Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Alert – Phone Scammers Target PC Users With Phony Virus Reports

Folks, here is a headline news story you should be aware of, and – also tell your friends and family about (heck, tell everyone at the office, too) — don’t let them become a victim of this “scare scam”.

Phone scammers target PC users with phony virus reports

Online con artists are targeting PC users worldwide in a brazen scam. It starts with a phone call from a “tech support specialist” who warns that your computer is infected with a virus.Read more..

Please.. if you read just one tech story this week, let it be that one. (This, or similar to this, has already been tried on several readers.. so be aware!)

• Loyal readers of Tech – for Everyone are probably aware that I receive dozens of requests from folks who want me to review their product and/or service — far too many requests for me to honor them all, actually. However, I would like to bring one recent one to your attention: there’s a new “engine” in town., a unique comparison engine, allows consumers to make quick and informed decisions on all sorts of topics.

When it comes to shopping for hot new tech-products, their  electronics category is great for comparing smartphones, laptops, and tablets, based on the specs you care most about. allows you to:
•       Start with a comprehensive list of models and narrow down by brand, technical specifications, operating systems, network, manufacturer, price, and more
•       Compare with simple and easy to use side-by-side interface
•       Obtain unbiased ratings and detailed product specs

This site impressed me because they link to the manufacturer (or source) and any prices listed are MSRP — this isn’t about finding the best online price (you can use Shopzilla for that) but about making informed decisions.. or simply “finding out more”.
(Though I used tech devices as my example, you’ll find that’s  just one small ‘area’ of the site.) Take a look at

• It has been a while since the never-ending “browser wars” has come up here.. or I have been asked “which one’s faster?” In spite of the hype, I think we have settled into our choice. But, what the hey. I could be wrong. So here’s the latest “shootout”.

The BIG browser benchmark! Chrome 15 vs Opera 11 vs IE9 vs Firefox 8 vs Safari 5

Chrome 15 vs Opera 11 vs IE9 vs Firefox 8 vs Safari 5 … which browser will be triumphant?Read more..

Four Destructive Myths Most Companies Still Live By

Myth #1: Multitasking is critical in a world of infinite demand. This myth is based on the assumption that human beings are capable of doing two cognitive tasks at the same time.” Read more..

My plate is full, and much to do. Have to run…

Today’s quote:Today the world changes so quickly that in growing up we take leave not just of youth but of the world we were young in.” ~ Peter Medawar

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.

>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<

November 8, 2011 Posted by | advice, computers, cyber crime, Internet, Internet scam, security | , , , , , , | 12 Comments

Would You Recognize A Scam? Are You Sure?

Scammers, Frauds, Conmen, ID Thieves, Cybercriminals, “Phish“-ers – call them what you will, but they all are attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. (This is called “social engineering” in today’s vernacular.)

The methods they use to trick us are many and varied — would you recognize a well-crafted scam? Could you spot a fake “look-alike” website? What if they mentioned your supervisor’s name and put you on hold and you heard the company musak?

Social Engineering: Eight Common Tactics

Famous hacker Kevin Mitnick helped popularize the term ’social engineering’ in the ’90s, but the simple idea itself (tricking someone into doing something or divulging sensitive information) has been around for ages. And experts say hackers today continue to steal password, install malware or grab profits by employing a mix of old and new tactics.

Here’s a refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.”

Folks, a quick reading recommendation today. This article by Joan Goodchild describes and explains how the cyber-criminals try to trick us. Please Click here to read this terrific primer. (And if you are an employer, you may want to ask your employees to read this too…)

Copyright 2007-2010 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

February 1, 2010 Posted by | cyber crime, how to, Internet scam | , , , , , , , , , , | Leave a comment