fbpx

Andy Le

Healthcare data breach

26,700 Patient Healthcare Data Breached at an Independent Caregiving Service

A recent healthcare data breach on Help at Home, an independent caregiving service, has led to the exposure of sensitive information for 26,700 individuals. The compromised data includes names, dates of birth, Social Security numbers, financial account details, usernames, passwords, and even certain medical and health insurance information. What Does This Mean? With seniors being among the most vulnerable to cyber threats, this healthcare data breach is a stark reminder that while we can trust security measures to a certain extent, breaches still happen. When they do, sensitive health data can be exploited in highly targeted scams aimed directly at patients—mostly seniors. Here’s what could happen next: Personalized phishing emails posing as healthcare providers, requesting additional information or payments. Fake calls from “insurance companies” demanding urgent action to avoid penalties. Fraudulent messages claiming to offer help with medical bills, designed to harvest more personal information. These scams don’t just stop with the individual. They often extend to family and friends, with scammers impersonating their loved ones. In 2023 alone, seniors lost an astounding $2.3 billion to scams. These numbers clearly demonstrate that these tactics are working—and that they’re on the rise. So, What Can We Do? While healthcare data breaches are becoming an unfortunate reality and cybersecurity measures sometimes fall short, the next best defense is education, education, and more education. It’s crucial to equip older adults with the knowledge and tools they need to protect themselves. But it’s not just about teaching them—it’s about ensuring they retain this information for when they need it most. The real question is: How are we helping seniors not only become more informed but also retain that crucial information to safeguard their lives? At Helpy, we’re committed to bridging that gap, providing seniors with the resources they need to stay sharp, stay safe, and stay ahead in an increasingly digital world.

26,700 Patient Healthcare Data Breached at an Independent Caregiving Service Read More »

new scam and need for senior education

New Scam and Why Continuous Education for Seniors Matters

$3.1 Billion dollars That’s how much older adults in the U.S. lost to scams just last year, and the number continues to rise as scams become more sophisticated. The rapid evolution of scams targeting older adults highlights a growing issue that extends beyond just the victims. The recent scam using Google Drawings and WhatsApp’s URL shortener shows why ongoing education that resonates with older adults is vital—not just for their safety, but for the well-being of their families and communities. Living Off Trust One of the most insidious aspects of modern scams is their ability to exploit the trust we place in reputable websites. This tactic, known as Living Off Trusted Sites (LOTS), is particularly dangerous for older adults who may not be as vigilant or tech-savvy. The LOTS strategy allows scammers to use well-known, trusted platforms to host their malicious content, making the scam nearly invisible to the untrained eye. Google Drawings: A Trusted Tool Used Maliciously In a recent phishing scam, cybercriminals have weaponized Google Drawings, a tool typically used for creating and sharing visual content, to execute their fraudulent activities. By embedding a malicious link within a Google Drawing, they can bypass security filters that would typically flag suspicious URLs. The scam is further reinforced by the use of WhatsApp’s URL shortener, which helps the fraudulent link evade detection. The New Phishing Scam: How It Works Here’s how the scam unfolds: The Bait: An email is sent to the victim, prompting them to confirm their Amazon account. The email contains a link that appears legitimate but actually directs the user to a Google Drawing hosted on Google’s servers. The Trap: The Google Drawing contains a fake Amazon account verification graphic. The user is then redirected to a website that closely resembles the official Amazon login page. The Hook: The user is asked to log in and is guided through a multi-step process that includes verifying personal information, confirming billing details, and entering payment information. Each step is designed to harvest sensitive data from the victim. The Catch: Even if the user becomes suspicious and stops halfway, the scammers have already collected valuable information, putting the victim at risk of identity theft and financial loss. The Bigger Picture: Why Continuous Education Matters For seniors, who often spend a significant portion of their day online, scams like these are particularly dangerous. Older adults have built trust with brands like Google, Amazon, and WhatsApp, making them more vulnerable to scams that exploit these trusted platforms. Despite this demographic being one of the most vulnerable to these evolving scams, there is a glaring lack of educational solutions that truly resonates and sticks. This is not just a personal issue for the seniors themselves. The impact of a scam extends to their families, caregivers, and the broader community, who are left to pick up the pieces and provide support in the aftermath.It is the responsibility of caregivers, communities, and families to ensure that older adults receive continuous education that not only informs but also empowers them to recognize and avoid these scams. By investing in education that sticks, we can help protect our older generation from the devastating effects of these increasingly sophisticated scams, ultimately safeguarding the well-being of our entire community.

