profile

Dicar Networks

Dicar sells tech and supports businesses so they can focus on growth, instead of firewalls, physical security or tech problems.

Subscribe to the Cyber Security Wednesday Insider

That time you called your bank šŸ¦ but it was really a hackeršŸ“±

Okay, so hopefully, Reader, there has NOT been a time when you've been tricked into calling a hacker (thinking it was your bank). So what's this week's cyber-trickery warning? Since when were we at risk for thinking we were calling our financial institution (FI) ā€”but really, calling a hacker instead? Well, thereā€™s now an improved Android banking trojan named "FakeCall" thatā€™s intercepting calls to FIs. It sounds hard to believe, but victims of FakeCall malware, along with their financial...
READ POST
26prcnt of all mal links were embedded in QRs

šŸš— The car industry gave us these, but never knew they'd be used like this šŸš™

It was 1994, and barcodes were approaching their limitations. Did you know Reader, that a Denso Wave employee came up with the bar code-killer? It was the QR code. (By the way, Denso Wave is a Japanese car maker). šŸš™ šŸš™ šŸš™ While Denso Wave predicted much of the world would use this practical toolā€¦ They never foresaw it becoming so popular with businesses. So today, most everyone has scanned at least one QR (quick response) code. These codes are used everywhere and for everything. And thatā€™s part...
READ POST
Mac user on Microsoft Office apps

šŸ”Ž How are Mac Users getting spied on? šŸ•µļøā€ā™‚ļø

Reader, do you like the idea that your device is watching you? šŸ‘€ I've never met anyone who is in favor of such a thing. Apple just recently revealed this could be the case with their macOS users. It was discovered that hackers are spying on Mac users through certain Microsoft apps and potentially overtaking their devices. All Mac fans should know what's going on with this latest security vulnerability. The cybersecurity pros at Cisco Talos found 8 vulnerabilities in various popular Microsoft...
READ POST
6 traits of malvertising

šŸ” This 'mashup' word isn't like mocktails at brunch during staycation

Reader, I bet you've caught on to this pop-culture thing we do, like mashing two words together to get a new word. Brunch. Staycations. Cosplay. Sitcomsā€¦ even "ginormous" was so popular that it made the cut for the dictionary! But here's a mashup that's not so fun: Malvertising. The name is short for malicious advertising. Last fall, Malwarebytes found month-to-month, a 42% increase in malvertising in the U.S. That means users need to be hyper-aware of these aggressive and hazardous online...
READ POST
infographic-top reported elder fraud types

šŸ“£ Know this sweetspot for scammers? It's lost $3.4 Billion and counting

Hi Reader, For many online scammers, those in retirement are a target ripe for the picking. The FBI reports retirees aged 60 years and older in the U.S. lost over $3.4 billion to scammers last yearā€”an 11% increase from the year before. Hereā€™s a closer look at common retirement scams and how to know one when you see oneā€¦before itā€™s too late. What retiree (or anyone else) wouldnā€™t love the idea of a low-risk, high return investment? The scammer knows the right things to say to win a victimā€™s...
READ POST
phishing email example

What You See Is Not What You Get; Phishing Attack Skips Email Security Measure

Hi Reader, It might seem that we've been discussing the topic of phishing a lot lately. That's true. It continues to remain the top way malware gets onto devices. And it still manages to trick people to give up their personal information. The tech-savvy pal I spoke of last weekā€”he just got his bank account unfrozen today (and it's been 12 days since he took the bait). Phishing scams are made to trick individuals into divulging their sensitive information (e.g. passwords, payment card details,...
READ POST
yoda meme

What if you've been h*cked? Your 5 next steps

Thanks to the coronavirus, the transition to living life through our devices has become very real. Our lives have now been changed in ways we never expected. This transition includes doing most things from home ā€”like working, banking, healthcare, education, shopping, and even socializing. It's ironic - while moving our lives online has made so many things more convenient, it's also created a perfect storm for cybercriminals. They're having a field day, especially playing off the anxiety that...
READ POST
graph showing android financial threats

šŸ¤© Think you're not famous enough for a deepfake? šŸ†

Ever heard of a "deepfake," Reader? Deepfakes are images, videos, or even audio that are edited using AI tools to mimic someone. It's a new buzz word, fueled by media pranks (where our eyes deceive us! It's not the real person; it's a deepfake' look-a-like). And the numbers are in. A report by ESET (Essential Security against Evolving Threats) looked at the cyber threat landscape over the first half of last year. Their combined data collection and monitoring finds some concerning patterns...
READ POST
How to spot a fake sender

Do all your accounts really need a different password?

Most of us know by now, that it's not good to use the same password for all of our different accounts. Yet some of us still do. (I won't ask for a show of hands šŸ˜‰). (BTW, I included a simple graphic in this email, to help make unique passwords easier). Here's the thing: Users who continue to use passwords they know have been exposed in a hack are truly flirting with danger. In a recent study, Google found 1.5% of passwords are still being used despite those users knowing theyā€™ve been...
READ POST