Net neutrality’s back: The FCC voted to restore net neutrality, saying ISPs can’t speed up, slow down or block access to specific sites or services. The FCC also wants to stop ISPs from selling customers’ personal info or using this info to train AI models. Now, the pros and cons of net neutrality are a 20-minute lecture starting with: Do we really want to open the door to government interference and regulation of private enterprise? Drop me a note here if you want to talk about net neutrality or another burning tech topic.
Smishing is spreading - How to spot it
You’re putting yourself at risk if you aren’t up-to-date on the biggest scamming schemes. There are a lot of widespread cons that many people don’t know about. Tap or click here for seven new scams to watch out for.
Take smishing, for example. While it isn’t all that new, it’s still not the most well-known term. But it’s a spreading issue that threatens anyone who owns a smartphone, so it’s best to find out what it is now.
If you’re scratching your head and wondering what the heck it means, don’t worry. We’ll explain it in this easy guide to smishing. You’ll learn what it is, how to spot it and a few defense strategies.
Smishing steals millions from people like you
It may be a silly name, but it reflects a serious issue. In 2020, cons that started as scam texts tricked Americans out of $86 million, according to AARP. Smishing scams target everyone — and they’re easy to fall for since cybercriminals work hard to impersonate reputable brands and websites.
The FBI had to step in and sound the alarm because it was such a significant threat.
Think twice before clicking links in text messages! #Smishing is a common, easy way for #cybercriminals to steal money from unsuspecting targets. If you think you’re a victim of a smishing scam, visit https://t.co/MWss57C5gI to file a report with the #FBI. https://t.co/0bVeEj7lpK
— FBI (@FBI) September 1, 2021
One scary threat you may come into contact with is Medusa malware. It spreads through text messages with malicious links. Click on one and malware will infect your device. This allows crooks to steal data and even take over your phone. Tap or click here to protect your devices from this malware as well as other threats.
Here’s how smishing works
Smishing starts with a text message designed to put you on edge. You’ll see a message on your phone with language that makes you feel like your important accounts are in peril. For example, a message from a new number may say your debit card has been suspended.
Maybe the message warns you of abnormal activity, claiming someone tried to log into your bank from a new device. It might even say you added a new person to receive payments from your bank account. The content may vary, but these texts try to trick you into clicking a link.
Here’s an example of one such text, courtesy of Proofpoint.com:
How to spot fake Russian social media accounts and posts
As the Russia-Ukraine War escalates, cable news ratings have skyrocketed. But look at what they’re showing you: Social media posts and online influencers.
There’s no question the Ukraine invasion is a social media war — the world’s first. Many TV interviews are with Ukrainians who are garnering large social media followings. TikTok is filled with video clips of after-bombing scenes and bomb shelters. They are shot on smartphones by citizens and shared directly with the world, bypassing traditional media outlets.
Amazon has a new policy to stop third-party sellers from ripping you off
Amazon is the world’s biggest retailer, and with that title comes several pros and cons. On one hand, Amazon’s service is fast, cheap and full of choices. On the other hand, the platform has attracted a number of scammers with counterfeit products and fake reviews.
Scammers are cloning CleanMyMac X to steal passwords and data. Cons are spreading fakes through lookalike websites and stolen YouTube channels that lure you into malicious downloads.