New Scam and Why Continuous Education for Seniors Matters Read More »

paying with credit card online

Amazon Phishing Email: How Scammers Are Using Google Drawings and WhatsApp to Phish Your Data 

As more than 50% of seniors increasingly turn to online shopping, their strong reliance on trusted brands like Amazon has made them particularly vulnerable to a new and sophisticated phishing scam Understanding LOTS: How Scammers Exploit Trusted Sites with Amazon Phishing Emails List of Living Off Trusted Sites (LOTS) Ashwin Vamsh, an expert in cybersecurity, explains that this new Amazon phishing email scam exploits a tactic known as Living Off Trusted Sites (LOTS), where scammers use reputable and trusted websites to host their malicious content. By leveraging the trust users place in these well-known platforms, the scam becomes much harder to detect, making it especially dangerous for unsuspecting victims. Google Drawings: A Trusted Tool Used Maliciously In this case, the scammers are leveraging Google Drawings and WhatsApp’s URL shortener to mimic an Amazon confirmation site to carry out their attack.Google Drawings is a tool within the Google Workspace suite that allows users to create and share visual content. It’s typically used for collaborative projects, diagrams, or simple graphics. It also allow for embedding links into the drawings as well. However, in this scam, Google Drawings is being used to host a fake Amazon account verification graphic. Step-by-Step Breakdown: How the Amazon Phishing Email Scam Targets Victims Diagram of step-by-step Google Drawing Phishing Scam The Amazon phishing email scam begins with an email sent to the victim, prompting them to confirm their Amazon account. The email contains a link that appears legitimate but actually directs the user to a Google Drawing hosted on Google’s servers. Since the link is from Google, a trusted source, it easily bypasses most security filters and raises no immediate red flags for the user.To further deceive the victim and evade detection, scammers use a WhatsApp URL shortener, which is less likely to trigger security warnings. They then add another layer of obfuscation by re-shortening the link with a service like qrco.de, making it even harder to trace the original destination.Once the user clicks on the link in the Google Drawing, they are taken to a website that closely resembles the official Amazon login page, prompting them to enter their credentials. After logging in, the user is then guided through a multi-step process that mimics a legitimate Amazon verification, including: Scam steps on a fake Amazon site to collect personal info via fake login, verification, and payment pages. Security: Verifying personal information such as your date of birth, phone number, and mother’s maiden name. Billing: Confirming your billing address. Payment: Entering your credit card information. Finish: Completing the verification process. Even if the user becomes suspicious and stops midway, the damage may already be done, as scammers collect information at every step. Why the Amazon Phishing Email Scam is Dangerous for Older Adults For seniors who love shopping online, this kind of Amazon phishing email scam can be particularly dangerous. Many older adults have built a relationship of trust with brands like Google, Amazon, and WhatsApp over the years, making them more likely to fall for a scam that exploits these trusted platforms. The combination of familiar branding and a convincing interface makes it incredibly challenging to distinguish between legitimate and fake websites.Given the increasing sophistication of scams that use LOTS tactics, it’s crucial to take steps to protect yourself: Double-Check Links: Before clicking on any link, hover over it to see the full URL. If it looks suspicious or unfamiliar, don’t click it. Verify Directly with the Source: If you receive an email asking you to confirm your account or provide personal information, contact the company directly through their official website or customer service number to verify the request. Be Wary of URL Shorteners: Be cautious of links that use URL shorteners, especially from unfamiliar sources. These can be used to hide malicious sites. Use Security Software: Make sure your computer and devices have up-to-date security software that can help detect and block phishing attempts. Educate Yourself: Stay informed about the latest scams and tactics used by cybercriminals. The more you know, the better equipped you’ll be to recognize and avoid scams. Our Mission  Helpy Tech’s mission is to help older adults stay informed and healthy through continuous education. As part of our scam prevention series, we are committed to providing the tools and knowledge needed to protect themselves. If you’ve ever been scammed, we would love to hear about your experience, comment it below!

