top of page
Zander-Ramsey 2021.jpg

Cybersecurity news from Zander ID Theft Solutions

Scamming the scammers wh.png

He goes by the name "Pierogi." His job is to track down crooks who are scamming people worldwide and expose and embarrass them. His YouTube channel, called Scammer Payback, has millions of followers.

In this exclusive video, he talks about the tactics scammers use and how you can avoid being a victim. And make no mistake, victims think of themselves as smart people. 

Zander Banner b.jpg
From the Cyber Newswire.png
Nov 1 News logos.jpg

You’ve heard of “phishing” (scam emails), “smishing” (scam texts), and “vishing” (scam voicemails). Now add “quishing” to the list. Malwarebytes says quishing happens when scammers display a malicious QR code in an email or text message that takes victims to realistic-looking websites designed to collect passwords. Be suspicious of QR codes, and always check the web address you're directed to. 

 

Employees at companies across the U.S. are receiving phishing emails claiming to be from PepsiCo. The message claims Pepsi needs what the recipient’s employer sells and instructs the recipient to submit a price quote for PepsiCo to review. But the messages are from criminals, not Pepsi. Attached to the email is a malicious app that, if installed, gives hackers access to files on the recipient’s computer.

 

About three out of four adults in the U.S. think there should be more government regulation of how companies protect users’ privacy. Yet Pew Research says that when presented with the choice of approving a website’s privacy policy, most of us click “agree” without reading any of it.

Screenshot 2023-09-06 at 11.47.22 AM.png
Its not a phish.png
Temu left.jpg

Temu (Tee-moo) is a popular online shopping megastore offering almost any product you can imagine at very inexpensive prices. In the U.S. alone, 50 million have downloaded the Temu app. Temu is not accredited by the Better Business Bureau (BBB) and has a C+ rating there.

Most complaints involve the quality of products and the response from the company when there is an issue. Products on Temu are real but are rarely from familiar brand names. 

Temu (and other e-commerce apps) collect data from you when you create an account and visit the app's home page. 

This data can range from your precise physical location, address, and device ID to your search history, payment information, and contacts.

 

The Temu app also collects information about birthdays, pictures on the device, links to social media profiles, information about text messages you send, bank info, and Bluetooth and Wi-Fi network information.

Comparitech recommends that if you choose to shop with Temu:

 

  • Use a new email address that doesn’t include your real name or birthday.

  • Don’t upload a profile photo.

  • Consider using a prepaid card, so you won’t need to provide bank account or PayPal information.

  • Use VPN software when shopping on Temu so the company can’t log the address you're using to access the app.

  • And if you rarely use Temu, consider deleting the app from your phone and computer.

 

Sources: LinkedIn, Komando, CNBC, Comparitech, Dataconomy.

Temu graphic.jpg
Zander phone banner.jpg
See what clients are saying.png
This weeks news header wh.png
What's "phubbing," and how could it affect your marriage?
How major news organizations have decided to use AI.
Why did your smartphone suddenly stop working?
The latest type of fake video tailored just for you. 
Take the news quiz and get smarter!
Nov 1 Cartoon.jpg
Answers readers cybersecurity questions.png

“I don't buy things online or use my computer to do my banking. Do I still have to worry about hackers?”

 

If you’re online at all, you should follow the basic ways to stay safe. Use long passwords (the latest recommendation from experts polled by ZDNet is to use passwords that are at least 12 characters long). And use a separate password for each account. Be skeptical of any urgent email or text requesting a payment, even if the message appears to be genuine. And update the software on your phone or computer whenever recommended.

 

-----

 

“What email platforms would you recommend to ensure better privacy? I use Gmail and don't like how my information is used.”

 

Popular email brands like Gmail, AppleMail, and Outlook are secure and private. Google says it stopped scanning users' messages for advertising purposes several years ago. If you’re interested in using a security-focused email app on your personal computer or smartphone, options to consider include Protonmail, Neo, and SecureMyEmail.

 

-----

 

"If you answer a phone call from an unknown number and the caller immediately hangs up once you answer, can they hack your phone in any way or steal personal data?"

​Just answering a call is safe. But be aware that by using AI to record a short snippet of your voice, a criminal can then create dialogue that sounds like you and play it for unsuspecting victims such as family members.

Your best bet is to let “unknown” callers go to voice mail. Ensure your phone carrier’s anti-spam technology is installed and working on your personal phone. Consider using a Caller ID app such as Truecaller, Ring.io, or Mr. Number. Just paste the questionable phone number into the app, and it will show you the owner of the number.

Send us your cybersecurity question
for possible use in a future newsletter.

Cyber cartoon © 2023 Cartoonstock | Original content © 2023 Aware Force LLC

bottom of page