used with permission from FTC.gov by Andrew Smith, Director, FTC Bureau of Consumer Protection An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful — or perhaps concerned they clicked on something that caused the glitch — the employee follows instructions to
used with permission from Norton by Symantec They’re about as welcome as robot calls and junk mail — spam text messages. They show up as unwanted and unexpected text messages on our phone screens. That’s aggravating enough, but it gets worse. Whoever is sending you a spam text message is usually trying to defraud you.
used with permission from Norton by Symantec The loss or theft of a phone can be very upsetting. After all, you have a lot of important information on that device. But if you take the right steps the moment you realize it’s gone, you may be able to minimize the pain. What to do if
Phishing Identification Checklist Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says you need to take immediate action to avoid penalties, you may be alarmed and act
Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address account has been compromised, or if this malicious attempt is just