Senior Online Safety: Useful Tips to Stay Safe and Secure for Seniors, Both Online and Off
()
About this ebook
And while this is an online safety guide, included are descriptions and analyses of various criminal scams and techniques which are being used to prey upon all of us, both online and off; these range from the infamous “one-ring scam” to “identity theft.”
In two sections, the discussion on passwords and on anti-virus software, I make specific recommendations and/or draw from industry reviews which identify “best-of-class” products. Prevendra (the publisher) reached out and established direct relationships so as to avail these to you directly from the pages of this e-book.
Related to Senior Online Safety
Related ebooks
Cybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsCapital of Spies Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Conquer the Web: The Ultimate Cybersecurity Guide Rating: 0 out of 5 stars0 ratingsCyber Security and the Future of Digital Payments Rating: 0 out of 5 stars0 ratingsHackproof Email Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsOnline Safety: Scams, SPAM, Viruses and Clouds Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsSurviving Modern Technology: Understanding Safety and Privacy Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsHacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsComputer Security: 20 Things Every Employee Should Know Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsMobile Data Loss: Threats and Countermeasures Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Guide to PC Security Rating: 0 out of 5 stars0 ratingsHacking Wireless Networks For Dummies Rating: 3 out of 5 stars3/5Basic security settings for gadgets & digital platforms Rating: 0 out of 5 stars0 ratingsThe Ransomware Handbook: How to Prepare for, Prevent, and Recover from Ransomware Attacks Rating: 4 out of 5 stars4/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsCybersecurity for the Modern Adult: Protecting Yourself Online Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5
Teaching Methods & Materials For You
Dumbing Us Down - 25th Anniversary Edition: The Hidden Curriculum of Compulsory Schooling Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Closing of the American Mind Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5The Lost Tools of Learning Rating: 5 out of 5 stars5/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5The Three Bears Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Inside American Education Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5A study guide for Frank Herbert's "Dune" Rating: 3 out of 5 stars3/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5A Failure of Nerve: Leadership in the Age of the Quick Fix (10th Anniversary, Revised Edition) Rating: 4 out of 5 stars4/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Raising Human Beings: Creating a Collaborative Partnership with Your Child Rating: 4 out of 5 stars4/5The Call of the Wild and Free: Reclaiming the Wonder in Your Child's Education, A New Way to Homeschool Rating: 4 out of 5 stars4/5
Reviews for Senior Online Safety
0 ratings0 reviews
Book preview
Senior Online Safety - Christopher Burgess
Closing
Chapter 1 - The One Ring Scam
Know what to do when the phone rings once and the criminals reach out and touch you.
The infamous one-ring scam has been present since the first premium telephone service offering was provided by telephone companies and will be around as long as those numbers continue to be available. While no evidence has been availed which indicates the specific targeting of senior citizens, the bulk nature of the criminal’s modus operandi ensures that a good number of senior citizens will be caught up in the scam.
The One-Ring Scam Dissected
The hook: You receive a phone call on your cell or land line telephone. The caller allows the line to engage and ring one time. The caller then hangs up. Your caller-id shows the number from which the call originated. It may or may not, depending on your service provider,show you the geographic point of origin.
The play: You see the number and while you don’t recognize it, you immediately call the number back. When you do, the call is answered and you may be put on hold, or provided to a live person, or asked to listen to a recording – all have been encountered.
The payout: The owner of the phone number you just called back has one goal and one goal only, to keep your phone connected to their phone for as long as possible. The number which you called is a premium-call number
— a premium number for which the owner garners anywhere from $1 to $20+ per minute for your call from their telephone company. The criminal’s phone company receives its payment from your telephone company, and they collect the money from you via your telephone bill. The current (January-February 2014) rash of calls are originating from a number of Caribbean