tool” (MRT). Also, OS Leopard prevents non Apple based software from being downloaded, which further reduces the risk of picking up a virus.

Once you’ve downloaded an antivirus solution, keep it updated. You aren’t fully protected if you aren’t up-to-date. Remember, just as some viruses in nature develop drug resistant strains, online hackers will continue to work around new security settings.

Be Careful of Links.

Any time you see a link – in an email, a Facebook posting, Twitter feed, etc. – take the time to evaluate whether it’s from a trusted source. Do you know the person? Is the email/tweet/message really from the person it says it’s from? Can you trust the content description or is there a chance that what appears to be a picture of a squirrel waterskiing is actually porn or some type of malware?

Beware of “Phishing”.

Phishing is a fraudulent attempt to steal your personal information. What appears to be a legitimate request to update personal information is in fact a clever ruse to steal that data. These attacks don’t just come via the Internet. At least 3 times in the last 12 months I’ve received a phone call purporting to be from Microsoft warning me of a virus on my computer or offering to help because they’ve noticed my computer is “running slow.” All I have to do is allow them remote access to my computer and they’ll be glad to help. Microsoft is not calling. It’s a call centre in India. Trust me, they aren’t there to help.

Even more devious is “spear phishing,” where the scammer will do his homework by Googling you, perusing your social media or other online profiles so when they call, they can pose as a trustworthy source. Just last year in our area, a group of seniors were targeted by individuals posing as grandchildren who had gotten into trouble and needed money for bail, a bus ticket or groceries. The seniors shared banking information to allow money to be direct deposited in the scammers bank accounts and the seniors lost thousands of dollars.

Use 2-Step or 2-Factor Authentication.

Instead of simply logging in with a password, 2-step authentication links your accounts to another device – usually your phone – so when you attempt to log in, a text is sent with an additional security code. This way, if someone tries to hack into your account without your phone, they’re locked out. Gmail, Twitter, Facebook and many others offer this option.

Don’t Trust Requests for Personal Information.

If you created an online account with a reputable site like PayPal, they already have your information. If you get an email purporting to be from Paypal asking you to follow the link and update your information, beware. Instead, go to Paypal and talk to Customer Support. Ask if they recently tried to contact you.

Lock It Down.

Your smartphone, your laptop, your tablet, any device – just lock it down. Set your screensaver to prompt for a password, enable the lock screen on your phone, and password protect your home network.

Protect Your Financial Information.

Never do your online banking on a public Wi-Fi network. Readily available freeware allows the person sitting next to you at Starbucks to eavesdrop on your email as easily as your conversation. And although I feel like it’s stating the obvious, don’t send money to anyone you don’t know. If the offer seems too good to be true, trust me, it is. Bill Gates donates millions to charity every year but he isn’t doing it by asking you to share his photo on Facebook, nor will he send you $5,000 if you repost his photo. Clicking on those links runs the risk of allowing scammers access to your Facebook profile and other sensitive information.

Password Protection Is Critical.

Internet security professionals recommend using a random combination of upper and lower case letters, symbols, and numbers when you formulate a password. And here’s a tip about those security questions asked as an added level of protection: lie, lie, lie. If your mother’s maiden name is MacDonald, say it’s Abramowitz. If your first pet was Mr. Fluffy, say it was Boomer. In other words, be very careful of providing answers that are easy to find by someone who knows you, could read your blog, browse your Facebook profile, or look up information that’s part of a public record.

Better yet, use a password manager to store and organize your passwords. Many are guilty of using the same password for multiple sites, because it’s just too much work to remember them, or they keep a list of passwords in a desk drawer, in a note on their phone, or in a file labelled “Passwords” on their desktop (shudder). Two of the best are Dashlane 3 ($29.99) and LastPass 3.0 ($12.99 but a free version is also available); both are compatible with Apple, PC and Android devices.

Keeping your personal information isn’t easy but it’s worth the work. Think of it this way: You wouldn’t hand the keys to your house to a random stranger on the street, so why would you leave the front door unlocked to your virtual home?

Tracey Dowdy is a freelance writer based just outside Toronto, ON. After years working for non-profits and charities, she now freelances and researches on subjects from family and education to pop culture and trends in technology.