• Home
  • Remote Education Assistance
  • Class Video Links
  • Computers and your family
  • About
  • Video Links

Steve Simpson, Glendale College Computer Instructor

~ Designed For My Students, Friends and Family!

Steve Simpson, Glendale College Computer Instructor

Category Archives: Security Issues

Dos and Don’ts on Public WiFi When Traveling Abroad

28 Thursday Jul 2016

Posted by simpsongcc in Family info, GCC, Integrated Technology, Mobile, Security Issues

≈ Leave a comment


Dos and Don’ts on Public WiFi When Traveling Abroad

Still undecided about Windows 10? Here’s how to reserve that free upgrade

28 Thursday Jul 2016

Posted by simpsongcc in GCC, General Info, Integrated Technology, New Technology, Security Issues, Windows 10

≈ Leave a comment


Still undecided about Windows 10? Here’s how to reserve that free upgrade

LeEco Acquires Vizio For $2 Billion

26 Tuesday Jul 2016

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, New Technology, Security Issues

≈ Leave a comment


Interesting development…

LeEco Acquires Vizio For $2 Billion

New Android Tips and Tricks Site!!

26 Tuesday Jul 2016

Posted by simpsongcc in Android, Family info, For Fun, GCC, Integrated Technology, Mobile, New Technology, Security Issues

≈ Leave a comment


Here is a new site from Google for Android users. Looks good!

New Android Tips and Tricks Site

The Best Antivirus Protection of 2016

25 Monday Jul 2016

Posted by simpsongcc in GCC, Integrated Technology, Security Issues

≈ Leave a comment


The Best Antivirus Protection of 2016

ASUS’ $599 home robot is smarter than it looks

06 Monday Jun 2016

Posted by simpsongcc in Family info, For Fun, Future Technology, GCC, Integrated Technology, Intro to Computers, Mobile, New Technology, Security Issues

≈ Leave a comment


ASUS’ $599 home robot is smarter than it looks

Olympic athletes will sport Visa’s new payment ring in Rio

06 Monday Jun 2016

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, Mobile, New Technology, Security Issues

≈ Leave a comment


Olympic athletes will sport Visa’s new payment ring in Rio

11 signs you’ve been hacked — and how to fight back

01 Wednesday Jun 2016

Posted by simpsongcc in Security Issues

≈ Leave a comment


11 signs you’ve been hacked — and how to fight back

10 reasons why phishing attacks are nastier than ever

01 Wednesday Jun 2016

Posted by simpsongcc in Security Issues

≈ Leave a comment


10 reasons why phishing attacks are nastier than ever

10 security technologies destined for the dustbin

01 Wednesday Jun 2016

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, New Technology, Security Issues

≈ Leave a comment


10 security technologies destined for the dustbin

Windows 10 Device Guard: Microsoft’s effort to keep malware off PCs

01 Wednesday Jun 2016

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, Internet, New Technology, Security Issues

≈ Leave a comment


Looks interesting…

Windows 10 Device Guard: Microsoft’s effort to keep malware off PCs

New Biometric Credit Card Technology Is an Important Advance in Fraud Prevention

01 Wednesday Jun 2016

Posted by simpsongcc in Future Technology, GCC, Integrated Technology, New Technology, Security Issues

≈ Leave a comment


Finally!

New Biometric Credit Card Technology Is an Important Advance in Fraud Prevention

Windows 10 quick tips: How to protect your privacy

17 Tuesday May 2016

Posted by simpsongcc in GCC, Integrated Technology, Internet, Intro to Computers, Security Issues, Windows 10

≈ Leave a comment


Windows 10 quick tips: How to protect your privacy

Review: 8 password managers for Windows, Mac OS X, iOS, and Android

17 Tuesday May 2016

Posted by simpsongcc in GCC, Integrated Technology, Intro to Computers, Mobile, Security Issues

≈ Leave a comment


Review: 8 password managers for Windows, Mac OS X, iOS, and Android

Easy to Backup Files in Windows 10

11 Wednesday May 2016

Posted by simpsongcc in GCC, Integrated Technology, Intro to Computers, Office 365, Security Issues, Windows 10

≈ Leave a comment


Here is a nice video that shows an easy method for keeping your files backed up in Windows 10!

