<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.c3-solutions.ca/stories/tag/onlinesafety/feed" rel="self" type="application/rss+xml"/><title>C3 Solutions - Stories #onlinesafety</title><description>C3 Solutions - Stories #onlinesafety</description><link>https://www.c3-solutions.ca/stories/tag/onlinesafety</link><lastBuildDate>Thu, 26 Mar 2026 13:08:05 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Stay Safe This Holiday Season: Watch Out for These Scams!]]></title><link>https://www.c3-solutions.ca/stories/post/stay-safe-this-holiday-season-watch-out-for-these-scams</link><description><![CDATA[The holiday season is a time of joy, generosity, and celebration. But for scammers, it’s prime time to take advantage of unsuspecting individuals. Wit ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_HWlhOv7FSEOLNvJSx2N6cA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YJkX4iKGSrat6NwKwZCC4w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fcRSPqSXS22LPqyaDFyoYQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_h9oeuILTQwih3OkIzd7vjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><style type="text/css">.zpelem-col { }</style><div><div><p><span style="color:inherit;">The holiday season is a time of joy, generosity, and celebration. But for scammers, it’s prime time to take advantage of unsuspecting individuals. With the hustle and bustle of gift shopping, planning gatherings, and year-end tasks, it's easy to overlook warning signs. Protect yourself and your loved ones from the grinches of the holidays by staying informed about these common holiday scams:</span></p></div>
</div></div><div><div><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/Untitled%20design-201-.png" alt="scamming grinch (produced by OpenAI)"></span></figure></div>
</div></div></div><div><h3><span style="color:inherit;"><strong>Top Holiday Scams to Watch For:</strong></span></h3></div>
<div><div><div style="color:inherit;"><li><span style="font-weight:bold;">Counterfeit Merchandise</span><br/><span style="color:inherit;">That designer handbag or new gaming console advertised at half price might look like a steal, but it could be fake—or worse, non-existent. Scammers often create professional-looking websites with &quot;too-good-to-be-true&quot; deals. After payment, you may receive a poorly made knockoff or nothing at all. Look for spelling errors on the site and check for secure payment methods before purchasing.</span></li></div>
<p></p></div></div><div><div><div><li><span style="font-weight:bold;">Charity Scams</span><br/><span>Scammers know people are more likely to donate during the holidays. They impersonate real charities or invent fake ones to tug at your heartstrings. You might get a call, email, or even a door-to-door solicitor asking for contributions. Always verify the charity's legitimacy through trusted sources like the CRA Charity List or CanadaHelps.org.</span><br/></li></div>
</div></div><div><div><div><style>.zpelem-text { }</style><div><div style="color:inherit;"><div><li><span><span style="font-weight:bold;">Fraudulent Gift Cards</span><br/><span>Gift cards are a go-to holiday gift, but they’re also a target for scammers. Fraudsters tamper with cards in stores, scratching off the PIN to steal the funds once activated. Buying cards from unofficial sellers (like online marketplaces) is especially risky. Stick to purchasing directly from the retailer and inspect the card packaging before buying. This is something we can see in videos like </span>the one seen here:<br/></span></li></div>
</div><p></p></div></div></div><div><div><div><a href="https://www.youtube.com/embed/ahSx5PTi-EQ?si=upbeDCzMr5w9cmkg" target="_blank">https://www.youtube.com/embed/ahSx5PTi-EQ?si=upbeDCzMr5w9cmkg</a></div>
</div></div></div><div><div><li><p><span style="font-weight:bold;">Fake Secret Santa Schemes</span><br/>Social media &quot;Secret Santa&quot; gift exchanges promise you’ll receive multiple gifts if you send just one, but many are pyramid schemes in disguise. Others ask for your personal details, which could be used for identity theft. Be cautious about any exchange promoted through random social media posts or strangers.<br/><br/></p></li><li><p><span style="font-weight:bold;">Shipping Frauds</span><br/>With the rise in online shopping, scammers send fake notifications claiming issues with your package. Emails or texts impersonate companies like Canada Post or UPS, urging you to click a link to &quot;resolve the issue&quot; or pay extra fees. These links often lead to phishing sites or malware. Always track your packages directly through the retailer’s website or the shipping provider’s official site.<br/><br/></p></li><li><p><span style="font-weight:bold;">Fake Online Shopping Links</span><br/>Those flashy ads you see on social media promising massive discounts on electronics, clothes, or toys often lead to fraudulent sites. Once you enter your payment information, you might receive counterfeit goods—or nothing at all. Stick to known retailers and avoid clicking on ads that seem suspicious.</p></li></div>
</div><div><h3><span style="color:inherit;"><strong>Tips to Protect Yourself:</strong></span></h3></div>
<div><div><div style="color:inherit;"><li><span style="font-weight:bold;">Think Before You Click</span><br/>Avoid clicking links in unsolicited texts or emails. Instead, visit official websites directly. Don't click a link that may look like it is from Amazon containing products with what seems like a &quot;good&nbsp; deal&quot; as it is not, they will steal your money.<br/><br/></li><li><span style="font-weight:bold;">Do Your Research</span><br/>Verify charities through platforms like CanadaHelps.org or by checking their CRA registration. Also verify websites by checking reviews and using tools like Trend Micro or NordVPN. <br/><br/></li><li><span style="font-weight:bold;">Trust Your Instincts</span><br/>If a deal feels too good to be true, it probably is. Stick to trusted retailers and reputable sites. A luxury car on marketplace that needs no maintenance for a price that seems unreal it is. If a deal is on a website like Amazon but the url is NOT www.amazon.com/ or www.amazon.ca/ DO NOT buy it.&nbsp; <br/><br/></li><li><span style="font-weight:bold;">Secure Your Shopping</span><br/>Avoid using public Wi-Fi for transactions and ensure websites start with &quot;https://&quot; before entering payment information.<br/><br/></li><li><span style="font-weight:bold;">Scrutinize Reviews</span><br/>Fake testimonials and five-star reviews can be misleading. Make sure the profiles creating the reviews are valid and make sure the company has been around for a while.&nbsp; Check multiple sources.<br/><br/></li><li><span style="font-weight:bold;">Track Packages</span><br/>Keep records of your orders and expected delivery dates to avoid falling for fake tracking updates that look like emails containing your tracking date. To find most tracking dates on most sites click on your latest order and find the tracking number directly through the site you have made the purchase from. <br/></li></div>
<p></p></div></div><div><h2><span style="color:inherit;"><strong>Report Fraud</strong></span></h2></div>
<div><div><p><span style="color:inherit;">If you’ve been targeted or have lost money, report the incident to the <strong>Canadian Anti-Fraud Centre</strong> or contact the local police at <strong>1-888-310-1122</strong>.</span></p></div>
</div><div><div><p><span style="color:inherit;">Stay vigilant and keep your holiday season merry and bright by steering clear of these scams!</span></p></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
