Mindblown: a blog about Internet security.

  • QR Codes explained part 2. How can you tell a QR code is a scam

    Identifying whether a QR code is a scam requires careful observation and verification. Here are some signs and precautions to help you determine if a QR code is potentially fraudulent: Check the Source: Verify the source of the QR code. If it’s from an unknown or untrustworthy source, be cautious. Legitimate businesses and institutions use…

  • QR Codes Explained part 1

    Quick Response (QR) codes are two-dimensional barcodes that store information in a matrix pattern of black squares on a white background. They were invented by Masahiro Hara for Denso Wave, a subsidiary of Toyota, in 1994. Here are some key aspects of QR codes: Data Encoding: QR codes can store various types of data, including…

  • The 20 Worst Things to Avoid Putting in a Text Message for Senior Safety

    https://www.paypal.com/donate/?hosted_button_id=KF63FP9FMG8QE Introduction: Text messaging is a convenient way to communicate, but it’s crucial to be mindful of the content we share, especially when it comes to seniors’ safety. Security4Seniors.com emphasizes the importance of responsible and secure communication. Here are the 20 worst things to avoid putting in a text message to ensure seniors’ well-being in…

  • Improving digital literacy is essential for seniors

    [wpedon id=”230″] Improving digital literacy is essential for seniors to navigate the online world confidently and securely. Here are practical tips tailored for seniors to enhance their digital literacy: Take Online Courses: Explore online courses designed for seniors to learn basic computer skills, internet navigation, and online safety. Many platforms offer user-friendly courses at various…

  • how can thieves steal phone numbers and what can they do with them

    [wpedon id=”230″] In the realm of digital security, understanding potential threats is crucial for safeguarding sensitive information. When it comes to phone numbers, there are various methods that cybercriminals might employ to steal them. Here, we’ll explore some common techniques and offer advice on how to protect yourself, especially with a focus on S4S (security4seniors.com).…

  • Can you trust the marketing claims your genetic testing company makes?

    Can you trust the marketing claims your genetic testing company makes? By Jim Kreidler Consumer Education Specialist, FTC November 21, 2023   Image Say you’re interested in learning about your family’s ancestry or your likelihood of developing certain genetically related health conditions. You compare reviews online and order a DNA testing kit. But can you trust…

  • NordPass has a great deal for my readers!! click the links

    I highly recommend NordPass and for the price of this deal, it is well worth it. You get the relief of knowing your passwords are safe, and all your credit card information. Also, if you want to become more secure, it will store pass Keys (a type of encryption). NordPass Premium+ get 3 EXTRA months…

  • Most people get hacked due to their password strategies

     Yes, you do have a password strategy. For some of you, your strategy is: You do nothing You only change your password when you forget the one you have been using for 5 years. You do not use a password manager like NordPass. You use one of the topmost hacked passwords used today like 12345678 or…

  • We have 2 sponsors Now

    Currently I am trying to set up direct links to all Zilkee products from my site here on this page. Keep in mind I am a Security expert, not a web master. I am a fast learner and will solve this. Zilkee is also helping by adding their products here. The advantage to you is…

  • The Dangers of getting rid of old hard drives

    In this 5 minute video I showing just how dangerous that can be If you give away a computer, a hard drive or sell them or donate them, if you do not fully clean that hard drive then they can steal your identity. Formatting a hard drive does not remove most of that information. You…

  • Danger Stranger, Shorten links are dangerous like Bit.ly.

    Established mini-link providers like Bitly have forms for reporting abuse of the functionality. Many shortening sites, including Bitly and TinyURL, also have helpful preview functions that reveal the redirected destination. Most people are unaware of how dangerous these links can be. URL shortening services like Bitly and TinyURL provide a convenient way to share long and complex…

  • Why you should not forward emails to more than one contact Part 1

    Forwarding messages, emails, or content to everyone you know can have several potential downsides, and it’s generally not recommended for the following reasons: To maintain effective communication and a positive online presence, it’s advisable to be selective and considerate when forwarding messages. Before forwarding, take a moment to verify the accuracy of the information, respect…

  • No Posts today because it is Veterans Day. Respect to all Vets and Thank You

    Today is a day to reflect on those who served. Use this time to remember everyone you knew that died at the hands of oppressions of others. Think of the family members who lost Mothers and Fathers and sons and daughters who did not get to live full lives. Too all those wounded vets I…

  • Thank You for Your Service. More info to help you:

    If you’re a veteran’s surviving family or caregiver, you may be eligible for expanded burial benefits that help cover certain funeral expenses. But scammers may contact you, saying that for a fee they can do the paperwork and guarantee what benefits you’ll get. Other scammers pretend to be from the VA. But the VA will never…

  • Secure Our Seniors’ Safety: A Guide to Setting Up Wi-Fi Cameras

    More details coming soon As we embrace the convenience of the Internet of Things (IoT), one aspect stands out as a powerful tool for enhancing the safety and well-being of seniors: Wi-Fi cameras. These smart devices offer real-time monitoring and peace of mind for caregivers and family members. However, to fully leverage their benefits while…

