<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phish &#8211; Startupware: Managing Startups</title>
	<atom:link href="https://www.startupware.com/tag/phish/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.startupware.com</link>
	<description>Autorunning Software &#38; Running a Software Business</description>
	<lastBuildDate>Fri, 10 Oct 2025 15:08:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Phish Spotting</title>
		<link>https://www.startupware.com/newsletter-reprints/phish-spotting/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 14:58:33 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[free Windows help]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=2717</guid>

					<description><![CDATA[<p>Phish are smarter with AI, more difficult to spot, but scammers are still relying on everyone who gets email to click and allow their hoaxes, because using non-Admin Windows accounts blocks most of the attachment malware they try to send. They rely on you to let them into your computer. Here&#8217;s how to spot a &#8230; <a href="https://www.startupware.com/newsletter-reprints/phish-spotting/" class="more-link">Continue reading <span class="screen-reader-text">Phish Spotting</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="800" height="450" src="https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c.jpg" alt="#Phish spotting in #Email" class="wp-image-2716" srcset="https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c.jpg 800w, https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c-300x169.jpg 300w, https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c-768x432.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<p>Phish are smarter with AI, more difficult to spot, but scammers are still relying on everyone who gets email to click and allow their hoaxes, because using non-Admin Windows accounts blocks most of the attachment malware they try to send. They rely on you to let them into your computer. Here&#8217;s how to spot a phish, in the new <a href="https://startupware.com/PC410_Newsletters/2025-10_PC_Updater_News-Old_and_New_Windows.pdf" target="_blank" rel="noopener">October PC Updater News</a>. Or <a href="https://startupware.com/news" target="_blank" rel="noopener">free subscriptions and back issues are online here</a>.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trojan Phish</title>
		<link>https://www.startupware.com/newsletter-reprints/trojan_phish/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Mon, 10 Jul 2023 13:08:45 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware safety]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[trojan horse]]></category>
		<category><![CDATA[Westminster MD]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[windows 11]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=2424</guid>

					<description><![CDATA[<p>When is a phish also a trojan horse? When the phish is bait and the trojan horse is making a delivery of malware.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img decoding="async" width="400" height="368" src="https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400.jpg" alt="Trojan Phish" class="wp-image-2423" srcset="https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400.jpg 400w, https://www.startupware.com/wp-content/uploads/2023/07/TrojanPhish1-400-300x276.jpg 300w" sizes="(max-width: 400px) 100vw, 400px" /></figure>



<p>Is that email in your morning flood of junk a phish? Or a trojan horse? It is frequently both, as phishing results in the trojan horse being allowed to deliver a load of Greek Soldiers. Or usually malware installation links and scripts. Read more in the <a href="https://startupware.com/newsletter" target="_blank" rel="noopener">July PC Updater News</a>, free.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/trojan_phish/">Trojan Phish</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is this Email Safe? Is this Robocall for Real?</title>
		<link>https://www.startupware.com/working-models/is-this-email-safe-is-this-robocall-for-real/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Tue, 16 Apr 2019 19:51:33 +0000</pubDate>
				<category><![CDATA[Definitions]]></category>
		<category><![CDATA[hoax]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[robocall]]></category>
		<category><![CDATA[robodialer]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1940</guid>

					<description><![CDATA[<p>If you think it’s a scam,  it’s probably a scam. It’s either an attempt to have you open a  software installer, or read a fake purchase order, or link to a web site  selling garbage.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/working-models/is-this-email-safe-is-this-robocall-for-real/">Is this Email Safe? Is this Robocall for Real?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img decoding="async" src="https://www.pc410.com/art/2018/TollRoad.png" alt=""/></figure>



<p>I’m often asked whether an email is 
real, or safe, or dangerous. And the same question shows up&nbsp;applied to 
web sites And robocalls are rampant right now, and seem to pick up 
around year-end. What’s real?</p>



<p>Short answer: If you think it’s a scam,
 it’s probably a scam. It’s either an attempt to have you open a 
software installer, or read a fake purchase order, or link to a web site
 selling garbage.</p>



<p><strong>Scam emails have a few things in common:</strong></p>



<ul class="wp-block-list"><li><strong>Fake urgency.</strong> Act Now! Limited Time Offer! Your computer is infected!&nbsp;</li><li><strong>False Authority.</strong> 
These are quotes from big-name companies and “experts” pushing whatever 
they’re selling. &nbsp;The quotes either not real, or from people who are not
 experts in the correct specialty.</li><li><strong>Fake address.</strong> The email address of the sender is from the wrong domain name.&nbsp;</li><li><strong>Poor English</strong>. Spelling, grammar, or usage are wrong. Incorrect capitalization is common. </li><li><strong>Jumbled.</strong> Word order is typical of languages other than English.</li><li><strong>Short.</strong> If there’s an
 attachment or a link, the message is frequently one line, because that 
makes it more difficult for SPAM filters to recognize a bad message.</li></ul>



<p><strong>Good emails and web sites:</strong></p>



<ul class="wp-block-list"><li>For an email, the sending email address is at the same domain as the web links. So mail <strong>ABOUT</strong> Chase Bank is <strong>FROM</strong> Chase.com, not a Gmail account.</li><li>Have phone numbers, especially a direct-dial non-toll-free  number.</li><li>Have a physical address. Even a post office box is OK. That physical  address is required by law in commercial emails, under the CAN-SPAM  act. </li><li>Emails have a <strong>WORKING</strong> Unsubscribe link, also required by law.  </li></ul>



