At SpireTech, our managed services clients often contact the helpdesk to determine if an email is fake or not. We thought it’d be helpful to put together a short instructional video to help you identify some common signs that an email is a phish or fake email....
SpireTech Company News and Tips
Scam
Online scammers cost time and money. Here’s how to fight back.
used with permission from Microsoft On the Issues, by Athima Chansanchai A message pops up on your screen. It screams that your computer is at risk or has been infected by a virus. Or, you receive a phone call from someone claiming to be from tech support. And then,...
Warn your friends about tech support scams
used with permission from FTC.gov., by Amy Hebert Tech support scams, which get people to pay for fake computer help or steal their personal information, are convincing. You might already know the signs of a tech support scam, but do your friends and family? Here’s...
How to avoid a Bitcoin blackmail scam
used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...
Watch out for card skimming at the gas pump
used with permission from FTC.gov, by Colleen Tressler With the summer travel season in high gear, the FTC is warning drivers about skimming scams at the pump. Skimmers are illegal card readers attached to payment terminals. These card readers grab data off a credit...
Lead generation: When the “product” is personal data
used with permission from FTC.gov., Lesley Fair There's been a lot of talk about "ping trees" and other activities associated with the lead generation industry. The FTC's concern is that consumers don't get ponged in the process. A proposed settlement gives a glimpse...
Google Docs phishing attack
As some of you may already be aware of, there has been a large scale email phishing attack that impersonates a Google Docs request. Although it may appear that the email requests are coming from a known sender or domain, they are using techniques to spoof those...
Scammers are not “friends” to small business owners
used with permission from the FTC, by Rosario Méndez Scammers try to contact people in many ways. They call, email, put ads online, send messages on social media and more. If you own a small business, they’re trying to contact you, too. Lately we’ve been hearing about...
5 Red Flags of Identity Theft
used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...
How a Gmail Password Stealing Scam Works
used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...