Thermacell logo above the text Cybersecurity News You Can Use and the tagline We’re always keeping you safer online, with a silhouette of two people sitting in a field at sunset with a colorful sky.
Thermacell cybersecurity in action
A big thank you to our colleagues, Karissa and Grant Kiely, for sharp eyes and quick thinking last month. They received several suspicious, unsolicited requests to access their laptop via AnyDesk.
Thermacell helpdesk phish
Image (1)

The Risk: Sending these requests is a common tactic that attackers use. Accepting them could have given the attackers complete control of her computer, allowing them to steal data or install ransomware.

The Response: Instead of clicking accept, Karissa and Grant immediately reported the activity. Our IT team responded instantly, blocking the unauthorized user and fully securing their machine, turning a potential breach into a security win.

Their actions are a perfect example of our most important security rule: See Something, Say Something. If you ever get an unexpected request, pop-up, or email, never approve it. Always report it.

Phishing Test Results
Show Major Improvement!

Thermacell phish metrics
Tariffs lead graphic c

Security Alert:
The Fake "Payment Warning" Scam

Be on the lookout for a scam email designed to make you panic.

A real example recently received by a colleague claimed a large payment was made to “Coinbase Inc.” and urged them to call a phone number to stop the transaction. This is a trap!

Thermacell paypal

The goal is “Vishing” (Voice Phishing): to get you on the phone with a live scammer who will try to steal your information or access your computer.

How to Spot This Phish: It’s the wrong sender. While the name says “[email protected],” the actual email address was from a strange, unrelated domain. Always check the sender’s full email address.

Urgent & Alarming: The message uses a large, fake transaction to create panic and demands you call a specific phone number immediately.

Unprofessional: The email may contain confusing messages (such as a “developer invite” mixed with a fraud alert) or a generic greeting.

The Golden Rule: Don’t Panic. Verify Directly.

If you receive an email like this:

  • NEVER call the number or click any links.
  • ALWAYS verify by logging into your account on the official website yourself to check for any real alerts.
  • REPORT the phish to the IT Department so we can block the source.

Staying skeptical is your best defense.

an elderly couple, a man and a woman, sitting closely together at a wooden table. They are looking intently at a tablet computer that the man is holding. Superimposed over the image are glowing red, futuristic graphics, including a frame around the couple and three cybersecurity icons (a padlock and shields) floating above the tablet. Across the bottom of the image, the text reads: "Digital Defenses for Mom and Dad".

Cybersecurity News You Can Use

a stylized, futuristic illustration against a vibrant blue and teal background. On the left, white text reads: "What you're doing on social media could explain why you're getting so many spam calls." On the right, a glowing smartphone is surrounded by neon lines of code, data charts, and digital icons. The scene also includes a cup of coffee, a notepad with a pen, and a small plant, creating the impression of a digital workspace.

MAKE IT STOP! Robocalls are up 10% during the first half of this year, especially telemarketing calls generated by AI. We’re talking nearly 30 billion calls, in all! And if you’re getting more than your share, it could be because of what you’re doing on your social media feeds.

  • If your phone number is visible on your social media profile, even just to “friends,” on your online bio, or a business post, it can be scraped and sold to spam call lists. Check LinkedIn, in particular.
  • Oversharing personal details like your job, birthday, or recent purchases helps scammers craft targeted, believable calls.
  • Accepting friend requests from strangers can expose your contact info to bad actors posing as real people.
  • Engaging with quizzes, or “comment to win” posts can easily link your profile to scam databases.


Four steps to managing the flood of calls:

  • Keep your number private. Don’t ever include it in what you post.
  • Enable call-blocking features on your phone (such as “Silence Unknown Callers” on iPhone or call-blocking tools on Android).
  • Consider subscribing to call-blocking apps like Hiya, Robokiller, or Truecaller or carrier-provided solutions (like AT&T ActiveArmor, Verizon Call Filter).
  • And if you get an unidentified call, let it go to voice mail.

