News (blog)

The KIPCUG Blog is configured:

  • Members may read, comment or add a new post
  • Public may read only
  • 03 Aug 2011 10:08 AM | Deleted user

    We had a great summer picnic and 4 great presenters.

    Mark Monyhan talks about Google+

    We still had some room.. wish you was here !!

    Grant McCormick talks SIG's

    Dr. Alice Cash talks on how she uses Facebook

  • 02 Jul 2011 10:33 PM | Deleted user

    How to recognize phishing email messages, links, or phone calls

    Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

    Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

    What does a phishing email message look like?

    Here is an example of what a phishing scam in an email message might look like.

    Example of a phishing email message

    • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.

    • Beware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.

      Example of a masked web address

      Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

    • Threats. Have you ever received a threat that your Hotmail account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.

    • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, see Avoid scams that use the Microsoft name fraudulently.

      Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.

    Beware of phishing phone calls

    Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.

    Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

    Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

    For more information, see Avoid tech support phone scams.

    Report phishing scams

    If you receive a fake phone call, take down the caller's information and report it to your local authorities.

    You can use Microsoft tools to report a suspected scam on the web or in email.

    • Internet Explorer. While you are on a suspicious site, click the gear icon and then point to Safety. Then click Report Unsafe Website and use the web page that is displayed to report the website.

    • Hotmail. If you receive a suspicious email message that asks for personal information, click the check box next to the message in your Hotmail inbox. Click Mark as and then point to Phishing scam.

    • Microsoft Office Outlook. Attach the suspicious email message to a new email message and forward it to To learn how to attach an email message to an email message, see Attach a file or other item to an email message.

    You can also download the Microsoft Junk E-mail Reporting Add-in for Microsoft Office Outlook.

  • 11 May 2011 9:18 AM | Deleted user

    Do you think your PC has a virus?

    Do you think your PC has a virus?

    Use the Microsoft Safety Scanner to scan your PC,
    find the virus, and remove it. This no-charge, downloadable security tool provides on-demand scanning and helps remove viruses, spyware, and
    other malicious software.

    It's not a substitute for antivirus software that
    provides ongoing protection, however. For that,
    you need Microsoft Security Essentials,
    also available at no charge.

    Get a free PC safety scan now

    Download Microsoft Security Essentials

    Security updates for May 10, 2011

    The Microsoft Security Bulletin for May includes two security updates, including one
    for the Windows operating system and one for Microsoft Office PowerPoint.

    Microsoft security news


    Watch out for bin Laden malware on the web and in email

    If you're searching for news or pictures of Osama bin Laden, you might find malware instead. This week the FBI warned computer users to be especially careful of email messages that claim to show photos or videos of bin Laden's death.


    Beware of "MS Removal Tool" rogue software

    Cybercriminals are circulating new fake security software called "MS Removal Tool." If you see a pop-up ad or an email for the MS Removal Tool, ignore it.


    Xbox LIVE phishing alert

    Do you play the Xbox video game Modern Warfare 2? The Xbox LIVE online game service recently issued a warning about phishing messages targeting players of the game. 


    FBI and DOJ take on the Coreflood botnet

    On April 13, the FBI and U.S. Department of Justice announced an operation to disable the Coreflood botnet. Microsoft supports the effort, and we've added Coreflood malware detection to our Windows Malicious Software Removal Tool.


    Microsoft partners with security community to help reduce risk

    Microsoft is partnering with other technology companies on a new process to follow once a vulnerability has been identified in a piece of hardware or software. Learn more about Coordinated Vulnerability Disclosure.


    Protect your computer


    Help mom protect her PC

    Are you your mother's technical support person? In honor of the recent Mother's Day holiday, here are five gifts that you can give your mom to help her protect her PC.


    Why you need a strong password

    Learn from an Internet security expert why it's so important to create different passwords for all of your accounts, and to change them often.


    What is malware?

    We often refer to Internet threats with the term "malicious software" or "malware." But what do we mean by that and how can you help protect your computer from it? Find out here. 


    Protect yourself and your family


    Beware of Facebook email scams

    This fake email message purporting to be from Facebook contains three obvious signs of a scam. Take a look and see if you can spot them all.


    Use Hotmail aliases to protect your privacy

    Are you nervous about giving out your email address? A new feature in Windows Live Hotmail enables you to create an email alias and receive messages sent to it in your Hotmail account, without anyone knowing what your real email address is. 


    The Microsoft community has Answers

    Do you have a technical problem? Try Microsoft Answers, a support forum where Microsoft support engineers and super-geek volunteers answer your questions.

    Security resources

  • 09 Mar 2011 9:13 PM | Deleted user

    Southeast Linux Fest Spartanburg Marriot in Spartanburg NC June 10th, 11th, and 12th

    Ohio Linux Fest at the Columbus Convention Center in Columbus OH on September 9th, 10th, and 11th


  • 08 Mar 2011 9:48 PM | Deleted user

    The Microsoft Security Bulletin for March includes three security updates, including two for the Windows operating system and one for Microsoft Office.