 ]]></content:encoded><pubDate>Thu, 05 Dec 2024 12:03:29 -0500</pubDate></item><item><title><![CDATA[OPP warns public of online extortion scam in Prince Edward County]]></title><link>https://www.c3-solutions.ca/stories/post/opp-warns-public-of-online-extortion-scam-in-prince-edward-county</link><description><![CDATA[The Ontario Provincial Police (OPP) in Prince Edward County is warning residents to be cautious online after receiving multiple reports of an online e ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kwYo6pmCSYuAdhEey6a7sQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZxP1ZIjFTNqAI1rqA0lmQg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_atbPvvssRBOidg_22EvQtA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jljPVLGrS5qEt00ZOtTJ7Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div><div><div><figure><span style="color:inherit;">The Ontario Provincial Police (OPP) in Prince Edward County is warning residents to be cautious online after receiving multiple reports of an online extortion scam in recent weeks.</span></figure></div></div><div><div><div style="color:inherit;"><p><br/></p><p>The scam involves emails that include personal information and falsely claim to have inappropriate videos or images of the recipient. Scammers demand $2,000 in cryptocurrency, threatening to release the alleged content if payment isn’t made.<br/><br/></p><p>To help protect yourself, the OPP recommends the following precautions:</p><ul><li>Take time to verify claims and ask questions.</li><li>Request credentials from individuals or organizations.</li><li>Trust your instincts—if something feels off, it probably is.</li><li>Be cautious of requests for cash or cryptocurrency.</li><li>Don’t act on urgent or high-pressure demands for money.<br/><br/></li></ul><p>Residents are urged to avoid rushing into payments and to report any suspicious activity to the authorities.</p></div>
<p></p></div></div><div><h2>Interested in local security updates? <br/></h2></div>
<div><div><p>Sign up for our Security Newsletter Below.<br/></p></div></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 20 Nov 2024 10:18:22 -0500</pubDate></item><item><title><![CDATA[Brampton woman loses over $200,000 to romance scam]]></title><link>https://www.c3-solutions.ca/stories/post/brampton-woman-loses-over-200-000-to-romance-scam</link><description><![CDATA[
 A woman from Brampton is devastated after losing over $200,000—her entire life savings—to a romance scam. Original Article By: Pat Foran CTV News A ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_fSTbQoKmS4amQmvccQzHKQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zS1tLPRNTD24o9rRFMIxTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_DUTY6G-aR0Wdf6iOF9hfmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_uPMUMVW-R-ev4n8R9jaCAA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><div><style>.zpelem-text { }</style><div><div></div>
<div style="text-align:left;"> A woman from Brampton is devastated after losing over $200,000—her entire life savings—to a romance scam. </div>
</div></div></div><div><div><div><p>Original Article By: Pat Foran<br/></p></div>
</div><div><div><a href="https://toronto.ctvnews.ca/he-begged-me-brampton-ont-woman-loses-more-than-200k-to-romance-scam-1.7106395" target="_blank" title="https://toronto.ctvnews.ca/he-begged-me-brampton-ont-woman-loses-more-than-200k-to-romance-scam-1.7106395"><span>CTV News Article</span></a></div>
</div></div></div><div><div><p><span style="color:inherit;">CTV News Toronto agreed to use the pseudonym &quot;Anne&quot; to protect her identity.</span></p></div>
</div><div><div><p><span style="color:inherit;">Anne explained that two years ago, she received a friend request from a man seeking friendship. &quot;He said he was looking for a friend, and he came across as a very nice person, always telling me I sounded genuine and that he’d like to visit me in Canada,&quot; Anne shared.</span></p></div>
</div><div><div><p><span style="color:inherit;">Over the next year, the man confided in Anne, saying his wife had died of cancer and that he had two sons in need of money for surgeries. He told her he was working in Texas on a six-month contract and expected to receive $5.6 million but needed temporary financial help.</span></p></div>
</div><div><div><p><span style="color:inherit;">Initially, Anne resisted sending money, but he sent her roses and continued to persuade her. &quot;He pleaded with me and said, ‘You seem like such a nice person; if you could just help me out,’ and eventually, I did,&quot; Anne said.</span></p></div>
</div><div><div><p><span style="color:inherit;">Anne eventually grew concerned after realizing she had given substantial amounts of money to a man she had never met in person. &quot;In a year’s time, he borrowed all my savings—over $200,000,&quot; she said. Ultimately, Anne lost $230,000.</span></p></div>
</div><div><div><p><span style="color:inherit;">Romance scams are among the three most common fraud types in Canada. According to the Canadian Anti-Fraud Centre, Canadians lost over $52 million to these scams last year, with nearly $23 million lost in the first half of 2024 alone.</span></p></div>
</div><div><div><p><span style="color:inherit;">Cybersecurity experts explain that romance scammers target individuals online, developing relationships and claiming financial distress. They promise to repay the money but offer excuses for not meeting in person. Once sent, the money is nearly impossible to recover.</span></p></div>
</div><div><div><p><span style="color:inherit;">Anne says she feels devastated, embarrassed, and humiliated for giving her life savings to a stranger. &quot;I’m very hurt, and I keep thinking of all the other things I could have done with that money—but now it’s gone,&quot; she said.</span></p></div>
</div><div><h2>Protect your assets!<br/></h2></div><div><div><p><span style="color:inherit;">To protect against the rising threat of online scams, it’s essential to approach digital interactions with caution and skepticism. Scammers today use a range of tactics, from;</span></p></div>
</div></div></div><div><div><div><style>.zpaccordion-container.zpaccordion-style-01 .zpaccordion { font-family: "Montserrat", sans-serif; font-size: 24px; font-weight: 700 }.zpaccordion-container.zpaccordion-style-01 .zpaccordion, .zpaccordion-container.zpaccordion-style-01 .zpaccordion-content { border-style: solid }.zpaccordion-container.zpaccordion-style-01 .zpaccordion-content.zpaccordion-active-content:last-of-type { }.zpaccordion-container.zpaccordion-style-01 .zpaccordion.zpaccordion-active + .zpaccordion-content { }</style><div><div style="margin-top:0;"><span>Phishing Emails</span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span></div>
<div style="margin-top:0;"><div><div><div><div><div> Phishing emails are fraudulent messages that aim to deceive recipients into revealing personal information, such as passwords, credit card details, or social security numbers. These emails often look like they come from legitimate sources—such as banks, well-known companies, or government agencies—and can appear highly convincing, sometimes even copying the logo, email format, and language style of trusted organizations. </div>
