New Phishing Scam to Apple Users (Mac and Devices)

Background

I got this email today. It is absolutely a SCAM! But it’s one of the more tricky ones, so I thought I’d instruct you on how to check.

Firstly, do note the To: area, and the Reply-To: areas on the upper left. People may be swayed by the whole FROM: Apple <noreply.email.apple.com> but, but the To and Reply-To are the first clue. SOME of you may even know how to view and read the hidden header information, and in this one, it was SURPRISINGLY legitimate looking, unless you looked closely. This email is trying to tell me that an app-specific password was created by an app, and I somehow authorized a large payment.

DO NOT CLICK ANY OF THE LINKS IN THE EMAIL!!!

Phishing email requesting App-Specific Password

What is an App-Specific Password

It’s an extra level of security for applications to access your information. Some applications are not built as securely as Apple (or Microsoft, or Google) native apps. For example, third party email applications, and in my case, I use them for my BusyCal and BusyContacts, as I’m not a fan of the Mac native apps for those things. It’s created BY YOU, for those apps, but they request that you create it, for them to run. Not a hard process to do, and you would be walked through it. HOWEVER, if someone does get into your very secure server ID (eg: iCloud), they could do all sorts of things.

How to Prevent Others Logging Into Your AppleID (or other platforms)

  1. Turn on Two-Factor Authentication, on any app you can.
  2. Use unique and difficult passwords – and don’t repeat them.
  3. Use a Password Manager Application, with excellent security protocols.

Resolution

But the REAL way to check this is to log in to your account at appleid.apple.com. This here is NOT a link – don’t try to click it. Open a new browser window, and hand-type it in! Then, login using your credentials. This will bring you to a screen with a number of blocks. At the bottom left is a button to view ALL of the App-Specific Passwords you’ve created, and the dates they were created. This is a good time to make sure you recognize any apps listed, and the dates the App-Specific Password was created. If you don’t recognize one of them, hit the minus sign to the left of the item in your list. If you don’t recognize ANY of them, use the Revoke all feature at the bottom,  and pursue further actions, like changing your Apple ID login information, and securing all your accounts.

It might be helpful to note that I have multiple dates on some (A responsible app may periodically ask you to create a new one, for security’s sake). And, that each of my devices required their own.

App-Specific Passwords Button on AppleIDView of App-Specific Passwords list and where to delete them

All of this may seem like a LOT, but it’s my hope that you will make sure to NOT touch any links in any suspicious email – and even if it doesn’t look suspicious, but you didn’t expect it – DOUBLE CHECK!

Is Your Email Account Hacked?

Today, I received an email from a well-meaning friend asking if my email account had been hacked. He forwarded the original email to me, and it was immediately obvious that “Hacking” was not what was happening here. The appropriate word for what was done is “Spoofing”. My name was Spoofed. (http://en.wikipedia.org/wiki/Email_spoofing). To see the email I received, please see the bottom of this post.

What this means is that someone, somewhere got my name and used a bogus email address to send email to my friend – showing my name, but not from my address. This is a very important distinction. Had they used my email address, even with a DIFFERENT name, I would have been “Hacked”. I’d have to change my passwords and worry about my email account’s security. In this case, there’s nothing I can really do, but at least my information is safe.

I’m sure you’ve all seen emails like this. Emails that appear to be from friends, but are promoting something you KNOW your friend wouldn’t promote, or that has some wonky link in it.

If you’re wondering why this happens, there are several possible contributors to the cause:

1) Sending batch emails to dozens of people or strangers and CC’ing all the emails, exposing everyone’s names and addresses to everyone else. This is easily resolved by using BCC (for a tutorial on BCC, please visit my YouTube Channel: http://www.youtube.com/watch?v=1DunBSu6mL0)

2) Using BCC in your emails, but forgetting to remove the dozens of email addresses that had been forwarded to you by others who didn’t know BCC

3) (This seems to me to be the MOST prevalent) Keeping your Contacts (or Address Book) on a free email server – like Gmail, Yahoo, Hotmail, AOL and others. It’s not too hard for a hacker to access your information from there :

http://productforums.google.com/forum/#!topic/gmail/r8AOu5cPpaU
http://security.stackexchange.com/questions/34518/spam-that-comes-from-names-in-my-address-book-but-not-their-email-addresses

To support this idea, I can see that my friend received his email on his gmail account. My name is listed on his gmail account as a contact. The link and actual USED email address have something to do with cars. My friend is very connected with the car business and has likely been tracked as we all are, while doing some of his research.

Some articles blame social media, however I’m not among the people who believe that to be the culprit. My personal name is not listed in full, as used in this email on almost any social sites. In fact, the ONLY place this name is listed in this way is in Google+ (in which Google has endeavored to link everything Google to everything ELSE Google).

So, my suggestion is to stop using Free Email addresses on public sites. Now, I know that’s not going to happen, so here’s the next best thing. Check the email information – and look for the email ADDRESS from which the email was sent. If the listing is as it appears in the screenshot below – IMMEDIATELY delete the email. DO NOT CLICK ANY LINKS! Then, consider removing your friend’s name from a public listing on your free email account, and consider using BCC correctly in emails to protect the names and emails of your friends.

Spoofed Email

Look at the email address this was sent FROM

Complete Online Manuals and Help Guides for All Adobe Products – from ProDesignTools.com

Oh – THIS is lovely! ProDesignTools.com has created a page dedicated to ALL the Help files for ALL the Adobe products, in searchable, discussable format! They’re even downloadable as PDF’s!

Check this out:
http://prodesigntools.com/online-manuals-help-documentation-all-adobe-products.html

Tutorial – Using the History Brush with Filters – Photoshop

When I don’t get a chance to make my own tutorials, I still appreciate the work of others. Graphics.com has posted a nice tutorial on using the History Brush to control where Filter Effects…um… affect your image. Check it out!

http://www.graphics.com/modules.php?name=Sections&op=viewarticle&artid=1007

Awesome HTML 5 Cheatsheets!

The hosting company who hosts all my websites (www.inmotionhosting.com) has posted a wonderful set of HTML 5 Cheatsheets! There’s one for Tags, One for Event Handler Attributes, and one for Browser Support.
 
Now, I know their images are TOO big to view clearly on my layout, so, to download them, go to http://www.inmotionhosting.com/infographics/html5-cheat-sheet/?utm_source=facebook&utm_campaign=infographics&utm_medium=InMotionHosting
 
 
HTML5 Cheat Sheet - Tags

HTML5 Cheat Sheet By InMotion Hosting – A Virtual Private Servers Provider

 
 
HTML5 Cheat Sheet - Event Handler Attributes

HTML5 Cheat Sheet By InMotion Hosting – A Web Hosting Provider

 
 
HTML5 Cheat Sheet - Browser Support

HTML5 Cheat Sheet By InMotion Hosting – A Dedicated Server Provider

 

Tutorial on the Painting with the History Paintbrush – Photoshop

Russell Brown (www.russellbrown.com) has created a really good tutorial on how to use the History Paintbrush in Photoshop.

Those of you who’ve taken my Photoshop classes know that I don’t often teach this tool. I actually think it’s an awesome tool – but of course I’m ALL about non-destructive techniques, and this isn’t one of them. This technique changes original pixels permanently (there are work-arounds, but they’re rather indirect). So, I recommend knowing how this tool works, what you can do with it, and then knowing you can use it for more of your “quick and dirty” retouching and repair needs.

[iframe_loader  src=”http://tv.adobe.com/embed/46/11397/” width=”480″ height=”296″ frameborder=”0″ allowfullscreen scrolling=”no”]