« FREE Ways to Earn Continuing Professional Education (CPE) Credits for Your InfoSec Certification | Main | (ISC)²® Enhances the Rigor of CISSP® Certification Exam Questions »

29 January 2014

Comments

Neeraj Singh

Since Android apps gaining popularity among the people it is obvious that android tech support scams are increasing.... and i am agree with GenNext Technical support that little of consciousness will definitely help us to avoid becoming a victim.

GenNext Technical Support

I think these days Android tech support scams are flourishing just like the popularity of Android apps are increasing. Recently I became a victim of Android tech support scam but now I understand that a little of consciousness will definitely help us to avoid becoming victim of such scams.

lcomputer6

Android tech support: you must know about the i parameter.

Abe

This is another great post to stay inform 1st of all.

As I see, those scams/cold-callings are using very simple yet confusing techniques that for the non computer savvy or for not having too much knowledge in computers, these type of scam can be a point to confuse the victim and get into panic and obey to what the "tech support" is telling him to do in order to " help " the target user.

The only defense here is to use common sense, stop think breath, then do. Also to get more informed and educated in info sec as we are more and more being depended on computers today, so the best defense would be to educate yourself and others.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

About the (ISC)² Blog

As the certifying body for more than 100,000 information security professionals worldwide, (ISC)² believes in the importance of open dialogue and collaboration. (ISC)² established this blog to provide a voice to certified members, who have significant knowledge and valuable insights that can benefit other information security professionals and the public at large.

The (ISC)2 blog gives members a forum to exchange ideas and inspires a safe and secure cyber world by supporting the advancement of the information security workforce via a public exchange with a broad range of information security topics.

Whether an (ISC)² member chooses to participate in the (ISC)² blog is his or her own decision. The postings on this site are the author's own and don't necessarily represent (ISC)²'s positions, strategies or opinions. (ISC)² monitors the blog in accordance with the (ISC)² Blog Guidelines, but the bloggers are responsible for their own content – common sense and intelligence should prevail.

Other than links to the (ISC)2 website, (ISC)² does not control or endorse any links to products or services provided in this blog and makes no warranty regarding the content on any other linked website.

Those who post comments to (ISC)² blogs should ensure their comments are focused on relevant topics that relate to the specific blog being discussed. (ISC)² reserves the right to remove any post or comment from this site. Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org

Please click here for FAQs.

Please click here for the Blog Guidelines.