</div><div><div><div style="color:inherit;"><p>Here are key signs of phishing emails and tips for recognizing them:</p><p><span style="font-weight:bold;">1. Urgent or Threatening Language:</span></p><ul><li>Phishing emails frequently use scare tactics, such as warnings that your account will be suspended or that there’s been suspicious activity. This pressure tactic is meant to make you act quickly without thinking.<strong>Unfamiliar Sender or Email Address</strong>: Often, phishing emails come from addresses that don’t match the organization they claim to represent, with slight misspellings or added numbers. It’s always wise to check the sender's email carefully.</li></ul><p><span style="font-weight:bold;">2. Unusual Links or Attachments:</span><br/></p><ul><li>Phishing emails often contain links that lead to fake websites designed to capture login credentials. Attachments, on the other hand, may contain malware. Hover over any link to see the actual URL before clicking, and never open unexpected attachments.</li></ul><p><span style="font-weight:bold;">3. Generic Greetings and Mistakes: <br/></span></p><ul><li><span style="font-weight:bold;">&nbsp;</span>Many phishing emails use generic greetings like “Dear Customer” rather than your name. Poor grammar and spelling errors are also red flags, as legitimate organizations generally have more polished communication.</li></ul><p><span style="font-weight:bold;">4. Requests for Personal or Financial Information:</span>&nbsp;</p><ul><li>Reputable organizations rarely request sensitive information, like your password, bank details, or social security number, through email. If an email asks for this, it’s likely a scam.</li></ul></div>
</div></div><div><div><p><span style="color:inherit;">To protect yourself, keep security software up to date, use strong passwords, and avoid clicking on links or downloading attachments in suspicious emails. When in doubt, contact the organization directly using official channels—not through the contact information in the email. Additionally, report phishing emails to your email provider or cybersecurity agencies to help others stay safe.</span></p></div>
</div></div></div></div></div><div style="margin-top:0;"><span>Fraudulent Websites</span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span></div>
<div style="margin-top:0;"><div><div><div><div><div> Fraudulent websites are fake or deceptive sites created to trick users into sharing sensitive information, making purchases, or installing malware. These sites are often designed to look like legitimate business or government websites, mimicking branding, logos, and even web layouts to seem trustworthy. </div>
</div><div><div><p>Here are ways to spot fraudulent websites and protect yourself online:<br/><br/></p><p><span style="font-weight:bold;">1. Check the URL Carefully: <br/></span></p><ul><li><span style="font-weight:bold;">&nbsp;</span>Fraudulent websites often have slightly altered URLs that look similar to legitimate ones but may include extra letters, numbers, or unusual domain endings (like .biz or .info instead of .com or .ca). Always verify the URL and be cautious of misspellings or hyphens.</li></ul><p><span style="font-weight:bold;">2. Look for HTTPS and a Secure Lock Icon:</span>&nbsp;</p><ul><li>Legitimate websites that handle sensitive information should use HTTPS, indicated by a padlock icon in the address bar. However, while HTTPS is important for security, some fake sites also use it, so it’s not a foolproof sign.</li></ul><p><span style="font-weight:bold;">3. Beware of “Too Good to Be True” Offers:</span>&nbsp;</p><ul><li>Fake sites frequently advertise steep discounts, giveaways, or deals that seem too good to pass up. These offers are often used to lure users into entering credit card details or making purchases that won’t be fulfilled.</li></ul><p><span style="font-weight:bold;">4. Check for Quality and Professionalism:</span>&nbsp;</p><ul><li>Fraudulent websites often contain poor grammar, low-quality images, or poorly designed layouts. Legitimate companies invest in polished, well-written websites. Excessive pop-up ads or invasive banners are also red flags.</li></ul><p><span style="font-weight:bold;">5. Look for Missing Contact Information:</span>&nbsp;</p><ul><li>Legitimate businesses typically list physical addresses, phone numbers, and customer service information. Fake websites often lack detailed contact information or provide only a generic form.</li></ul><p><span style="font-weight:bold;">6. Research the Website and Company: </span><br/></p><ul><li>If you’re suspicious, search for reviews of the website or the business. Websites like Trustpilot or the Better Business Bureau often have information on known scam sites. A quick search may reveal if others have reported the site as fraudulent.</li></ul><p><span style="font-weight:bold;">7. Be Cautious with Payment Information:</span>&nbsp;</p><ul><li>Avoid entering payment information unless you’re certain of the website’s legitimacy. Fraudulent sites may capture your financial details for unauthorized use. Use secure payment methods, such as credit cards or third-party processors, rather than debit cards, which offer less protection.</li></ul></div>
</div><div><div> By being vigilant and cautious, you can reduce your risk of falling victim to fraudulent websites. If you encounter one, report it to your browser provider or cybersecurity agencies to help protect others from potential scams. </div>
</div></div></div></div></div><div style="margin-top:0;"><span>Fake Social Profiles</span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span></div>
<div style="margin-top:0;"><div><div><div><div><div><p><span style="color:inherit;">Fake social media profiles are accounts created with false or misleading information to deceive users. These profiles are often used by scammers, bots, or fraudsters for purposes like impersonation, spreading misinformation, phishing, or tricking people into sending money or personal information.</span></p></div>
</div><div><div><p>Here’s how to recognize fake social profiles and avoid falling victim:</p><p><span style="font-weight:bold;">1. Suspicious Profile Information:</span>&nbsp;</p><ul><li>Fake accounts often have limited or generic profile information, including fake or stock photos, vague bios, or a recent account creation date. The account may lack real personal details, making it harder to verify.</li></ul><p><span style="font-weight:bold;">2. Few or Low-Quality Posts:</span>&nbsp;</p><ul><li>Fake profiles typically have few posts, often reposting generic content or inspirational quotes without any personal photos or specific life details. The content may also seem inconsistent or unrelated, as if it’s trying to appeal to a broad audience.</li></ul><p><span style="font-weight:bold;">3. Minimal or Suspicious Connections:</span>&nbsp;</p><ul><li>Fake profiles usually have a low number of friends or followers, often from unrelated locations or random demographics. Some may have an unusually high number of connections for a new or inactive account. Beware of requests from people you don’t know, especially if they have no shared connections.</li></ul><p><span style="font-weight:bold;">4. Immediate Requests for Money or Personal Information:</span>&nbsp;</p><ul><li>One of the clearest signs of a fake profile is if the person quickly brings up financial troubles, requests money, or asks for personal information like your phone number or address. This is especially common in romance and “friendship” scams.</li></ul><p><span style="font-weight:bold;">5. Poor Language and Grammar:</span>&nbsp;</p><ul><li>Many fake profiles have messages with poor grammar, odd phrasing, or formal language that seems out of place, as they are often created by scammers from different regions or automated bots.</li></ul><p><span style="font-weight:bold;">6. Inconsistent Details:</span>&nbsp;</p><ul><li>Look out for discrepancies in what the profile says and what it shows. For example, someone claiming to be from a specific place may have connections or posts that don’t align. Fake profiles often slip up on small details, making the inconsistencies noticeable if you look closely.</li></ul><p><span style="font-weight:bold;">7. Reverse Image Search:</span>&nbsp;</p><ul><li>If you’re suspicious of someone’s profile picture, try doing a reverse image search. This can reveal if the photo is a stock image or has been used in multiple fake profiles, indicating that the account is not genuine.</li></ul></div>
</div><div><div><p><span style="color:inherit;">To protect yourself, only accept friend requests from people you know, and be cautious of messages from new or unknown profiles. Avoid sharing personal information online, and report suspicious profiles to the platform’s support team. By staying vigilant, you can reduce the risk of interactions with fake profiles and protect your personal information.</span></p></div>
</div></div></div></div></div><div style="margin-top:0;"><span>SMS Messaging</span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span><span><svg class="svg-icon-15px zpaccord-svg-icon-1"></svg><svg class="svg-icon-15px zpaccord-svg-icon-2"></svg><svg class="svg-icon-15px zpaccord-svg-icon-3"></svg><svg class="svg-icon-15px zpaccord-svg-icon-4"></svg></span></div>
<div style="margin-top:0;"><div><div><div><div><div> Scam SMS messages, also known as &quot;smishing,&quot; are fraudulent texts designed to trick recipients into providing personal information, clicking on malicious links, or downloading harmful attachments. These messages often appear urgent or alarming, aiming to provoke a quick reaction. </div>
</div><div><div><p>Here are key signs of scam SMS messages and tips for staying safe:</p><p><span style="font-weight:bold;">1. Unexpected Links and Requests: </span><br/></p><ul><li>Smishing messages commonly contain links that lead to fake websites designed to capture personal information. These links may appear shortened or disguised, so always be cautious of unexpected URLs in texts, especially if they prompt you to log in or provide sensitive information.</li></ul><p><span style="font-weight:bold;">2. Urgent or Threatening Language:</span>&nbsp;</p><ul><li>Many scam texts use scare tactics to create a sense of urgency, like “Your account will be suspended” or “There’s an issue with your delivery.” This pressure tactic is intended to make you respond quickly without evaluating the message’s legitimacy.</li></ul><p><span style="font-weight:bold;">3. Too-Good-To-Be-True Offers:</span>&nbsp;</p><ul><li>Some smishing attempts offer prizes, discounts, or lottery winnings. Messages like “You’ve won a prize! Click here to claim” are red flags. Legitimate companies do not notify winners through unsolicited texts.</li></ul><p><span style="font-weight:bold;">4. Unfamiliar Senders or Generic Numbers:</span>&nbsp;</p><ul><li>Scam SMS messages often come from random or unidentifiable numbers instead of legitimate phone numbers associated with banks or companies. Be wary of texts from unfamiliar numbers, especially if they claim to be from institutions you don’t use.</li></ul><p><span style="font-weight:bold;">5. Requests for Personal or Financial Information:</span>&nbsp;</p><ul><li>Trusted organizations will never ask for sensitive information like passwords, Social Security numbers, or PINs via text. If a text requests this information, it’s likely a scam.</li></ul><p><span style="font-weight:bold;">6. Spelling and Grammar Mistakes: </span><br/></p><ul><li>Many scam messages contain poor grammar, spelling errors, or awkward phrasing. This is often a sign of low-quality scam attempts and should be a clear red flag.</li></ul><p><span style="font-weight:bold;">7. Check with the Source:</span>&nbsp;</p><ul><li>If you receive a suspicious message claiming to be from a known entity (like a bank or delivery service), contact them directly using official channels rather than responding to the text. This helps confirm if the message is legitimate.</li></ul></div>
</div><div><div><p><span style="color:inherit;">To protect yourself, never click on links or provide information in response to unsolicited messages. Consider blocking unknown or spam numbers, and use built-in spam filters offered by many mobile carriers and messaging apps. Reporting suspicious texts to your carrier or cybersecurity agencies can also help prevent smishing attempts from spreading.</span></p></div>
</div></div></div></div></div></div></div><div><div><p><span style="color:inherit;"><span>Using these things to trick people into sharing sensitive information or sending money. Always verify the legitimacy of websites, companies, and individuals before engaging. <br/></span></span></p></div>
</div><div><div><p><span style="color:inherit;"><span>Use strong, unique passwords and enable two-factor authentication to add an extra layer of security. Avoid clicking on unsolicited links or downloading unexpected attachments, even if they appear to come from familiar sources.</span></span></p></div>
</div><div><div><p><span style="color:inherit;"><span>It's also important to stay updated on current scam tactics, as fraudsters are continuously evolving their methods. Finally, report any suspicious encounters to relevant authorities, like the Canadian Anti-Fraud Centre, to help raise awareness and prevent others from becoming victims.</span></span></p></div>
</div><div><h2>Cyber Security for Businesses<br/></h2></div><div><div><p>These are all things to watch out for as a business as well. Vulnerabilities can lie within your company without you even knowing. It's best to always consult with your IT team and test for these vulnerabilities within the business. Even being proactive by having a Business level cyber security service in place like Trend Micro and other companies. If you need to consult with an IT team to figure out what is best for your company click the button below. <br/></p></div>
</div><div><div><style type="text/css">.zpbutton.zpbutton-type-primary { border-style: solid; border-color: rgb(0, 0, 0) !important; border-width: 1px }</style><a href="/solutions/technical" title="Technical Solutions"><span>Technical Solutions</span></a></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
 ]]></content:encoded><pubDate>Thu, 14 Nov 2024 12:37:48 -0500</pubDate></item><item><title><![CDATA[PodcAIst - eMail Deliverability &amp; Security]]></title><link>https://www.c3-solutions.ca/stories/post/podcaist-email-deliverability-security</link><description><![CDATA[C3 Solutions and Email Security DMARC, DKIM, and SPF are three email authentication methods that work together to verify the legitimacy of email sende ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Rcy0Dg7HRe6ANkF2moSwow" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yRJjsJ8eSdWfl3nhKnWYYQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cP0Nc-0PQ0ey1mIt6GkntQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_sjRt1PEmS2O9WlsvL5nenw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><h2><span style="color:inherit;">C3 Solutions and Email Security</span></h2></div>
<div><div><p style="text-align:left;"><span style="color:inherit;">DMARC, DKIM, and SPF are three email authentication methods that work together to verify the legitimacy of email senders. These methods help prevent spam and phishing attacks by ensuring that emails originate from the domain they claim to be from.&nbsp; Listen to our PodcAIst to learn more about these technologies and how we can help keep your business credibility intact.</span></p></div>
