How to recognize phishing email messages, links, or phone calls


Here is a nice little article from Microsoft….

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like.

What is phishing

  • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.
  • Beware of links in email. If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

    Phishing scams masked web address

    Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats. Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
  • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, seeAvoid scams that use the Microsoft name fraudulently.

    Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.

Beware of phishing phone calls

Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.

Once they’ve gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

For more information, see Avoid tech support phone scams.

Report phishing scams

If you receive a fake phone call, take down the caller’s information and report it to your local authorities.

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of our technical support experts dedicated to helping you at theMicrosoft Answer Desk. Or you can simply call us at 1-800-426-9400 FREE or one of our customer service phone numbers for people located around the world.

You can use Microsoft tools to report a suspected scam on the web or in email.

  • Internet Explorer. While you are on a suspicious site, click the gear icon and then point to Safety. Then click Report Unsafe Website and use the web page that is displayed to report the website.
  • Outlook.com (formerly Hotmail). If you receive a suspicious email message that asks for personal information, click the check box next to the message in your Outlook inbox. Click the arrow next to Junk and then point to Phishing scam.
  • Microsoft Office Outlook 2010 and 2013. Right-click the suspicious message, point to Junk, and then click Report Junk.

You can also download the Microsoft Junk E-mail Reporting Add-in for Microsoft Office Outlook.

Tickets for JPL public weekend available April 25


Tickets will be available Monday, April 25 for JPL’s new approach to the one special weekend a year when it opens its doors to the public.

“A Ticket to Explore JPL,” so named to distinguish it from traditional Open Houses, will take place the weekend of June 4-5.

Tickets are free but limited, and will be distributed on a first-come, first-served basis. The ticket requirement applies to JPL employees as well as the public, but not to those working at the event or entering the Lab for normal work shifts.

Tickets will be available Monday, April 25 at 9 a.m. on JPL’s Special Events web page. Visitors may request to enter JPL on the half-hour between 8:30 a.m. and 1 p.m., based on availability.

The maximum number of tickets per family is five. All entering JPL to attend the event must have tickets in hand, and those age 18 or older must show a matching ID. Tickets are not transferable.

A short video explaining the ticketing is viewable at http://www.jpl.nasa.gov/events/open-house.php.

Welcome Windows Students!


Welcome to Windows! I am so happy you are attending this class. I know you will find it interesting, educational, and hopefully very enjoyable. Check back often at this website for any information or links that I may refer to in class. If I have any handouts, you will find them mentioned here or may be in the list in the Windows folder on the right. There is no book for this class. But I encourage you to check out some computer books at local book stores to supplement what we will be discussing in this class. This class is 4 Saturdays from 8-12. Remember, your attendance is critical, so please attend if you can. I look forward to our time together. Thank you for coming!

Contract Information: (818) 813-1720 https://simpsongcc.com/ simpsongcc@live.com

Welcome Excel 1 Students!


Thank you for your attendance. I am looking forward to the next 6 weeks together. I promise to make the class as enjoyable as possible, while teaching you all about Excel! The book ISBN for this class is Benchmark Excel 2013 L1&L2, 9780763853891. The Excel 2013 Level 1 only is 9780763853907. I would suggest looking for a used book at Amazon.com or half.com. It should save you some money. Make SURE and have it shipped expedited!

I suggest that you take a look at some of these books at Amazon as well. They will help you with the business math part of Excel.

  1. Business Math Excel Applications for Business Mathematics (2nd Edition) Paperback – August 29, 2008 by Edward D. Laughbaum (Author), Ken Seidel (Author), ISBN: 9780136071846
  2. Excel For Business Math (Quick Study: Computer) Hardcover – December 31, 2013
    by Inc. BarCharts (Author)
  3. Microsoft Excel 2010 Formulas and Functions Inside Out Paperback – January 1, 2012 by Egbert Jeschke (Author), Helmut Reinke (Author), Sara Unverhau (Author), Eckehard Pfeifer (Author), ISBN: 978-0735658028
  4.  Excel Formulas and Functions For Dummies, by Ken Bluttman
  5. Business Math Using Excel, by Sharon Burton and Nelda Shelton
  6. Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations, by Alastair Day
  7. Working with Excel: Refreshing Math Skills for Management (Quantitative Approaches to Decision Making), by Priscilla Chaffe-Stengel

Here is an article with some Excel tips!

http://www.computerworld.com/article/2907515/your-excel-formulas-cheat-sheet-15-tips-for-calculations-and-common-tasks.html?phint=newt%3Dcomputerworld_thisweek&phint=idg_eid%3De6a70c0a773b5dd93399e3283c15a855#tk.CTWNLE_nlt_thisweek_2015-04-13