  • The Hidden Risks of IoT Printers: Protecting Your Senior Loved Ones

    The rapid growth of the Internet of Things (IoT) has brought convenience and innovation into our lives. From smart thermostats to connected kitchen appliances, these devices aim to simplify tasks and enhance our daily routines. However, in the midst of the IoT revolution, one common device is often overlooked when it comes to security –…

  • Big Positive Changes In the Plans very soon

    Here are some of the plans: New sponsors with assistance coming soon: I will not add a sponsor unless I have done my research and approved the products. Greed is not in my vocabulary. Of course, I have lifes expenses but I do what is right for my readers. They deserve that! The more people…

  • Consumer Alert

    Don’t let scammers poach your pension and disability benefits Important information from the FTC By Carol Kando-Pineda Counsel, Division of Consumer and Business Education, FTC November 7, 2023 Today we’re focusing on how dishonest “advisers” may try to get your pension benefits and disability compensation, including benefits under the PACT Act. Applying for VA benefits…

  • Cybersecurity threats are ever-evolving and encompass a wide range of risks to digital systems, data, and privacy. Some common cybersecurity threats include:

    Cybersecurity professionals work to mitigate these threats through a combination of proactive measures, such as security best practices, regular software updates, and user education, as well as reactive strategies to detect and respond to threats when they occur. Cybersecurity is an ongoing effort to stay ahead of evolving threats in the digital landscape.

  • Not Everyone shows their thanks to Veterans for their service

    As we approach Veterans Day, we thank our veterans for their service and sacrifice. But not everyone has a vet’s best interests in mind. Whether you left the service decades ago or you’re planning your transition to civilian life, scammers will try to get you to send money or share personal information. Scammers also want…

  • Here is a dictionary-type answer for many of the main parts of a computer:

    Part Abbreviation Description Central Processing Unit CPU The “brain” of the computer, responsible for executing instructions. Random Access Memory RAM Temporary storage that holds data currently being used by the computer. Read-Only Memory ROM Permanent storage that holds the computer’s startup instructions and other essential data. Hard Disk Drive HDD A magnetic storage device that…

  • How do I check if a QR code will do what it is supposed to do.

    What the heck is a QR code you ask? I had a bad experience with a fake QR code and I do not want you to have one. The real term is Quishing. It has become one of the most common scams recently. This article will cover it. noun trademarka machine-readable code consisting of an array…

  • Beware the hacker Grinch. Check these common holiday scams out

    Common holiday scams often target individuals during holiday seasons when people are shopping online, traveling, and participating in festive activities. It’s essential to be aware of these scams to protect yourself. Here are some common holiday scams: To protect yourself from holiday scams, exercise caution, verify the legitimacy of onlin

  • I am encouraging people to change their passwords if they are using any of these weak passwords changing them frequently is a good security practice:

    If your password is here please change it. The best way to change your password is to say “lost my password”. An email will be sent you you and you put you new non-guessable password there, 2 times. Save that password but it is also smart to change it every time. I does not hurt…

  • Here is the next 25 passwords that are the most common. If yours is here Please change it.

    Here are passwords ranked from 26 to 50 in terms of commonality, although I strongly advise against using or promoting these passwords as they are highly insecure: These passwords were take from a list used in a password cracker app. The app checks each password until it get a positive hit. There are many different…

  • CCleaner was hacked and here is some details if u use it.

    On October 27, 2023, CCleaner confirmed that a data breach had exposed the personal information of some of its paid customers. The breach was reportedly caused by the MOVEit hack in May, which was a data breach that affected thousands of organizations that use the MOVEit file transfer tool. Thanks goodness I am broke and…

  • What is a VPN and why should I use it?

    A VPN, or virtual private network, is a secure network connection that encrypts your internet traffic and routes it through a remote server. This makes it difficult for third parties to track your online activity or steal your personal information. VPNs are used for security purposes for a number of reasons: VPNs are a valuable…

  • If you use any of these passwords, please change now. These are the 25 most common passwords

    If you think you fooled someone by using one of these passwords backwords, you are wrong. This should give u and idea when a password cracker app has a list of password and it checks that list until it gets the right one. Cybersecurity experts recommend using strong, unique, and complex passwords to protect your…

  • This Halloween Don’t Get Ghoted by Scammers

    By Andrew Rayo Consumer Education Specialist October 26, 2023 Image Halloween is almost here. What could be scarier than not having your costume ready? How about ordering a costume online and never getting what you paid for? Scammers are making this season extra spooky by pretending to be real companies like Spirit Halloween and Party City. But…

  • Account Takeover Methods.

    CHANGE YOUR PASSWORD OR SUFFER! All your passwords need to be changed every 6 months or delete your accounts if you do not use them any more. Linking accounts is a easy way for hackers to enter you vital points of access. In many cases people use the same password for everything so you made…

  • One reason out of a thousand why Facebook is a place for hackers

    Here is and example: Do not click on this link is you see it because it is a browser reader. This very fast search with easy to use tools found this I found this using my right click skills. This is just one prime example why using Facebook for anything else other can communicating with…

  • How can you be sure that a virus has been removed from your computer?

    There is no way to be 100% sure that a virus has been removed from a computer, but there are a few things you can do to increase the likelihood: Even if you follow all of these steps, there is still a small chance that the virus may not have been completely removed. However, by…

Got any book recommendations?