</div><div><h6>This podcast is entirely generated through AI with prompting from C3.</h6></div>
<div><h4>Related Links</h4></div><div><div><ul><li><a href="https://support.c3-solutions.ca/portal/en/kb/articles/email-security-and-c3-solutions" title="Email Security KB Article" target="_blank" rel="">Email Security KB Article</a></li><li><a href="https://support.c3-solutions.ca/portal/en/kb/articles/dmarc-reporting-what-is-it" title="What is DMARC" target="_blank" rel="">What is DMARC</a></li><li><a href="https://www.c3-solutions.net/solutions/technical" title="C3's Managed Service Plans" rel="">C3's Managed Service Plans</a></li></ul></div>
</div></div><div><div><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/GYE.png"></span></figure></div>
</div><div><div><div><div><span><svg class="svg-icon-10px"></svg></span><span><svg class="svg-icon-12px zpaudio-play-icon"></svg><svg class="svg-icon-12px zpaudio-pause-icon"></svg></span><span><svg class="svg-icon-10px"></svg></span></div>
<div><svg class="svg-icon-14px"></svg></div><div><span></span><span style="width:0%;"></span><span style="width:0%;"></span><span style="left:0%;"></span></div>
<div><svg class="svg-icon-14px zpaudio-repeat-icon"></svg><svg class="svg-icon-14px zpaudio-repeat-one-icon"></svg></div>
<div><span>00:00</span></div><div><div><svg class="svg-icon-14px zpaudio-volume-icon"></svg><svg class="svg-icon-14px zpaudio-volume-mute-icon"></svg><svg class="svg-icon-14px zpaudio-volume-down-icon"></svg></div>
<div><span style="width:100%;"></span><span style="left:100%;"></span></div></div>
<div><svg class="svg-icon-14px"></svg></div><div><svg class="svg-icon-14px"></svg></div>
<div><div><svg class="svg-icon-14px zpaudio-repeat-icon"></svg><svg class="svg-icon-14px zpaudio-repeat-one-icon"></svg></div>
<div><svg class="svg-icon-14px"></svg></div><div><svg class="svg-icon-14px"></svg></div>
</div></div><div><ul class="ul-playlist"><li><div> PodcAIst.email deliverability and security.wav </div>
<span>00:00</span></li></ul></div></div></div></div></div><div><div></div><div></div>
</div></div></div></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 25 Oct 2024 08:24:58 -0400</pubDate></item><item><title><![CDATA[Keep Your Systems Safe: The Importance of Regular Software Updates]]></title><link>https://www.c3-solutions.ca/stories/post/keep-your-systems-safe-the-importance-of-regular-software-updates</link><description><![CDATA[In the fast-paced world of technology, keeping your systems up-to-date is crucial for maintaining security and efficiency. One simple yet powerful way ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_70X0OXcUTzSkHBb9tJl_Vw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9vJKLbRcQmWUg9W8_iGv_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_28RCE44vROCuUCKevw57UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_koiIfZO2QR-uwLDw7_RdSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><div><style>.zpelem-text { }</style><div><p><span style="color:inherit;">In the fast-paced world of technology, keeping your systems up-to-date is crucial for maintaining security and efficiency. One simple yet powerful way to protect your business from cyber threats is by regularly updating your software. Let's dive into why this practice is essential and how it can benefit your business.</span></p></div>
</div></div><div><div><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/Untitled.png"></span></figure></div>
</div></div></div><div><div><div style="text-align:left;"><div><div><div><div><div><div><div><div><style>.zpelem-text { }</style><div><div style="color:inherit;"><p><span style="font-size:18px;"><br/></span></p></div>
<p></p></div></div><div><h2><div style="color:inherit;"></div></h2><h3><span style="font-weight:600;">Why Are Software Updates Important?</span></h3><h3></h3></div>
</div></div></div><div><style>.zpelem-text { }</style><div><div style="color:inherit;"><ol><li><p><strong>Enhanced Security</strong> Software updates often include patches for security vulnerabilities that hackers could exploit. By not updating, you leave your systems open to potential attacks. Regular updates ensure that your software has the latest defenses against these threats.</p></li><li><p><strong>Improved Performance</strong> Updates can improve the functionality and performance of your software. This means fewer crashes, faster load times, and a more streamlined user experience. Keeping your software current helps you avoid the frustrations that come with outdated technology.</p></li><li><p><strong>New Features and Functionality</strong> Software updates frequently come with new features and improvements that can boost productivity and efficiency. Staying updated means you have access to the latest tools and enhancements that can help your business stay competitive.</p></li><li><p><strong>Compliance and Support</strong> Many industries have compliance requirements related to software and data security. Regular updates ensure that your business stays compliant with these regulations. Additionally, using the latest versions of software guarantees you receive ongoing support from the provider.</p></li></ol><div><br/></div>
<h3><span style="font-weight:600;">How to Stay Updated</span></h3><h3></h3><ol><li><p><strong>Enable Automatic Updates</strong> Most software applications offer an option to enable automatic updates. This is the easiest way to ensure that your software is always up-to-date without requiring manual intervention.</p></li><li><p><strong>Schedule Regular Checks</strong> If automatic updates are not available, schedule regular times to check for and install updates. Make it a part of your routine maintenance to keep your systems running smoothly.</p></li><li><p><strong>Stay Informed</strong> Follow the news and updates from your software providers. They often release information about critical updates and security patches. Staying informed helps you prioritize updates based on urgency and importance.</p></li></ol><div><br/></div>
<h3><span style="font-weight:600;">Our Commitment to Your Security</span></h3><h3></h3><p>At C3 Solutions, we understand the importance of maintaining secure and efficient IT systems. Our team is dedicated to helping small businesses in Prince Edward County, Ontario implement best practices for IT security and management. We offer comprehensive IT maintenance plans, including software update management, <span>Anti-Virus, and monitoring of both on all your businesses computers,</span> to keep everything protected and running smoothly.</p><p><br/></p><h3><span style="font-weight:600;">Final Thoughts</span></h3><h3></h3><p>In conclusion, regularly updating your software is a simple yet vital step in safeguarding your business from cyber threats and ensuring optimal performance. By making this a priority, you can avoid potential security breaches, enhance productivity, and stay ahead in the competitive business landscape.</p></div>
</div></div></div></div></div></div></div></div></div><div><div><style type="text/css">.zpbutton.zpbutton-type-primary { border-style: solid; border-color: rgb(0, 0, 0) !important; border-width: 1px }</style><a href="/solutions/technical" title="Get Started Now"><span>Get Started Now</span></a></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
