Repost: 7 Android accessibility features that make your device easier to use
Your Android device has a range of accessibility features. Read the entire article on the androidpolice.com blog.
Your Android device has a range of accessibility features. Read the entire article on the androidpolice.com blog.
Every year, the bad guys take advantage of innocent taxpayers, like you, who are patiently waiting on their tax return. Last year, the IRS noticed a significant increase in phishing attempts to steal money or tax data, therefore you must be on high alert. How it Happens: Tax Scams and Malicious Activity The bad guys have a number of tax-related tricks up their sleeves when it comes to stealing your money and/or sensitive information. Here
Who says your Mac can’t get into the holiday spirit? We’ve got THE ULTIMATE guide to turn your boring desktop into a festive wonderland! LIGHT IT UP! Festivitas app, string lights everywhere, ugly Christmas sweater vibes, Christmas tree on your screen? Tag a Mac friend who needs this FESTIVE TECH GLOW-UP! #MacHoliday #TechDecor #FestiveMac
Sophos describes a QR code phishing (quishing) campaign that targeted its own employees in an attempt to steal information.
How to Stay Safe While Working from Home You may work remotely on a regular basis or you may have been mandated to work remotely due to unexpected circumstances. Either way, working from home can feel much different from working in an office. You could find yourself snacking more often, getting distracted by furry friends, or forgetting the last time you put on real pants. No matter how your environment changes, it is important to
Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as employees of bank or credit card companies to manipulate you into divulging personal or sensitive information. How it Works: Common Tactics of InfluenceThe bad guys will try to persuade you into giving them sensitive information. Oftentimes, the information that they need is not specific to your organization. Below are examples
Many organizations use platforms such as Microsoft Teams, Google Drive, or Zoom to stay connected. Unfortunately, these trusted communication tools can lead to a false sense of security. Just like with traditional email, bad guys can use these platforms to launch a cyber attack. Below are three examples of how cybercriminals use these platforms for phishing—and what you can do to keep your organization safe Lurking Recently, a cybercriminal gained access to an organization’s Microsoft
The WV Library Commission posted a reminder that you can get your state library card on their website. More info here: Are you interested in getting access to the WVLC? Here is solution….follow the link below to fill out the library card request form. Once we create your card you will get an email, and then your physical card will be mailed to you. Please note any form submitted after 5 pm we will get
Zoom-bombing is the term for when individuals “gate-crash” Zoom meetings. These uninvited guests share their screens to bombard real attendees with disturbing pornographic and/or violent imagery. Most of these are perpetrated via publicly available Zoom links; however, not all depending on your settings. Here are ways to protect you and your guests from falling victim. Read more about what you can do to protect yourself here: https://security.berkeley.edu/resources/cybersecurity-and-covid-19/settings-preventing-zoom-bombing Tips courtesy of Zoom and UC Berkeley
This festive time of year is when many cyber thieves try to trick you with holiday-themed email scams. These phishing scams are professional-looking emails that attempt to steal your personal information (such as login password, bank account, or credit card). The emails generally look authentic and appear to come from a valid organization (like WVNET or your bank). They may even include a “helpful” link to a website for your convenience. Some phishing examples from previous holiday seasons include: