BitDepthBitDepth+Featured

The garbage infesting my in-box

2 Mins read

Illustration by ingka.j.jiw

These are a collection of scam emails gathered over the last couple of months. The frequency and sophistication of these efforts to gather personally identifiable information from the unwary has been startling. Email graphics are becoming more convincing. Calls to unfortunate action are far more crafty and ways of disguising real destination URLs and sender emails require special attention to uncover.

Some of these blanked scam emails will obviously not apply to you, but senders are getting smarter about using generalised information about individuals and regions to craft emails that are more effective in targeting the unsuspecting.

The blanket rules continue to apply. Do not click on links before fully investigating them. Do not call given phone numbers, because AI tools are harvesting voice patterns. Do not respond to any email that seems odd.

If an offer is presented by a company you have never had any contact with offering something special consideration, it’s unlikely that you have been fortunate.

Go to the official websites of any service or business you deal with and make your queries there as a first step. The oldest rule of all still applies. Nobody gives anything away for free. Nobody has any money to give you.

Click on the plus sign on any image to enlarge.

The garbage infesting my in-box

The garbage infesting my in-box

Do not click on links before fully investigating them. Do not call given phone numbers.
Read More
TSTT’s payments problem

TSTT’s payments problem

Something seems to have collapsed in what should be an efficient, all-digital payment and verification loop.
Read More
Is Apple’s Neo the One?

Is Apple’s Neo the One?

Ease of repair puts a firm hand on the scale in favour of the Neo for parents looking for a laptop suitable for use in education.
Read More
Privacy and your travel information

Privacy and your travel information

A privacy notice to let individuals understand what data is being collected, the legal reasons, retention period, security to protect data and a contact for any questions should have been...
Read More
TATT announces ambitious three-year strategic plan

TATT announces ambitious three-year strategic plan

The authority's two-decade-old arguments for a fee from over-the-top (OTT) providers has consistently drawn a blank, but it remains on the strategic agenda.
Read More
Samsung’s S26 leans in hard on AI

Samsung’s S26 leans in hard on AI

Some users including those with data that requires above average security, may not greet these agentic AI advancements with enthusiasm.
Read More
A 2026 manifesto for Carnival

A 2026 manifesto for Carnival

The idea of Carnival, the spark of the individual, rebellious, expressed as boldly inventive creation still catches fire.
Read More
A hiss from a rose

A hiss from a rose

There is likely to be a need for sex re-education to deprogram children who see sex as a wrestling match.
Read More
News is a niche until it’s not

News is a niche until it’s not

The New York Times produced approximately 230 pieces of content per day on average; The Washington Post, more than 500 per day in 2016
Read More
FT’s second Next Gen News report offers deeper insights

FT’s second Next Gen News report offers deeper insights

Successful producers are reversing the journalism process, dismantling the inverted pyramid of news structure
Read More
Ransomware report notes fourth quarter 2025 attack surge

Ransomware report notes fourth quarter 2025 attack surge

"The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches."
Read More
Hands-on with Apple’s Creator Studio as a non-subscriber

Hands-on with Apple’s Creator Studio as a non-subscriber

It’s not hard to imagine someone in a hurry clicking madly along only to find themselves a subscriber through haste.
Read More
Apple flirts with subscription software

Apple flirts with subscription software

Are we all being coaxed and tranquilized into accepting as a norm, the idea that the computing tools we pay for are not things we own anymore?
Read More
So long, and thanks for all the fish

So long, and thanks for all the fish

The only way forward for journalism is immersion in the unfamiliar by both journalists and their managers.
Read More
Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
The garbage infesting my in-box The garbage infesting my in-box
TSTT’s payments problem TSTT’s payments problem
Is Apple’s Neo the One? Is Apple’s Neo the One?
Privacy and your travel information Privacy and your travel information
TATT announces ambitious three-year strategic plan TATT announces ambitious three-year strategic plan
Samsung’s S26 leans in hard on AI Samsung’s S26 leans in hard on...
A 2026 manifesto for Carnival A 2026 manifesto for Carnival
A hiss from a rose A hiss from a rose
News is a niche until it’s not News is a niche until it’s...
FT’s second Next Gen News report offers deeper insights FT’s second Next Gen News report...
Ransomware report notes fourth quarter 2025 attack surge Ransomware report notes fourth quarter 2025...
Hands-on with Apple’s Creator Studio as a non-subscriber Hands-on with Apple’s Creator Studio as...
Apple flirts with subscription software Apple flirts with subscription software
So long, and thanks for all the fish So long, and thanks for all...
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepth+Featured

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

6 Mins read
Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
FeaturedTechnology Reporting

Where cybersecurity threats begin: Phishing

5 Mins read
Do not submit PII to anyone, anywhere, unless you have initiated the contact and are absolutely clear that you are speaking with/logged into/emailing/form-filling in an environment you are certain is secure.
FeaturedOpinion

ISC2 anti-scammer guidance

2 Mins read
The Caribbean Chapter of the ISC2 has issued guidance and advice for internet users facing phishing messages and WhatsApp scams.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
FeaturedTechnology Reporting

Where cybersecurity threats begin: Phishing

0
Share your perspective in the comments!x
()
x