 ]]></content:encoded><pubDate>Wed, 07 Aug 2024 08:39:19 -0400</pubDate></item><item><title><![CDATA[Urgent Warning: Email Scam Impersonating RCMP Commissioner Targets Local Residents]]></title><link>https://www.c3-solutions.ca/stories/post/urgent-warning-email-scam-impersonating-rcmp-commissioner-targets-local-residents</link><description><![CDATA[ Attention, PEC residents! A severe email scam has recently been identified in our community, echoing similar incidents reported in Nova Scotia last y ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gMDc8FhXSTiXpBPeL94oFQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6dvA_ejZTG-ujN2FGkx0pA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aIP4crTJTx-KlHWl6juqvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ioylv5NPRHKobJzQg3RigA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><div style="text-align:left;"><div><div><div><div><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-text { }</style><div> Attention, PEC residents! A severe email scam has recently been identified in our community, echoing similar incidents reported in Nova Scotia last year. The scam involves fraudulent emails impersonating the Commissioner of the Royal Canadian Mounted Police (RCMP), Mr. Michael Duheme, threatening recipients with legal action if they do not respond within 24 hours. </div>
</div><div><style>.zpelem-heading { }</style><h2><span><span><span><span style="font-size:20px;font-weight:600;">Scam Details</span><span style="font-size:18px;"><br/></span></span></span></span></h2></div>
<div><style>.zpelem-text { }</style><div><p><span style="color:inherit;">The scam email typically contains alarming messages, such as:</span></p></div>
</div><div><style>.zpelem-image { }</style><div><figure><img src="https://www.c3-solutions.net/images/FAKE%20REPORT.png" style="width:745.74px !important;height:308px !important;max-width:100% !important;"></figure></div>
</div><div><style>.zpelem-text { }</style><div><p><span style="font-weight:bold;color:rgb(226, 29, 29);">DO NOT OPEN ANYTHING WITHIN THIS EMAIL.</span> With emails from scammers it is best to never open attachments or links to avoid giving the scammers access to your devices or data. <br/></p></div>
</div><div><style>.zpelem-text { }</style><div><p><span style="color:inherit;">These unsolicited emails often threaten recipients to make contact under false pretenses. The emails use the names and positions of real police officers, increasing their legitimacy and inducing fear. Once contact is made through a fake email provided in the message, the scammers demand personal information or financial assets such as cash, gift cards, or cryptocurrency. In some cases, the email claims the recipient has visited inappropriate websites and threatens to report this information unless they respond.</span></p></div>
</div><div><style>.zpelem-heading { }</style><h2><span><span><span style="font-weight:bold;"><span style="font-size:20px;">What you need to know</span><span style="font-size:20px;"><br/></span></span></span></span></h2></div>
<div><style>.zpelem-text { }</style><br/><div><li style="line-height:2;"><strong>Police and Legitimate Organizations Do Not Operate This Way</strong>: Authentic police departments and organizations will never send threats or demands for personal information or money through unsolicited emails.</li><br/><li style="line-height:2;"><strong>Be Wary of Unsolicited Contact</strong>: Whether it’s by phone, text, or email, always verify the source before providing any information. Contact the organization directly using verified contact details from a legitimate website or phone book.</li></div>
</div><div><style>.zpelem-heading { }</style><h2><span><span><span style="font-weight:700;"><span style="color:inherit;font-size:20px;">Protect Yourself and Others</span></span></span></span></h2></div>
<div><style>.zpelem-text { }</style><div><div style="color:inherit;"><li><strong>Do Not Click Links or Respond</strong>: Avoid clicking on any links or responding to contact information provided in unsolicited messages. Scammers are often highly convincing and engaging with them can put you at greater risk.</li></div>
<div><br/></div><div style="color:inherit;"><li><strong>Share Your Experience</strong>: Inform family, friends, neighbors, and co-workers about this scam. Sharing your knowledge can help prevent others from becoming victims.</li></div>
<p></p></div></div><div><style>.zpelem-heading { }</style><h2><span><span><span style="font-weight:bold;"><span style="font-size:20px;">What do you do if you get this email?</span><span style="font-size:20px;"><br/></span></span></span></span></h2></div>
<div><style>.zpelem-text { }</style><div><p>First thing you need to do is inform your local police station of these types of scams. They have ongoing investigations into scams like these and with more information it will help them fight these types of attacks locally.&nbsp;<br/><br/>Second thing is to remember NEVER open ANY links or attachments in an email that you get and are not familiar with the senders email. Be aware to look at the from/sender emails as well. Some that may seem familiar can be very very fake. Like the one above, infos.rcmp.ca@gmail.com. It almost looks real but the RCMP would never use an email like this. <br/><br/>If you are ever worried about emails like this you can find solutions like Trend Micro and other email security services that monitor your incoming mail and can layer in that next level of security you may need. Or reach out to your local police to find out if the sender or someone else has been reported as a spam sender or what to look for in the email that may concern you. <br/></p></div>
</div><div><style type="text/css">.zprow { }</style><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-heading { }</style><h2><span><span><span style="font-size:18px;"><span style="font-weight:700;"><span style="color:inherit;">Protect Yourself with Trend Micro Security Solutions</span></span></span></span></span></h2></div>
<div><style>.zpelem-text { }</style><div><p><span style="color:inherit;">To safeguard your business from these and other malicious scams, consider enhancing your online security with C3's comprehensive protection solutions. Our solutions offer advanced features to detect and block phishing emails, fraudulent websites, and other cyber threats from accessing your business's vital data and information.</span></p></div>
</div><div><style>.zpelem-text { }</style><div><p>To find out more about our cyber security ask about our maintenance plans. <br/></p></div>
</div><div><style>.zpelem-text { }</style></div></div><div><style type="text/css">.zpelem-col { }</style></div>
</div></div></div></div></div></div></div></div></div><div><div><style type="text/css">.zpbutton.zpbutton-type-primary { border-style: solid; border-color: rgb(0, 0, 0) !important; border-width: 1px }</style><a href="/solutions/technical" target="_blank" title="Maintenance Plans"><span>Maintenance Plans</span></a></div>
</div><div><div><p><span style="color:inherit;"><a href="https://www.rcmp-grc.gc.ca/en/news/2023/rcmp-warns-public-unsolicited-emails-1" target="_blank" rel="">RCMP Release Oct 9 2023</a></span></p></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
