ComputerHelpSOS Cyber Security Training / Newsletter, updated December 4, 2025
ComputerHelpSOS
Cybersecurity Training & Newsletter
Updated: December 16th, 2025
How Do Crooks Get Onto Your Device?
Most cyberattacks start with email or web browsing.
Typically, you’ll receive an email that:
-
Claims your device is infected
-
Includes a phone number to call or a link to click
-
Urges immediate action
Sometimes, while browsing the web, scareware appears—fake alerts warning that your computer is infected.
⚠️ These alerts are not real.
What Is the Goal of These Scams?
The goal is simple:
-
Gain access to your device
-
Lock you out
-
Demand ransom or steal your data
Data theft is complex, so many scammers prefer to lock your system and blackmail you instead.
Many of these operations are run offshore (commonly reported locations include parts of Africa and India), making them difficult to trace or shut down.
Scareware Explained
Scareware tricks you into thinking your system is infected.
Important to know:
-
The email itself usually does not contain a virus
-
The link leads to a malicious website
-
That website installs malware or gives the scammer access
Common Examples:
-
Fake McAfee invoices sent from Gmail addresses
-
Fake PayPal invoices asking you to call a number
-
Fake DocuSign emails
Remedy: Bitdefender Endpoint Security
🚫 Critical Rule: Do NOT Call the Number
Even with good antivirus protection, you must follow this rule:
❌ Do not call the phone number
❌ Do not click the links
❌ Do not call to dispute a charge
❌ Do not call to “set them straight”
Do not call anyone listed in these messages.
What Are Crooks After?
-
Access to your computer, phone, or tablet
-
Access to online banking and financial accounts
-
Personal data they can exploit or sell
How to Protect Yourself
Secure Your Devices
-
Always require authentication (PIN, password, fingerprint, or face ID)
-
Use different passwords for every service
-
Store passwords encrypted
Encryption ensures stolen data cannot be read.
Password Managers (Highly Recommended)
I recommend RoboForm because:
-
Uses strong encryption
-
Requires a master password, PIN, or fingerprint
-
Works on phones, laptops, and desktops
-
Syncs securely across devices
❌ Do NOT store passwords in:
-
Word documents
-
Excel spreadsheets
-
Plain text files
Antivirus: Good vs. Bad
The difference between antivirus products is what they actually catch.
From real-world experience:
-
Some antivirus software allows threats through
-
This is especially true when malware hides inside installed programs
Recommended:
-
Bitdefender Total Security
-
McAfee (Intel)
If Someone Is on Your Device Right Now
-
Disconnect immediately:
-
Unplug Ethernet or power (PC)
-
Turn off Wi-Fi
-
Shut down the device
-
-
Unplug your router if necessary
-
Call a professional technician
Phone Security
-
Caller ID can be faked
-
If your “bank” calls → hang up and call the number on your card
-
Microsoft, McAfee, IRS, or tax agencies will not call you
📱 Bitdefender Mobile Security helps block:
-
Text phishing
-
Malicious PDFs
-
Scam websites
Where Are Phones Most Often Lost?
In the supermarket.
If You Lose Your Phone
Immediately:
-
Call your bank and block accounts
-
Call credit card companies
-
Block the phone
-
Try to locate it
-
If not found → erase it remotely
Phone Recovery Links
Apple: https://www.icloud.com/find/
Android (Samsung): https://smartthingsfind.samsung.com/login
VPN (Virtual Private Network)
Always use a VPN in:
-
Coffee shops
-
Airports
-
Hotels
-
Public Wi-Fi
Email Accounts to Avoid
-
❌ @comcast.net
-
❌ @yahoo.com
(These accounts are frequently targeted.)
Payments & Banking Safety
-
❌ Do NOT send money via Zelle (no refunds)
-
✅ Use credit cards when possible
-
❌ Never share account or routing numbers
Real Customer Story: How It Happens
A customer saw a giant yellow alert claiming their computer was hacked.
The cursor even moved on its own.
They called the number.
The “technician” gained remote access, watched everything typed, and later drained the customer’s bank account—even though the customer never shared the password directly.
Key Takeaway
🚨 Never click virus alerts
🚨 Never call tech support pop-ups
🚨 Always contact a trusted provider directly
Spoofing: Calls in Disguise
Scammers can fake phone numbers so your caller ID shows:
-
Chase Bank
-
Microsoft
-
PayPal
Always hang up and call the official number yourself.
Additional Best Practices
-
Do not share your computer with children
-
Always lock Windows with a PIN or password
-
Enable BitLocker (Windows Pro)
-
Use a Microsoft ID (not a local account)
Email & Backup Protection
-
Most attacks come from malicious links, not attachments
-
Businesses need:
-
Email backup
-
OneDrive & SharePoint backup
-
Device image backups
-
Recommended:
-
Encrypted image backup monthly
-
Incremental backups daily
Endpoint Protection
Bitdefender Endpoint Protection:
-
Scans every clicked link
-
Protects your drive from malware
-
Blocks malicious websites automatically
Affordable Protection
💻 PC protection with backups, updates, antivirus & link protection: ~$15/month
📧 Email & OneDrive backup: ~$10/month
📞 Contact ComputerHelpSOS
Call: (571) 604-5679
For cybersecurity protection, backups, and peace of mind.