1 00:00:04,400 --> 00:00:08,039 Speaker 1: The latest email scam raising eyebrows because it contains personal 2 00:00:08,039 --> 00:00:11,600 Speaker 1: information one of your real passwords. What's going on? I'm 3 00:00:11,680 --> 00:00:14,720 Speaker 1: Rich Demiro, this is Rich on Tech. Usually you can 4 00:00:14,720 --> 00:00:17,759 Speaker 1: spot a scam email pretty quickly. You see the poor grammar, 5 00:00:18,040 --> 00:00:20,319 Speaker 1: the spelling mistakes, and some of the things in the 6 00:00:20,360 --> 00:00:23,800 Speaker 1: email just don't add up. But spammers and scam artists, 7 00:00:23,800 --> 00:00:26,600 Speaker 1: they just keep upping their game, and their latest attempt 8 00:00:26,680 --> 00:00:28,920 Speaker 1: is pretty unique. I got a lot of emails about 9 00:00:28,920 --> 00:00:31,160 Speaker 1: this one, So here we go. The email starts out 10 00:00:31,240 --> 00:00:33,400 Speaker 1: strong with something like I won't beat around the bush, 11 00:00:33,479 --> 00:00:35,680 Speaker 1: I know that your password is, and then there it 12 00:00:35,720 --> 00:00:38,360 Speaker 1: is one of your passwords. The rest of the email 13 00:00:38,400 --> 00:00:40,440 Speaker 1: is a blackmail attempt. It says that it has some 14 00:00:40,479 --> 00:00:44,160 Speaker 1: compromising video of you taken from your computer's webcam during 15 00:00:44,200 --> 00:00:46,920 Speaker 1: a visit to an adult website. The video will be 16 00:00:46,960 --> 00:00:49,040 Speaker 1: released to friends and family if you don't pay up 17 00:00:49,040 --> 00:00:51,960 Speaker 1: a ransom, and the amount varies, but the email asks 18 00:00:52,000 --> 00:00:54,400 Speaker 1: for payment in bitcoin. Now this is where I think 19 00:00:54,400 --> 00:00:56,960 Speaker 1: the email sort of loses it. What average person getting 20 00:00:56,960 --> 00:00:58,680 Speaker 1: this email is going to be able to figure out 21 00:00:58,720 --> 00:01:00,840 Speaker 1: not only how to buy bitcoin, but also how to 22 00:01:00,880 --> 00:01:03,680 Speaker 1: send it to an anonymous spammer. Now, there are many 23 00:01:03,800 --> 00:01:07,559 Speaker 1: variations of the email going around. One has nineteen that's right, 24 00:01:07,720 --> 00:01:10,680 Speaker 1: nineteen steps on how to buy bitcoin and send it 25 00:01:10,680 --> 00:01:12,840 Speaker 1: to the proper address. That's a lot of work for 26 00:01:12,880 --> 00:01:15,240 Speaker 1: an anonymous email, but still, with one of the top 27 00:01:15,280 --> 00:01:19,039 Speaker 1: adult websites registering over sixty million visitors a day, the 28 00:01:19,080 --> 00:01:22,319 Speaker 1: email might certainly have some folks wondering if it could 29 00:01:22,319 --> 00:01:24,440 Speaker 1: be real. By the way, the scam isn't just being 30 00:01:24,520 --> 00:01:27,839 Speaker 1: delivered by email. People are also getting the same blackmail 31 00:01:27,840 --> 00:01:31,080 Speaker 1: message printed out and delivered to their home address through 32 00:01:31,080 --> 00:01:33,880 Speaker 1: the regular mail. So what's happening here? How did they 33 00:01:33,880 --> 00:01:36,839 Speaker 1: get your password? The passwords are likely pulled from recent 34 00:01:36,920 --> 00:01:39,440 Speaker 1: hacks of major websites, and there have been many high 35 00:01:39,480 --> 00:01:42,920 Speaker 1: profile hacks at really popular sites. So all the scammers 36 00:01:42,959 --> 00:01:44,720 Speaker 1: need to do is find one of these lists that 37 00:01:44,800 --> 00:01:48,040 Speaker 1: contain a combination of emails and passwords and then mail 38 00:01:48,120 --> 00:01:50,680 Speaker 1: merge them with the scam email and send them off. 39 00:01:51,120 --> 00:01:53,440 Speaker 1: Bottom line, you can ignore the email, but there are 40 00:01:53,440 --> 00:01:56,360 Speaker 1: some very important lessons to be learned here. First off, 41 00:01:56,560 --> 00:01:59,720 Speaker 1: don't reuse passwords. I know this is tempting since it's easy, 42 00:02:00,000 --> 00:02:02,640 Speaker 1: but these days it is not a good idea. Basically, 43 00:02:02,680 --> 00:02:04,840 Speaker 1: if one site is hacked, the bad guys can take 44 00:02:04,880 --> 00:02:07,560 Speaker 1: your password from that site and try it at various 45 00:02:07,600 --> 00:02:10,079 Speaker 1: other websites. The best thing to do is use a 46 00:02:10,120 --> 00:02:12,600 Speaker 1: password manager. These are little apps that you install on 47 00:02:12,600 --> 00:02:15,960 Speaker 1: your computer, phone, and tablet and they generate strong, random 48 00:02:15,960 --> 00:02:18,360 Speaker 1: passwords and remember them for you. Then when you go 49 00:02:18,400 --> 00:02:20,160 Speaker 1: to that site, you can copy and paste your use 50 00:02:20,160 --> 00:02:22,600 Speaker 1: your name and password into it from the password manager, 51 00:02:22,960 --> 00:02:25,600 Speaker 1: or the password manager might just fill in the password 52 00:02:25,639 --> 00:02:28,200 Speaker 1: for you, depending on what type of device you're using. 53 00:02:28,480 --> 00:02:30,480 Speaker 1: Keep in mind you'll also want to protect your log 54 00:02:30,520 --> 00:02:34,040 Speaker 1: into the password manager with what's called two factor authentication. 55 00:02:34,560 --> 00:02:36,120 Speaker 1: This means when you log in, you're going to get 56 00:02:36,160 --> 00:02:38,720 Speaker 1: a text to your cell phone with a special code 57 00:02:38,720 --> 00:02:41,680 Speaker 1: that you'll have to enter before your login can proceed. 58 00:02:41,880 --> 00:02:43,920 Speaker 1: The idea here is that a hacker might have access 59 00:02:43,919 --> 00:02:46,760 Speaker 1: to your password, but hopefully they don't also have access 60 00:02:46,800 --> 00:02:49,120 Speaker 1: to your phone, so they won't get that code, and 61 00:02:49,160 --> 00:02:51,000 Speaker 1: then they can't type it in and the log in 62 00:02:51,120 --> 00:02:53,280 Speaker 1: won't go through. And if it sounds like a lot 63 00:02:53,280 --> 00:02:55,760 Speaker 1: of work, well it sort of is. But that's the point. 64 00:02:55,919 --> 00:02:59,560 Speaker 1: Think about the information you're protecting these days, photos, documents, 65 00:03:00,000 --> 00:03:03,760 Speaker 1: banking and all of your private info. It's all online 66 00:03:03,880 --> 00:03:06,720 Speaker 1: and in the cloud. So two apps to look into, 67 00:03:06,919 --> 00:03:10,400 Speaker 1: last Pass, which is free, and dash Lane, which costs 68 00:03:10,560 --> 00:03:14,120 Speaker 1: sixty dollars a year. Another popular password manager is called 69 00:03:14,320 --> 00:03:18,200 Speaker 1: one password, that's the number one and password. There you 70 00:03:18,240 --> 00:03:20,320 Speaker 1: have it. The latest email scam, plus how to protect 71 00:03:20,320 --> 00:03:23,120 Speaker 1: yourself from similar attempts to steal your money or more, 72 00:03:23,200 --> 00:03:26,160 Speaker 1: because once you realize the patterns here, you can help 73 00:03:26,200 --> 00:03:28,320 Speaker 1: protect yourself. If you want to see the email, you 74 00:03:28,360 --> 00:03:31,160 Speaker 1: can go to my website it's richon tech dot tv, 75 00:03:31,360 --> 00:03:33,000 Speaker 1: or you can check the show notes for a link. 76 00:03:33,280 --> 00:03:35,320 Speaker 1: Thanks so much for listening, and please let your friends 77 00:03:35,320 --> 00:03:37,880 Speaker 1: know about the show by taking a screenshot of the 78 00:03:37,920 --> 00:03:40,960 Speaker 1: podcast and then sharing it to your Instagram stories. And 79 00:03:41,040 --> 00:03:42,840 Speaker 1: don't forget to tag me so I can share it 80 00:03:42,880 --> 00:03:45,320 Speaker 1: to my stories. All right, I'm Rich dmiro. I'll talk 81 00:03:45,320 --> 00:03:46,200 Speaker 1: to you real soon