News
TUTORIAL / FAQ
TUTORIAL / FAQ
Answer: Fortunately, there are clear signs of identity theft, depending on how thieves use your stolen information. The FTC shared these scenarios to help consumers:
An identity thief could use your information to get credit or service in your name.
- How to spot it: Get your free credit report at AnnualCreditReport.com. Review it for accounts you didn’t open or inquiries you don’t recognize. A new credit card, a personal loan, or a car loan will appear as a new account. A new cell phone plan or utility service — like water, gas, or electric — will show up as an inquiry.
- How to spot it: Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make.
- Bonus advice: Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.
- How to spot it: A notice from the IRS that there’s more than one tax return filed in your name could be a sign of tax identity theft. So could a notice that you have income from an employer you don’t work for.
- How to spot it: Review your medical bills and Explanation of Benefits statements for services you didn’t get. They could be a sign of medical identity theft.
- How to spot it: A notice from your state unemployment office or employer about unemployment benefits that you didn’t apply for could be a sign of fraud.
Tutorial/FAQ
Tutorial/FAQ
Answer: QR codes have become more common during the pandemic, as coronavirus concerns triggered a demand for touchless transactions. For example, your server at a restaurant may ask you to scan a QR code instead of handing you a menu. Or you may see QR codes on product packaging at retail stores.
While many QR codes are trustworthy, fraudulent ones are out there. Scammers can use QR codes for malware and phishing attacks or to try and steal financial information. Just as you should never click on suspicious hyperlinks or download fishy email attachments — especially anything sent by strangers — you should avoid suspicious QR codes.
Take these precautions:
- Use QR scanners that display site URLs. Most third-party QR scanners directly display the website after scanning the code, which can be dangerous if the link is malicious. It’s best to use built-in QR scanners that come within smartphone cameras. These scanners display the site URL before opening it, allowing you to close the link before it opens if it seems suspicious.
- Regularly update your device’s security. Installing and regularly updating your device’s security software patches can help maintain security. It’s also important to use robust anti-malware software.
- Remain vigilant. If you see a QR code in a public place, such as on a poster in a mall, closely inspect it to see if it’s a sticker placed over the original QR code.
March Tech Tip: Managing Your Screen Time
March Tech Tip: Managing Your Screen Time
Do you find yourself scrolling aimlessly through social media or playing games late into the night? Here are some helpful ways to evaluate your screen time and set some boundaries for yourself.
On Android:
- Open your settings.
- Open Digital Wellbeing & Parental Controls.
- Hit show your data to see your activity.
On Apple:
- Open your settings.
- Select screen time.
- Select “See All Activity.”
Once you’ve identified how much time you’re spending on your device and which apps are commanding most of your attention, you can start to set limits and schedule downtime away from your screen.
Steps and Software for Staying Cybersafe
Steps and Software for Staying Cybersafe
Technology makes our homes smarter and lives easier in so many ways. But it also brings the risk of cyberattacks. Good cybersecurity is just as important for families as it is for any business. We routinely use computers to shop online, pay bills, and access our personal accounts. Without effective safeguards in place, our personal information is vulnerable to hackers.
Cyberattacks take on many forms
- Phishing is the easiest and most common way bad actors access your system. How? They send a seemingly trustworthy email to trick you into revealing private information, or to install malware on your computer. If you open the email and follow any instructions, you’ve unknowingly let them in.
- Denial of service is a type of attack in which a hacker floods a device or server with requests until it becomes overwhelmed and can’t function. Usually, hackers use malware to infect a device and bombard it with commands.
- Direct attacks, including brute force attacks, use persistence to directly target data. The attacker systematically checks all possible passwords and passphrases until the correct one is found.
Steps to avoid becoming a victim
- Update your passwords. The best way to avoid a brute force attack is to make your passwords tough to guess and different from your passwords on other sites. The longer the password, the more combinations that will need to be tested. Implement multi-factor authentication for another layer of security.
- Don’t click on any links. If you receive an email or text from an unknown source asking you to click a link or download a file for more information, don’t click. While you can hover over links and email addresses to see where they are really coming from, in most cases you’ll want to just delete the message.
- Install software that goes beyond antivirus. Because there are many tools used to carry out cyberattacks, your anti-hacker software shouldn’t only cover viruses. Make sure you choose protection with several security layers to block all kinds of threats:
- Viruses. Programs with malicious intents are characterized by the ability to multiply and infect other computers or devices. Viruses are usually tied to an executable file which, when you unknowingly run it, also acts as the trigger for the virus.
- Trojans (Horses). Malicious software can masquerade as common software and trick you into downloading and running it on your computer. When you do that, trojans usually open the gate to other forms of malware on your computer.
- Worms. These malicious programs take advantage of the security holes and vulnerabilities in your operating system or other software (like your web browser for instance) and use them to infect your computer. Unlike regular viruses, worms can multiply and spread by themselves, without you having to run an infected file.
- Spyware. Designed to spy and gather intelligence about you, spyware tries to hide from your operating system. After collecting information about you, it tries to send it to hacker-controlled servers.
- Rootkits. This malware is designed to give hackers remote access and control of a device, without being detected by the victims or the security software installed on the infected devices.
- Ransomware. Once ransomware infects your computer, it takes control and encrypts your files such as your pictures, work documents, and videos. Once that happens, ransomware programs try to make you pay considerable amounts of money to their creators, so you can get your files back.
- Adware. These software programs display advertisements on your screen, in your web browsers, or other places on your computer. Adware almost always hurts your computer’s performance and your user experience. It can also help infect your computer with malware.
- Network attacks. When hackers try to take control of your devices remotely, they can do that through a “break” approach. A good firewall must be able to deflect attacks from the outside but also tell you about suspicious traffic that is initiated from your computer to the outside world.
- Web threats. Your web browser should be the first in the line of defense against malware to stop you from visiting websites with malicious content. It is better to deal with malware in your browser than to have to do that when it reaches your computer.
For more information on how to stay cybersafe, you can visit Cybersecurity | Ready.gov. We will also continue to share the latest tips and trustworthy resources, so visit us often.