Real or Steal.png

Fake emails arrive in your inbox every day. Can you identify the genuine alerts apart from the ones scammers send? Here are two recent examples. One is real. One is a steal. You can control the moving slider to see the clues. 

Steal icon.png

Like many "phishing" emails, this one raises your blood pressure by suggesting you made a purchase and need to pay for it. Ignore it. Don't call the 888 phone number or try to unsubscribe.

Real icon.png

This email from eBay, asking you to confirm personal information, is genuine. If you aren't using your eBay account, it's best to close it. Go to, hover the cursor over your name in the upper-left corner of the screen and click "Account settings." Under "Account preferences," select "Close account."

Cybersecurity Headlines.png
Oct 8 headlines graphic.jpg

Those annoying pop-up graphics that require you to identify images in a series of boxes before logging into a website will soon be on the way out. Recently, the big tech company Cloudflare unveiled a new way for websites to confirm who users are without the tedious process of accurately selecting parts of images.


Apple has removed nearly a dozen apps from its iPhone app store that planted advertising malware on users’ phones. Bleeping Computer says if you have “Loot the Castle,” “Run Bridge,” “Shinning Gun,” or “Racing Legend 3D” on your phone, delete them.


This week, Google is launching a new system that allows emails from political campaigns to get through Gmail’s spam filters. But Axios says users will be presented with a banner at the top of the first email from the campaign asking if they want to continue receiving the campaign’s messages.

October is Cybersecurity Awareness Month

Xtreme _ Poster 2 Smart Car Web.jpg

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

Xtreme whblur.png

We view Aware Force from Xtreme Solutions as an extension of our commitment to keeping our clients informed and empowered.


Xtreme Solutions is powered by certified and highly experienced professionals in information technology, cybersecurity, and telecommunications services and solutions.


XSI's Cyber Range — I.C.E. (Integrated Cyber Environment) solution offers a virtual cyber defense environment designed to train cybersecurity professionals and decision-makers in securing national military and civilian networks against all forms of cyberattacks. The range is an integral component of Xtreme Solutions’ comprehensive cyber defense solutions.


Connect with us here


Hervia Ingram

Xtreme Solutions

One more thing.png
Cartoon Oct 8 CSM.jpg
Answers readers cybersecurity questions.png

"If I created a TikTok account in the past but have since deleted the app, does TikTok still have access to my data? Do I need to delete my account, or does removing the app also limit their access to data?"

Deleting the app means it can no longer send your data back to the owners. Some apps track when users delete the app and purchase advertising on websites they visit to promote it ("come back!"). Deleting accounts you no longer use is wise, but it won't delete whatever data they have already collected about you. 


"I get texts from area codes outside of the US and they have access to my credit cards. Now I delete all unusual area code calls from my phone. How can I block these texts?"

What do you mean they "had access to your credit cards?" Did they make purchases without your knowledge? What do the texts say?

"They sent an offer from T-Mobile and Amazon for a free iPad or Amazon for $1.00 shipping cost. I used my card, which was charged, but nothing was shipped. The website they gave me to track the shipment could not be reached. My bank told me to ignore these offers and not answer."

First, keep an eye on your credit card statements. If a charge appears that you didn't make (including the $1 charge you mentioned), call the number on the back of your credit card, tell them you didn't make the purchase, and have them send you a new card. This is an example of a deal that looks too good to be too good to be true.


As for blocking unwanted texts: on an Android phone, open the messages app, tap the three dots inside the search bar, go to settings, then “spam protection” and “enable spam protection.” The slider should turn blue. On an iPhone, open the Settings app. Scroll down and tap Messages. Scroll down until you reach Message Filtering. Now tap the toggle next to Filter Unknown Senders to the "On" position.

Do you have a question about cybersecurity?

Thank you for your question!

Cyber cartoon © 2022 CartoonStock | Original content © 2022 Aware Force