<h3 class="wp-block-heading"><strong>When in doubt, look it up:</strong></h3>



<p>Some of this applies to products as well; check these sites to look up the reputation of a company or a web site.</p>



<p>On <a href="http://Google.com" target="_blank" rel="noopener">Google.com</a>,
 type in the site or product name, and ‘complaints’. Then in the 
results, look for companies that you know that do reviews, including any
 of these:</p>



<ul class="wp-block-list"><li><a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="http://angieslist.com" target="_blank">AngiesList.com</a></li><li><a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="http://BBB.org" target="_blank">BBB.org</a></li><li><a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="http://ConsumerAffairs.com" target="_blank">ConsumerAffairs.com</a></li><li><a href="http://TrustPilot.com" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">TrustPilot.com</a></li><li><a href="http://Amazon.com" target="_blank" rel="noopener">Amazon.com</a></li></ul>



<p>There are other review sites, but be 
aware that most small sites have poor moderation, and bad reviews could 
be from competitors. And of course, there are companies that “manage 
reputations” and that basically means “flood review sites with good 
reviews until the bad reviews are pushed off the first page.” The 
companies above are somewhat skilled at detecting those duplicate 
submissions, and these are not, but may still provide some useful 
information. The ‘grain of salt’ guideline applies:</p>



<ul class="wp-block-list"><li><a href="http://SiteJabber.com" target="_blank" rel="noopener">SiteJabber.com</a></li><li><a href="http://Yelp.com" target="_blank" rel="noopener">Yelp.com</a></li></ul>



<p>For any question of “Is this file I received safe to open?” you can upload it at <a href="http://VirusTotal.com" target="_blank" rel="noopener">VirusTotal.com</a>, and it will do multiple antivirus scans immediately.</p>



<p>In general, online reviews of companies
 or products that are a single line of text, and don’t actually mention 
the name of what they’re reviewing, are likely bulk submissions from a 
paid reputation management service. Ignore them, and read the longer 
reviews signed with real names, or (on some sites) marked as ‘Verified 
Purchaser’ or similar.</p>



<h3 class="wp-block-heading"><strong>Bad emails and web sites:</strong></h3>



<ul class="wp-block-list"><li>Hide their physical location. Contact, if any, is by email or chat. There is often no clue as what country they are in.</li><li>Offer to ‘install software to allow you to view’ their page. That’s an offer to install malware. Close that page.</li></ul>



<h3 class="wp-block-heading"><strong>Both good and evil web sites have:</strong></h3>



<p>Encrypted web sites, with addresses 
starting with https. While secure web sites do provide protection from 
information entered into an online form from being read ‘in-traffic’ as 
it goes through the internet, https links do not provide confirmation of
 identity, just encryption. A “green padlock” link can provide identity 
confirmation, but only if it’s issued by a known “certificate 
authority”, and checking the encryption certificate for the issuer is 
going to show information that is mostly not easy to understand; it’s 
not a good indication of good or evil.</p>



<h3 class="wp-block-heading"><strong>Already on a Site, and Suspicious?</strong></h3>



<p>High-pressure web sites tend to scroll  forever, and show an auto-starting video, with no indication of length,  that does not allow you to skip ahead. They’re selling the modern  equivalent of snake oil, or the cure-all nostrum of the day. They’re  promising something that they won’t tell you the price of until you get  to the end of that video. They’ll pack that video with, again, fake  urgency and endorsements from impressive experts you’ve never heard of,  and it’s all just formula pressure sales that are modeled on the old  in-person free seminars that push real estate investment books to anyone  willing to sit through 4 hours of talking. Close that site.</p>



<p><strong>“We’re from Visa/Mastercard, contacting you about lowering your rate&#8230;”&nbsp;</strong>Unless
 you are a bank, you don’t have an account with either&nbsp;the real 
MasterCard or Visa companies;&nbsp;you have accounts with banks. Visa and 
MasterCard are credit card interchange corporations, and they do 
business with banks, not individuals. Visa and MasterCard are 
competitors, &nbsp;and they would not co-market interest rate discounts even 
if they sold accounts directly.

</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" src="https://www.pc410.com/art/2018/SkyNet.jpg" alt=""/><figcaption>SkyNet called: They want their Terminator back, and they have low credit card rates, too.</figcaption></figure></div>



<p>Caller-ID is now reliably fiction. I 
sell phone service, as ‘voice over internet’ or VOIP, and in the setup 
of each user, you can type in anything you want to be visible as the 
caller ID information. Telemarketing phone systems change that text 
constantly. The newest such call here showed ‘Discover Card’ as the 
caller, but the computer-read script started with claiming to be from 
Visa/Mastercard’s security department. &nbsp; &nbsp;</p>



<h3 class="wp-block-heading"><strong>Overall:</strong></h3>



<p>Always look at the sender’s email address. If it doesn’t match what’s claimed in the email, there’s something wrong.&nbsp;</p>



<p>Always look at link destinations before
 you click; just float the mouse over the link and look in the 
bottom-left corner of your screen for the destination. It should match 
the addresses and email domain.&nbsp;</p>



<p>And be suspicious. Always. The internet
 makes the wild, wild west look lawful and organized. At the very least,
 they had a local sheriff.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/working-models/is-this-email-safe-is-this-robocall-for-real/">Is this Email Safe? Is this Robocall for Real?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/working-models/is-this-email-safe-is-this-robocall-for-real/">Is this Email Safe? Is this Robocall for Real?</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
