Spencer Public Library
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules
Reach us by phone at 
​712-580-7290

Tech Corner

Don't Login from Links

4/28/2025

0 Comments

 
A frustrated woman sits at her computer after getting a warning symbol with her login. The text says
​It’s getting way too easy to lose everything on your computer — and you might not even realize it’s happening.

Passwords alone aren’t safe anymore. Hackers are sneaky, and they're really good at stealing passwords. That’s why companies like Microsoft and Google are pushing people to use something better called passkeys. Passkeys basically tie your account to your actual device, like your phone or computer, instead of just relying on a password.

Even if you’re using two-factor authentication, like when you get a code texted to your phone, you’re still not completely safe. Scammers have found new tricks. They send fake popups or emails that look real, sometimes warning you about a “problem” on your computer or telling you to log in to something important. If you click, they might trick you into copying and pasting something dangerous into your computer. 
​
Even worse, scammers are now stealing the special codes your computer uses to stay logged in. They don’t just steal your password — they take the whole session. Once they have that, they don’t even need your password or your phone to get into your accounts. They can just waltz right in and grab your emails, your documents, your whole digital life.

A new attack kit called SessionShark makes things even scarier. It creates fake Microsoft login pages that look so real you probably couldn’t tell the difference. They even fake error messages to make everything seem normal. It’s incredibly convincing, and it’s designed to trick even cautious people.
One wrong click could hand over full control of your Office 365, Google, or other important accounts. It’s that easy to lose everything.

To protect yourself, always log in the normal way you’re used to. Don’t click login links in emails, popups, or messages. Type in the website address yourself, or open the app directly. Set up passkeys if your account offers them — they’re much safer than passwords or texted codes. And always be suspicious if something feels a little off, even if it looks official. Hackers are banking on you trusting them.

If something feels weird, it probably is. Always go to the real website yourself instead of trusting a link someone sent you.

Stay safe out there!

0 Comments

ClickFix Attack: The Simple Mistake That Could Put Your Computer at Risk

4/26/2025

0 Comments

 
There’s a new kind of attack going around, and it’s gotten popular enough that even hackers backed by governments in places like Russia, Iran, and North Korea have started messing around with it. But don’t panic — for most of us, the bigger threat is actually regular cybercriminals who want to steal your passwords, your money, or worse.

The good news? This scam is pretty simple once you know what to look for. It’s called "ClickFix," and it’s really just a fancy way of tricking you into doing the hacker’s dirty work yourself.

Here’s how it works: you might get a fake error message that looks legit, or maybe a pop-up telling you to "register" your PC or "unlock" a secure document. Whatever the story, the goal is always the same — they want you to copy some weird text, open something called PowerShell (basically a command box for your computer), paste the text in, and hit Enter. And just like that, you’ve unknowingly let the bad guys into your system.
Example of ClickFix
Do not under any circumstances do this
​When you do this, you’re actually running a hidden command that downloads malware onto your computer. That malware could do anything from stealing your saved passwords to spying on you or even taking over your whole PC. Some of the nasty programs being used include Lumma Stealer and DarkGate — basically, very bad news.

Early on, these scams mostly used fake "error" messages to scare people into clicking. Now they’re getting sneakier, pretending they’re helping you open a document or access a secured website. But at the end of the day, it’s the same attack every time. Once you recognize the pattern, you’re a lot harder to fool.

If you’re wondering whether this is something only government hackers use, the answer is no. While government-backed groups have tested ClickFix, they mostly moved back to their usual methods after playing around with it. Regular cybercriminals are the ones who are really running with this scam, aiming at everyday people like you and me.

The big red flag you need to remember is this: if anything — an error message, a registration prompt, a document login — tells you to copy some text, open PowerShell, paste it, and hit enter, it’s a scam. Full stop. Just close the window, shut down the app, or back out of whatever website you’re on. Reboot your computer if you want to be extra safe.

Once the malware is active, it can quietly steal your personal information and send it back to the hackers without you even realizing it. Some of it even hides its tracks by clearing out your clipboard or running in a way that’s harder to notice. It's sneaky by design, and it’s counting on you not paying attention.

