shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

254
active users

#techsupportscams

0 posts0 participants0 posts today
iam-py-test :unverified:<p>Has anyone ever heard of a program called "Seraph Secure" (seraphsecure[.]com).</p><p>Its purpose is to block remote access software (e.g. TeamViewer) from being installed on a computer. Apparently it was created by a YouTuber.<br>A family member is considering installing this on the computer of someone who has fallen for tech support scams before, but I have never heard of it and was wondering if it is legitimate and effective.</p><p>Thanks</p><p><a href="https://infosec.exchange/tags/SeraphSecure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SeraphSecure</span></a> <a href="https://infosec.exchange/tags/SecuritySoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecuritySoftware</span></a> <a href="https://infosec.exchange/tags/TechSupportScams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSupportScams</span></a> <a href="https://infosec.exchange/tags/RemoteAccessSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccessSoftware</span></a> <a href="https://infosec.exchange/tags/Kitboga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kitboga</span></a></p>
IT News<p>Tech support scammers inject malicious phone numbers into big-name websites - Tech support scammers have devised a method to inject their ... - <a href="https://arstechnica.com/security/2025/06/tech-support-scammers-inject-malicious-phone-numbers-into-big-name-websites/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/tech-support-scammers-inject-malicious-phone-numbers-into-big-name-websites/</span></a> <a href="https://schleuss.online/tags/techsupportscams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techsupportscams</span></a> <a href="https://schleuss.online/tags/googleads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>googleads</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/websites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>websites</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@JayeLTee" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>JayeLTee</span></a></span> <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> is being leveraged for a lot of <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> and <a href="https://infosec.space/tags/scammers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scammers</span></a>, including <a href="https://infosec.space/tags/TechSupportScams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSupportScams</span></a> which don't even bother to get some <a href="https://infosec.space/tags/typo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typo</span></a>-based <a href="https://infosec.space/tags/domain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domain</span></a>, as we can see on <span class="h-card" translate="no"><a href="https://infosec.exchange/@urldna" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>urldna</span></a></span> ...</p>