 ]]></content:encoded><pubDate>Mon, 22 Jul 2024 09:35:09 -0400</pubDate></item><item><title><![CDATA[Is Someone Trying to Hijack Your Website?]]></title><link>https://www.c3-solutions.ca/stories/post/is-someone-trying-to-hijack-your-website</link><description><![CDATA[Another Wordpress Vulnerability A lot of websites that use WordPress, a popular website system, got hacked by a bad actor. This person took advantage ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9r01PNF6RHWA7L6XeK429A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_S6YWmy_JRvKWX412BW92xg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_3ljDF6xFSyaaCclczdAYyQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_OEtXI6JlQxeGYwDuGmuTUw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><div style="text-align:left;"><div><div><div><div><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-heading { }</style><h2>Another Wordpress Vulnerability<br/></h2></div>
<div><style>.zpelem-text { }</style><div><div><div><div><p>A lot of websites that use WordPress, a popular website system, got hacked by a bad actor. This person took advantage of a problem in a common add-on called tagDiv Composer. This add-on is needed for two well-liked WordPress themes: Newspaper and Newsmag, which are available through popular marketplaces.</p><p><br/></p><p>The issue, known as CVE-2023-3169, is a type of problem that lets hackers put harmful code into web pages. A person from Vietnam named Truoc Phan found this issue. It's a pretty serious problem, rated 7.1 out of 10 in terms of seriousness. The creators of tagDiv Composer partially fixed it in version 4.1 and fully fixed it in version 4.2.</p><p><br/></p><p>The hackers are using this problem to put bad code on websites, which then send visitors to scam sites. These scam sites can trick people into thinking they've won a lottery or need tech support. They also try to get visitors to sign up for push notifications by showing fake &quot;I'm not a robot&quot; messages.</p><p><br/></p><p>A security company called Sucuri has been keeping an eye on this issue since 2017 and named it &quot;Balada.&quot; They think Balada has infected more than a million websites in the past six years. Just last month, they found Balada on over 17,000 sites, which is almost twice as many as the month before. More than 9,000 of these new infections came from the CVE-2023-3169 problem.</p></div>
</div></div></div></div><div><style>.zpelem-image { }</style><div style="text-align:center;"><figure><img src="https://www.c3-solutions.net/images/We%20observed%20a%20rapid%20cycle%20of%20modifications%20to%20thei1697210520513.png" style="width:476.7px !important;height:244px !important;max-width:100% !important;"></figure></div>
</div><div><style>.zpelem-text { }</style><div> Sucuri has tracked no fewer than six waves of injections that leverage the vulnerability. While each wave is distinct, all contain a telltale script injected inside of these tags: </div>
</div><div><style>.zpelem-image { }</style><div style="text-align:center;"><figure><img src="https://www.c3-solutions.net/images/Screenshot%202023-10-13%20112642.png"></figure></div>
</div><div><style>.zpelem-text { }</style><div><div><div><div><p>The bad code that's being added to websites is hidden on purpose to make it tough to find. It's like hiding something in a big book. This hidden code can be discovered in the database that WordPress websites use, especially in a part called &quot;td_live_css_local_storage&quot; inside something called the &quot;wp_options table.&quot;</p><p><br/></p><p>The people causing this problem, known as Balada, always try to keep control of the websites they've attacked. They usually do this by adding hidden instructions that create special accounts with a lot of power (like a boss). If the real website owners find and remove the bad hidden instructions that send visitors to bad places but let these special accounts stay, the bad people can use these special accounts to add new hidden instructions that keep causing problems.</p><p><br/></p><p>The researcher who found this explained it this way:</p></div>
</div></div></div></div><div><style>.zpelem-image { }</style><div style="text-align:center;"><figure><img src="https://www.c3-solutions.net/images/We%20observed%20a%20rapid%20cycle%20of%20modifications%20to%20thei1697211175431.png" style="width:480.58px !important;height:246px !important;max-width:100% !important;"></figure></div>
</div><div><style>.zpelem-text { }</style><div><div><div><div><p>If you're in charge of a website using the WordPress themes Newspaper or Newsmag, here's what you should do:</p></div>
</div></div></div></div><div><style type="text/css">.zprow { }</style><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-text { }</style></div>
</div></div><div><style>.zpelem-heading { }</style></div><div><style type="text/css">.zprow { }</style><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-button { font-family: "Montserrat", sans-serif; font-weight: 800 }</style><div><style type="text/css">.zpbutton.zpbutton-type-primary { font-family: "Montserrat", sans-serif; font-weight: 800 }</style></div>
</div></div><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-button { font-family: "Montserrat", sans-serif; font-weight: 800 }</style><div><style type="text/css">.zpbutton.zpbutton-type-primary { background-color: rgb(45, 180, 45) !important; font-family: "Montserrat", sans-serif; font-weight: 800 }</style></div>
</div></div></div><div><style>.zpelem-text { }</style></div></div></div></div></div>
</div></div></div></div><div><div><div><div><div style="color:inherit;"><div><div> 1. Look into a new website builder and host like Zoho Sites or Commerce. They do not use plug ins like Wordpress </div>
<div><br/></div><div> 2 <span>. Keep in mind that the people causing trouble (Balada) are trying to keep control of the websites they've messed with. So, as well as getting rid of any bad stuff they've put in, you should also check for hidden ways they might have left to get back in (like secret doors) and look for any super-powerful accounts they've made.</span></div>
</div></div><p></p></div></div></div><div><div><div><div><style>.zpelem-image { }</style><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/sites-logotype.png"></span></figure></div>
</div></div><div><div><style>.zpelem-image { }</style><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/commerce-logo.png"></span></figure></div>
</div></div></div></div></div><div><div><div style="color:inherit;"><div><p>In simple terms, it's like checking your house for signs of a break-in, not just at the front door but also looking for secret ways in and making sure no unauthorized folks have too much power.</p></div>
</div><p></p></div></div><div><h2><span style="color:inherit;">Check out our web solutions!</span></h2></div>
<div><div><div><div><a href="https://www.c3-solutions.ca/ZOHO/zoho-commerce" target="_blank" title="Zoho Commerce"><span></span><span>Zoho Commerce</span></a></div>
</div><div><div><style type="text/css">.zpbutton.zpbutton-type-secondary:hover { background-color: rgb(255, 255, 255) !important; color: rgb(0, 0, 0) !important }.zpbutton.zpbutton-type-secondary { border-style: solid; border-color: rgb(0, 0, 0) !important; border-width: 1px }</style><a href="https://www.c3-solutions.ca/ZOHO/zoho-sites" target="_blank" title="Zoho Sites"><span></span><span>Zoho Sites</span></a></div>
</div></div></div><div><div><div><a href="https://arstechnica.com/security/2023/10/thousands-of-wordpress-sites-have-been-hacked-through-tagdiv-plugin-vulnerability/" target="_blank" rel=""><span style="font-size:10px;">Article source</span></a><span style="font-size:10px;"><br/></span></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div> ]]></content:encoded><pubDate>Fri, 13 Oct 2023 10:50:41 -0400</pubDate></item><item><title><![CDATA[Rising Scam Threats: Stay Informed!]]></title><link>https://www.c3-solutions.ca/stories/post/rising-scam-threats-stay-informed</link><description><![CDATA[