Back up your files in Windows 10

Everything you need to know about Samsung Pay

05 Thursday May 2016

Posted by simpsongcc in GCC, Integrated Technology, Internet, Intro to Computers, New Technology, Security Issues

≈ Leave a comment


Good article. This is technology you should be using. In many cases, the best way to make a payment now.

Everything you need to know about Samsung Pay

Cyber-Attacks Get Personal

28 Thursday Apr 2016

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


Cyber-Attacks Get Personal

How to recognize phishing email messages, links, or phone calls

19 Tuesday Apr 2016

Posted by simpsongcc in Family info, GCC, Integrated Technology, Internet, Intro to Computers, Outlook, Security Issues

≈ 1 Comment


Here is a nice little article from Microsoft….

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like.

What is phishing

  • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.
  • Beware of links in email. If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

    Phishing scams masked web address

    Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats. Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
  • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, seeAvoid scams that use the Microsoft name fraudulently.

    Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.

Beware of phishing phone calls

Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.

Once they’ve gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

For more information, see Avoid tech support phone scams.

Report phishing scams

If you receive a fake phone call, take down the caller’s information and report it to your local authorities.

  • In the United States, use the FTC Complaint Assistant form.
  • In Canada, the Canadian Anti-Fraud Centre can provide support.
  • In the United Kingdom, you can report fraud as well as unsolicited calls.

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of our technical support experts dedicated to helping you at theMicrosoft Answer Desk. Or you can simply call us at 1-800-426-9400 FREE or one of our customer service phone numbers for people located around the world.

You can use Microsoft tools to report a suspected scam on the web or in email.

  • Internet Explorer. While you are on a suspicious site, click the gear icon and then point to Safety. Then click Report Unsafe Website and use the web page that is displayed to report the website.
  • Outlook.com (formerly Hotmail). If you receive a suspicious email message that asks for personal information, click the check box next to the message in your Outlook inbox. Click the arrow next to Junk and then point to Phishing scam.
  • Microsoft Office Outlook 2010 and 2013. Right-click the suspicious message, point to Junk, and then click Report Junk.

You can also download the Microsoft Junk E-mail Reporting Add-in for Microsoft Office Outlook.

Introduction to Making Wireless Network Connections

02 Saturday Apr 2016

Posted by simpsongcc in GCC, Internet, Intro to Computers, Security Issues

≈ Leave a comment


Here is a couple of great web sites on setting up network connections!

Introduction to Making Wireless Network Connections

Network

Setting up a local user account in Windows 10

30 Wednesday Mar 2016

Posted by simpsongcc in Family info, GCC, Security Issues, Windows 10

≈ Leave a comment


Nice video to help set up a Windows 10 account and a kid’s account

Setting up a local user account in Windows 10

Adding a child user account in Windows 10

The New Magic of Biometrics

23 Wednesday Mar 2016

Posted by simpsongcc in Future Technology, GCC, Security Issues

≈ Leave a comment


Interesting article on the state of Biometrics.

The New Magic of Biometrics

How to encrypt everything

29 Monday Feb 2016

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


I often get questions regarding protecting personal data on computers and mobile devices. This is a good article on accomplishing that task.

Protect

A free, almost foolproof way to check for malware

29 Monday Feb 2016

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


Here is a good method for checking your computer for malware.

Malware check

 

Review: 8 password managers for Windows, Mac OS X, iOS, and Android

29 Monday Feb 2016

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


This is a good review of what I consider to be a mandatory piece of software for your computing devices.

Password Managers

The best antivirus apps for Windows PCs and Androids

22 Monday Feb 2016

Posted by simpsongcc in GCC, Security Issues

≈ Leave a comment


Here is a rundown of the best antivirus apps by Computerworld.

Best Antivirus apps

← Older posts
Newer posts →

This slideshow requires JavaScript.

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

Hours & Info

818-813-1720
ssimpson@glendale.edu
April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Categories

Archives

Follow Steve Simpson, Glendale College Computer Instructor on WordPress.com

A WordPress.com Website.

  • Subscribe Subscribed
    • Steve Simpson, Glendale College Computer Instructor
    • Join 81 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Steve Simpson, Glendale College Computer Instructor
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...