Update Your Passwords Now

These organizations say they have been hacked recently. If you do business with any of these companies, change your account password and use two-factor authentication wherever possible.

a collection of logos from various companies arranged neatly in two rows: Top Row: Aflac: The logo has the word "Aflac" in blue letters, with the head of a white duck emerging from the letter "f". Erie Insurance: White text reading "Erie Insurance" beside a white icon depicting a stylized clock tower on a solid blue rectangle. Philadelphia Insurance Companies: A navy blue icon of the Liberty Bell beside blue text "Philadelphia Insurance Companies," all on a white background. Krispy Kreme Doughnuts: Text in red script saying "Krispy Kreme," set above a green rounded rectangle with the word "Doughnuts" in white. Bottom Row: McLaren Health Care: Stylized, abstract shapes in shades of blue and grey next to the bold navy-blue word "McLaren," with the words "HEALTH CARE" below in grey. Canva: A circular gradient logo transitioning from teal to purple, with the word "Canva" written in white script at the center. The North Face: Bold black text stacked vertically beside a quarter-circle graphic formed by three curved lines, symbolizing a simplified outline of a mountain face. The image presents these well-known brand logos clearly on a white background.

One more thing...

a simple cartoon sketch depicting a bearded, disheveled man standing on a tiny desert island beneath a single palm tree. He's holding a note that reads: "Our e-mail address is…," with the actual address unclear. Near his feet is an open bottle, presumably used for sending messages, emphasizing humorous irony about being isolated yet referencing digital communication. The drawing is minimalistic, outlined with loose pen strokes, and shaded lightly.

Answers to Your
Cybersecurity Questions

a close-up photograph showing someone's hands typing on a mechanical keyboard in front of a computer monitor. The monitor displays a colorful, cartoon-style illustration with playful objects on a table. In the center of the image, bold white text on a highlighted background reads: "SECRET SPOTIFY TRICK YOU SHOULD KNOW," suggesting the content relates to tips or hidden features of Spotify. The setting appears cozy and tech-oriented.

“I was scrolling TikTok and came across a video that showed me how to get Spotify for free. My Spidey sense told me this is a scam. Is it?”

It’s a scam, yes, and a sneaky one that is appearing quite often on TikTok feeds.

The video promises a “quick fix” to get free access to Microsoft Word, Spotify, CapCut, and other software. The video instructs you to “press Windows + R and run PowerShell commands.”

But what it really does is install malware on your computer. Ignore the instructions. Your Spidey sense is correct. 

TLDR’s cyber news service reminds us to download TikTok only from official app stores. A new, dangerous version of TikTok is being promoted on websites and social media that takes screenshots of your phone as you’re using it and transmits the images to scammers. 

a humorous image showing a man dramatically sticking his head out of a window, eyes wide open and mouth agape in exaggerated shock or surprise. The scene is set in a quiet residential neighborhood, with houses neatly aligned and trimmed hedges along a sidewalk. Overlaid text on the bottom-right corner of the image asks: "Is it legal for your neighbor to record you on their doorbell cam?" The words "legal," "your neighbor," and "record you" are emphasized with orange color, highlighting privacy concerns and neighborly surveillance themes.

“More and more homes and businesses have security floodlights, cameras, and ‘Ring’ doorbells. Should we assume we are always being recorded, and is our voice also being recorded for the property owner?”

Generally, yes, you’re being recorded a lot more than you might think. Ring doorbells, for example, record sound up to about 20 to 25 feet from the device. In many cases, both audio and video are saved to the owner’s account and can be reviewed by the property owner at any time.

In the U.S., laws vary by state, but in most public settings, there’s no reasonable expectation of privacy, meaning it’s generally legal to record you without your consent. Wired reports that for audio recordings, some states require two-party consent to record conversations. However, if you’re speaking loudly near someone’s property, it may still be recorded and considered lawful.

In Europe, privacy laws are tougher. To avoid capturing your neighbor’s property or public areas beyond your boundary, it is recommended that you adjust the motion and audio zones on your device.

O ChatGPT disse: a portrait-style image showing a well-known figure wearing a dark suit jacket against a plain, neutral background. Overlaid text in bold white blocks reads: "BEWARE!! There's a video out there promoting some dental plan with an AI version of me. I have nothing to do with it. -Tom Hanks" The message emphasizes caution regarding misleading or unauthorized use of artificial intelligence-generated likenesses, raising awareness of potential misinformation or deepfake technology.

“How do videos that put words in a person’s mouth affect security? I’ve seen video posts where you hear the person say something; the words were not their own but actually AI-generated.”

These are called “deepfakes.” As AI-generated videos become increasingly convincing, cybercriminals are using deepfakes of executives, HR reps, or family members to trick people into transferring money, divulging credentials, or installing malware on their computers.

A deepfake can also depict public figures making offensive or illegal statements, thereby damaging their reputations, careers, or public trust.

It’s only going to get worse, and unfortunately, being skeptical will be your main line of defense.

Send us your cybersecurity question for possible use in a future newsletter.

Cyber cartoon © 2025 Cartoonstock | Original content © 2025 Aware Force LLC