 Are you an avid viewer of online marketplaces? Market places like Facebook, Kijiji, eBay, and Amazon all contain deranged people that are ready to st ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_tu9Ahv7VSoul-4Vh8eVbVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iz5QhbcxTpauxQIaD1Wxhw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_y1Am5zdnQQOLJk2gsGVNVQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cs2GTmwLT4OYCLgeXZ6HGA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><div><div><div><div><div></div><div style="text-align:left;"><div><div><div><div><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-image { }</style><div><figure><img src="https://www.c3-solutions.net/images/Avoid%20Scams-1-.png" style="width:608.94px !important;height:343px !important;max-width:100% !important;"></figure></div>
</div><div><style>.zpelem-text { }</style><div><p><span style="font-size:16px;">Are you an avid viewer of online marketplaces? Market places like Facebook, Kijiji, eBay, and Amazon all contain deranged people that are ready to steal your data, sensitive information and sometimes identity! There are scam product posts that can occur more frequently.&nbsp;</span></p><p><br/></p><p><span style="font-size:16px;">Like a more commonly seen one;<br/><br/></span></p></div>
</div><div><style>.zpelem-heading { }</style><h4><span style="font-weight:700;"><span style="font-size:20px;"><span style="font-size:40px;">The buyer seemingly is &quot;away right now&quot; and wants to send you a &quot;transfer or cheque&quot;</span><br/></span></span></h4><h4></h4></div>
<div><style type="text/css">.zprow { }</style><div><style type="text/css">.zpelem-col { }</style><div><style>.zpelem-text { }</style></div>
</div></div></div></div></div></div></div></div></div></div><div><div><div><style>.zpelem-text { }</style><div><div><p><span style="font-size:16px;">Odds are, you could be selling or buying vehicles, for family members, friends or personal use. But sadly the scammers have no remorse.<br/><br/></span></p><p><span style="font-size:16px;">They at first claim they are not in the direct area or &quot;Not in the province due to work&quot; or some other reason and want to &quot;send a money order and send someone from eBay to pick up the car&quot;. Majority of these are scams looking to get your information, money, and sometimes car.</span></p></div>
</div></div></div><div><div><style>.zpelem-image { }</style><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/FAKE-2-.png"></span></figure></div>
</div></div></div><div><div><div style="color:inherit;"><div><span><span style="font-size:16px;">IF you proceed to fall into this they will send you a cashier cheque or money order for more than the agreed upon price. While sending a truck to pick up your vehicle You may think &quot;But, I am getting more than I wanted?&quot;. That may seem awesome but in doing this they are not sending &quot;legit money&quot; and any money you send them will be lost, and your car stolen!&nbsp; So if they are not local or are in another &quot;province or state&quot; do your best to avoid this type of sale, especially if they will not meet up in person.</span></span></div>
</div><p></p></div></div><div><h2><span style="color:inherit;">Refusing to meet up in person</span></h2></div>
<div><div><div style="color:inherit;"><p><span style="font-size:16px;">You may also be old school and just want to meet in person. If the buyer or seller is refusing to meet in person there is a very good chance that they do not have the vehicle or the means to purchase. They are ready to take your money or data and run. <br/></span></p></div>
<p></p></div></div><div><div><p><span style="color:inherit;"><span style="font-size:16px;">The best way to avoid this is never go through with a purchase or a sale unless they are willing to see the product or let you see it. Try not to buy &quot;sight unseen&quot;, even though there are influencers that get lucky with doing so, it doesn't mean they haven't been scammed.</span></span></p></div>
</div><div><h2><span style="color:inherit;">Avoid sending money or advance payments</span></h2></div>
<div><div><div><div><p><span style="font-size:16px;">Another one not so uncommon, is the &quot;I need a deposit for me to hold this item&quot;.&nbsp;</span></p><p><span style="font-size:16px;">In most cases it may make sense, if you want someone to hold something a small fee can be asked for almost like a retainer. Although there are people taking advantage of this. <br/><br/></span></p><p><span style="font-size:16px;">They will ask you for a deposit and sell the car anyway while refusing to give your money back.&nbsp;</span></p><p><span style="font-size:16px;"><br/></span></p><span style="font-size:16px;">If this happens it is almost impossible to get the money back as the police will tell you its a civil matter and banks refuse to give money back on something like this, so it is best to avoid these situations all together and, look for the product or service after you have the funds to do so. </span></div>
</div></div><div><div><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/345-1-.png"></span></figure></div>
</div></div></div><div><h2><span style="color:inherit;">Avoid all external links</span></h2></div>
<div><div><p><span style="color:inherit;"><span style="font-size:16px;">When buying or selling a product if a person is extremely persistent about you clinking a link that they send. They are looking to get your information or obtain the permissions to be able to completely take over your device and or account. It is becoming a lot more common to see sketchy links in buy and sell groups online. The best practice is to completely avoid suspicious links as most are scammers looking to phish or activate malware that takes control of your device in the background,&nbsp; or steal your information to take over your Facebook or Instagram accounts. if this happens it is best to reach out to customer support depending on the application, or recreating a new account with more secure privacy measures. Unfortunately this happens a lot more frequently than you would think. </span></span></p></div>
</div><div><div><div><div><p><span style="color:inherit;"><span style="font-size:16px;">In some cases its better to have a system or practice in place to avoid these types of situations, We at C3 Solutions use Trend Micro to allow a worry free online experience. We suggest using this because of its thorough reports, keeping us aware of the vulnerabilities that may effect our workspace. <br/><br/></span></span><span style="color:inherit;"><span style="font-size:16px;">If you would like to test your business we offer a Test Phishing Service through Trend Micro that send out SAFE TEST phishing emails to check for vulnerabilities within your business. </span></span></p></div>
</div></div><div><div><div><figure><span style="cursor:pointer;"><img src="https://www.c3-solutions.net/images/Are%20you%20sure%20you%20want%20to%20continue-3-.png"></span></figure></div>
</div></div></div><div><div><style type="text/css">.zpbutton.zpbutton-type-primary { border-style: solid; border-color: rgb(0, 0, 0) !important; border-width: 1px }</style><a href="https://forms.zohopublic.com/AllForms/form/PhishingInsight/formperma/2hrVm4wminzOj5zs6UX82nFPZfTTMq_Q3I9b6e_ELs4" target="_blank" title="Business Phising Tests"><span>Start Testing Your Business Here</span></a></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
 ]]></content:encoded><pubDate>Mon, 24 Jul 2023 08:18:58 -0400</pubDate></item></channel></rss>