  • 08 Mar 2011 2:10 PM | Deleted user

    We got off to a little bit of a rocky start, the Church had our date down wrong.. so we meet in the Choir Room.. I kind of liked it.. let me know what you though. you can email me at
    At the check in table we missed David Kling, Rosemary Viele gave an update that he had fallen and broke a Hip and is working on recovering.

    We started off Ed offering to read user to user.. no takers.

    SIG Presentation was Susan Moore talking about the Excel SIG which meets at the 1st Monday of each month.

    Our main presenters where Scott Render and Susie Unseld with the City of Louisville, they talked about the City of Louisville website and the other sites that they are responsble for and how getting people to update them and more importantly.. how everyday people come to the site to use it and find answers. Very informative.

    Attendance Prize was $60.00 and went unclaimed

    the PIG SIG was held at Red Robin, since our old friend TGIF closed

    Our next meetings will be April 5th Tom Scanlon will talk about Click Free back up. This is from the CES show that he attended in January.

  • 08 Mar 2011 2:08 PM | Deleted user

    In The City of Louisville you have to dispose of them at our HAZ BIN.

  • 04 Feb 2011 9:50 PM | Deleted user

    Users Helping Users  great questions.

    Back to Basics with Mark Monyahn  Making Tech Easier with a review of Ninite and Secunia Cool stuff

    Tom Scanlon with a CES Overview

    SIG Presentation

    Erin Zuber with The Harbor House shared thier mission of "Empowering individuals with Disabilities and their Families to Live Fulfilled and Productive Lives"  Visit them at 

    Door Prizes

    Attendance Prize went unclaimed.

    PIG SIG at TGIF  Yummy

  • 17 Jan 2011 11:44 AM | Deleted user

    Greetings just wanted to recap our great January meeting.

    January Photos KIPCUG General Meeting

    We handed out our new KIPCUG bumper stickers, if you haven't got yours yet, be sure to pick one up at the next meeting.
    Jim Travelstead helped out with Users to Users
    Mark Moyahan did a back to basics topica about managing your email inbox
    Charlie May annouced a new SIG
    Stan Boyd talked about the Photography SIG
    Jonathan and Dawn from Barnes and Noble talked about the EReader that they have called the Nook
    We then had some great Door Prizes and Mentioned our contest winners for the bumper sticker and tshirt design contest's Thanks Sandra and Michael

    Our next meetings will be February 1st Eri Zuber with Harbor House of Louisville will talk and then March 1st Susie Unseld with the City of Louisville will talk about the City's Website.


  • 12 Jan 2011 3:15 PM | Deleted user

    Pulled from the Microsoft Security Email

    Phishing scams: Everything you need to know


    You hear about phishing scams all the time, both in the
    general media and in this newsletter. But what is phishing,
    really? These links will give you the essential information that you need to know:

    Security updates for January 11, 2011

    The bulletin for January includes two security updates for the Windows
    operating system.

    Microsoft security news


    Microsoft to sponsor panel discussion on locational privacy

    With new GPS technologies like Facebook Places and Foursquare,
    others can track our movements
    at any time. What does this mean for privacy? Join a panel discussion
    sponsored by Microsoft on January 26.


    Avoid technical support scams through your phone

    If you receive a call from someone claiming to be from Microsoft and offering
    technical support, hang up. Read more about this ongoing scam.


    Microsoft supports Commerce Department's call for more online privacy protection

    The U.S. Department of Commerce recently released a
    "Green Paper" outlining
    ways to protect consumers' privacy online. Microsoft applauds the report
    as an important step forward in addressing online privacy issues.

    Protect your computer


    Help secure your new PC against malware

    Was one of your holiday gifts a new PC? Read these tips to boost your
    security before you go online.


    3 ways to help secure your wireless network

    You've taken steps to help defend your new PC. Now take a look at your
    home wireless network. These three tips will get you started.

    Protect yourself and your family


    Set up your new Windows Phone for web browsing

    Help protect yourself when you go online by changing privacy and other
    browser settings on your new mobile phone.


    Control how - and how much - your kids use Xbox 360

    Is your family playing games and streaming movies and TV on a new Xbox 360
    entertainment system? Use safety settings to control what your kids
    can see  and do on the new family toy.

    Security resources

    About this newsletter
    Microsoft Security for Home Computer Users is a monthly newsletter bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive more technical security information, see the Microsoft Security Newsletter.


Kentucky - Indiana PC Users Group
291 N. Hubbards Lane
Suite 172-318
Louisville, KY 40207-2295
 E-mail: (c) 1983-2013 
Powered by Wild Apricot Membership Software