scammers

Tue
18
Feb
Dennis Faas's picture

What Happens When Windows 10 Reaches End of Life?

Infopackets Reader Dennis J. writes: " Dear Dennis, What happens when Windows 10 reaches end of life after October 14, 2025? My computer isn't compatible with upgrading to Windows 11. Will I still be able to operate using Windows 10 safely? I have ... MalwareBytes but I don't understand these things. I'm retired, and just shy of 80, and can't afford a new computer this year. I'd appreciate your advice thank you. " My response: Thanks for your question. As you mentioned, after October 14, 2025 your Windows 10 PC will no longer receive security updates. One option is to pay Microsoft for Extended ... (view more)

Wed
05
Feb
John Lister's picture

Edge Browser Finally Combats Tech Support Scams

Microsoft's Edge browser now has a "scareware blocker" available for optional use. It attempts to recognize bogus claims that a computer has been compromised by malware. Scareware can come from a deliberate scam website, a compromised site, or a ... pop-up window running on a legitimate site that hijacks or takes advantage of advertising space. Whatever the source, the effect is normally the same: highly visible warnings of a supposed malware infestation, often in a full-screen window that's difficult to escape. Some versions even include an audio warning. The idea is to panic the user into ... (view more)

Fri
08
Nov
Dennis Faas's picture

Someone Threatening to Post Video, Pics? Here's What to Do

Infopackets Reader Franco I. writes: " Dear Dennis, Please help - someone is threatening to share a video of me (in the buff) on Facebook! A few days ago, I met a girl on Omegle (a chat website). We had lots of shared interests and seemed to hit it ... off pretty good. After some back and forth, things escalated to the point where she started sharing pictures of herself scantily dressed. She asked for my phone number, then wanted to do a video call using Google Chat . As soon as I answered, she was already unclothed with toys in hand. She claimed her microphone was broken, so I never got to ... (view more)

Fri
20
Sep
John Lister's picture

Scammers Frustrate Users into Giving Up their Gmail

Scammers are using a creative way to trick people into handing over their Google account passwords. The tactic works by annoying the victim until they stop thinking rationally. Most scams to get hold of account passwords, particularly sensitive ones ... like a Google account, work in one of two ways. Some scammers will try to intercept the password, for example by using keylogging software that records everything a user types. Others prefer phishing, where the user is tricked into typing in details into a bogus, lookalike website. The new scam, using malware named StealC, is much simpler. It ... (view more)

Mon
26
Aug
John Lister's picture

Banking Scam Bypasses iOS, Android App Store Vetting

A useful web feature could be a serious phishing risk according to security researchers. They say scammers are using "progressive web apps" to bypass Android and iOS security features. In simple terms, a progressive web app is a mix of a website and ... a standalone application. It's technically a website and uses web technologies, allowing for instant updates. However, it looks and feels more like a standalone app and can often access more of a device's resources than a web browser. Security firm ESET says scammers are using progressive web apps as a way to overcome a major limitation in scams ... (view more)

Tue
16
Jul
Dennis Faas's picture

Being Blackmailed on Snapchat? Here's What to Do

Infopackets Reader Drew W. writes: " Dear Dennis, I was randomly added by a female on Snapchat and she asked me what I looked like. We hit it off, and then she asked for some inappropriate photos of myself. A few minutes later, she showed me ... pictures of my Instagram follower and said if I didn't pay, they would be sent to my followers. I have already sent $400 and was provided video proof of my photos being deleted. However, she is now demanding another $100 to 'delete for good', whatever that means. I already received SMS text messages from 4 other phone numbers demanding higher amounts. ... (view more)

Wed
07
Feb
John Lister's picture

German Train Company Seeks Windows 3.11 Experts

If you still have the skills for Windows 3.11, you may have been a candidate for a recent job ad in Germany. It appears the role, using the 30-year-old system, has been filled. The vacancy was advertised by national railway company Deutsche Bahn. ... The successful candidate would be assigned to Siemens, which is responsible for the rail tech division for the train control system. The role would involve keeping old systems operational so that train drivers could get real time information about equipment. The Register notes that although Windows 3.11's release in November 1993 is almost ... (view more)

Wed
15
Nov
John Lister's picture

Google Sues Over Fake AI Download

Google has launched sets of two legal cases against scammers. The cases involve artificial intelligence tools and copyright claims, though could have wider implications for malicious online activity as a whole. The first case is against scammers who ... are trying to take advantage of interest in generative AI tools that can "create" text and images. They've made online posts and ads encouraging people to download Google's AI tool, Bard. The problem is that Bard isn't something you've downloaded, but rather an online service accessed through a website. What victims are actually downloading is ... (view more)

Thu
24
Aug
John Lister's picture

AI Struggles to Write Malware

Artificial Intelligence tools aren't as useful for writing malware as it first seemed. However, they may be useful for phishing scams and other social engineering. Two recent security company reports covered by The Register explored how malware ... scammers are particularly interested in AI tools that generate material. The theory goes that such tools could write code designed to exploit vulnerabilities in software and websites. (Source: theregister.com ) It's not a completely outlandish theory as some users have found such tools can efficiently write code for a particular task. It can take ... (view more)

Wed
07
Jun
John Lister's picture

60,000 Android Apps Were Malware

More than 60,000 Android apps contained a nasty piece of malware designed to steal banking information. The scam doesn't target the official Google Play store, but rather third-party sources. The rogue apps fall into two main categories. Some are ... designed to closely resemble real, popular apps. Others are promoted as "modded" versions of genuine apps that are supposedly identical but with an alteration that supposedly removes ads or a requirement to pay a subscription. In reality, the scammers have taken the genuine apps, copied them, and made one modification. Unfortunately that modification ... (view more)

Pages

Subscribe to RSS - scammers