SpireTech Company News and Tips

Scam

How to detect phishing and scam emails

At SpireTech, our managed services clients often contact the helpdesk to determine if an email is fake or not.  We thought it’d be helpful to put together a short instructional video to help you identify some common signs that an email is a phish or fake email....

read more

Warn your friends about tech support scams

used with permission from FTC.gov., by Amy Hebert Tech support scams, which get people to pay for fake computer help or steal their personal information, are convincing. You might already know the signs of a tech support scam, but do your friends and family? Here’s...

read more

How to avoid a Bitcoin blackmail scam

used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...

read more

Watch out for card skimming at the gas pump

used with permission from FTC.gov, by Colleen Tressler With the summer travel season in high gear, the FTC is warning drivers about skimming scams at the pump. Skimmers are illegal card readers attached to payment terminals.  These card readers grab data off a credit...

read more

Google Docs phishing attack

As some of you may already be aware of, there has been a large scale email phishing attack that impersonates a Google Docs request. Although it may appear that the email requests are coming from a known sender or domain, they are using techniques to spoof those...

read more

5 Red Flags of Identity Theft

used with permission from Norton by Symantec, by Christina Schubert An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities...

read more

How a Gmail Password Stealing Scam Works

used with permission from Norton by Symantec Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to...

read more

Archives

Categories