Amazon Phishing Email: How Scammers Are Using Google Drawings and WhatsApp to Phish Your Data  Read More »

How does Bluetooth work? A user-friendly guide

TL;DR Bluetooth allows devices to communicate wirelessly using radio waves in the 2402-2480 MHz range. It sends binary data (1s and 0s) encoded in these radio waves between devices. There are 79 different channels that Bluetooth devices can use to send data. To avoid interference and interceptions, Bluetooth devices hop between these 79 channels 1600 times per second. Data sent between devices are called packets, which are bundles of information designed to ensure secure and accurate transmission to the designated device. Long version Bluetooth is everywhere! From our wireless headphones to our smart home gadgets, it’s hard to imagine a world without this technology. But how exactly does Bluetooth work? Let’s break it down in a simple and friendly way, adding in more details to help you understand the magic behind it. The Basics: Sending Signals with Bluetooth The Beacon: Think of the beacon as the starting device. It sends out radio waves at frequencies between 2402 and 2480 MHz. These radio waves are similar to the ones used by radios, but they’re specifically tuned for Bluetooth communication. The beacon can be any Bluetooth-enabled device, like your phone or a wireless speaker, initiating the connection. Transmitting Data: This beacon doesn’t just send out random waves; it sends out binary data (those 0s and 1s you might remember from computer class). Binary data is the language of computers, and it’s how they represent all kinds of information, from text to images to sound. Encoding the Data: How does the beacon know if it’s sending a 1 or a 0? It uses a process called modulation. Modulation changes the wave in some way—either its amplitude (height), frequency (speed), or phase (position). Think of it like a surfer changing their stance on a wave to communicate a message. Modulation Techniques: Frequency Shift Keying (FSK): Imagine 0 is a wave at 2402 MHz and 1 is a wave at 2403 MHz. Each bit has its own frequency, like different notes on a piano. The change in frequency represents the binary data. Phase Shift Keying (PSK): Here, 0 and 1 are represented by different phase angles of the wave. It’s like having two different dance moves to show a 0 or a 1. For example, a phase angle shift might mean that the wave’s peak moves from the starting position by a certain angle to represent a 1, and another angle to represent a 0. Avoiding Interference? Now that we know how devices send signals, how do they avoid stepping on each other’s toes? After all, there are only 79 channels available for standard Bluetooth devices. What if there are more than 79 devices nearby? Frequency Hopping: A Bluetooth Dance Bluetooth devices are smart. They use a technique called frequency hopping to avoid interference and keep their conversations private. Here’s how:  Hopping Between Channels: Devices switch between 79 available channels at lightning speed—1600 times per second, to be exact. Imagine a conversation where you and your friend switch to a different language every second. This makes it hard for others to listen in or interfere. The rapid channel switching minimizes the risk of interference because even if a channel is busy, the devices will quickly move to a different one. Synchronization: The devices communicate in a synchronized manner, ensuring they’re always on the same page (or channel). It’s like a perfectly timed dance where both partners move together seamlessly. Each pair of devices shares a unique pattern for hopping channels, ensuring they stay connected without getting mixed up with other devices. Ensuring Security: Packetization To make Bluetooth communication even more secure, the data is sent in packets. Each packet contains several important components:  Preamble: Helps the receiving device detect the start of the packet. It’s like a knock on the door to announce the letter’s arrival. The preamble is a known sequence of bits that signals the start of the transmission. Access Address: A unique ID for the connection or channel, ensuring the data is delivered to the right recipient. Think of it as the address on the envelope. This ID is unique to the communicating devices, preventing mix-ups. Header: Contains control information like packet type and length. It’s like the header of a letter that says what the letter is about and how long it is. The header ensures that the data is properly interpreted. Payload: This is the main content or actual data. It’s the message inside the letter. The payload is the useful data that the devices are exchanging. CRC (Cyclic Redundancy Check): Ensures the data hasn’t been corrupted during transmission. It’s like a spell-check to make sure the letter hasn’t been tampered with. The CRC is a way to detect errors by adding a special code derived from the data. Fun Facts About Bluetooth Named After a King: Bluetooth is named after Harald “Bluetooth” Gormsson, a king who united Denmark and Norway. The idea is that Bluetooth technology unites different devices, just like the king united nations. Universal Compatibility: Bluetooth is designed to be universally compatible, meaning you can connect devices from different manufacturers without any issues. Low Power Consumption: Bluetooth is energy-efficient, making it perfect for battery-powered devices like wireless headphones and fitness trackers. Range and Speed: Standard Bluetooth can work up to 100 meters in ideal conditions, but most devices operate within a 10-meter range. The data transfer speed can go up to 3 Mbps, which is sufficient for most everyday applications. Need additional help or want to learn more? If you want to learn more about Bluetooth or have any issues, don’t hesitate to reach out. Contact us through this form or give us a call at 480-999-0455. We’re here to help you stay connected!

How does Bluetooth work? A user-friendly guide Read More »