What I'm saying is never, ever paste anything into PowerShell unless you personally know what it is and why you’re doing it. If a website, app, or random pop-up tries to get you to do it, it’s a scam — plain and simple.

Stay safe out there!
0 Comments

How to Tell If Something Is a Scam (And What to Do About It)

4/21/2025

0 Comments

 
Man looks at his phone in surprise and disgust
Scams are everywhere these days—emails, texts, phone calls, even pop-ups on your screen. Some are easy to spot, but others can be sneaky and convincing. If you’ve ever wondered, “Is this real?” you’re not alone. Here's how to tell when something’s fishy, and what to do if you think you’re being scammed.

They Want Urgent Action--Right Now
Scammers love pressure. If someone says you need to act immediately or something terrible will happen (like your account being shut down, or you’ll be arrested), take a breath. That’s a red flag. Real companies and government agencies don’t work like that.

They Ask for Personal Information
A bank will never call and ask for your Social Security number, password, or PIN. Neither will the IRS or Medicare. If someone’s asking for personal details out of the blue, it’s probably a scam.

The Message Is Full of Weird Grammar or Spelling Mistakes

A lot of scam messages are written quickly—or come from overseas. Look out for poor grammar, odd phrases, or strange-looking email addresses.

They Want Payment in Gift Cards, Crypto, or Wire Transfers
No real company will ever ask you to pay a bill in Amazon gift cards or Bitcoin. If someone says that’s the only way to pay, it’s a scam. Every time.

It Sounds Too Good to Be True
“You’ve won a prize!” “You’ve inherited a fortune!” If you didn’t enter a contest or have a rich uncle you’ve never heard of, don’t fall for it. Scammers bait people with fake windfalls, then ask for “fees” or “taxes” upfront.

Links or Attachments Look Suspicious
Never click a link or download an attachment from someone you don’t know—even if it looks official. Scammers often send fake messages that look like they’re from Amazon, your bank, or even a friend.

The Caller ID or Email Looks Official, But Something’s Off
Scammers can fake caller ID and email addresses to look like they’re from a real business or government agency. If you’re not sure, don’t respond—look up the company’s phone number or website yourself and contact them directly.

So, What Should You Do?
  • Stop and think. Don’t let anyone rush you.
  • Don’t share info. Hang up or delete the message.
  • Ask someone. If you’re not sure, ask a friend, family member, or local librarian.
  • Report it. You can report scams to the FTC at reportfraud.ftc.gov.
    ​
Scammers are clever, but you don’t have to fall for it. When in doubt, it’s totally okay to say, “I’m going to double-check this first.”

0 Comments

Locking Your Phone

4/17/2025

0 Comments

 
Picture
​Let’s talk about something most of us don’t think about until it’s too late: how you lock your phone. You’ve probably heard that using your fingerprint or face to unlock your device is fast and convenient—and it is. But when it comes to protecting your privacy using a password or PIN might actually be the safer bet.

Here’s the thing: the laws around phones and privacy are still catching up with the technology. The Fourth Amendment is supposed to protect you from unreasonable searches and seizures. That means the police can’t just go snooping through your stuff without a warrant. But phones are tricky. Courts have generally said that yes, your phone is protected and they usually need a warrant to search it. But what happens when they get that warrant, or think they don’t need one?

This is where the Fifth Amendment comes in—the one that says you can’t be forced to testify against yourself. Courts have decided that a password or PIN falls under that protection. It’s something you know, and you can’t be forced to give it up. But biometrics? Your fingerprint or face? That’s something you are. And legally, it’s more like handing over a key than giving up a secret. In many cases, police can make you use your face or finger to unlock your phone without it being considered "testifying."

So even though it’s easier to just glance at your phone to unlock it, that convenience could cost you if you ever end up in a legal situation. Whether you're a protester, journalist, or just someone who values your privacy, using a PIN or passcode adds a layer of protection that biometrics can’t. In the eyes of the law, knowing your code is very different from having a fingerprint.
​
Until the courts set clearer rules, the safest move is to stick with a good old-fashioned password. It might take a few extra seconds to type it in, but that small hassle could be what keeps your private life out of someone else's hands.
0 Comments

Passkeys - Leaving Passwords Behind

4/14/2025

0 Comments

 
Somebody is holding a phone to scan a computer screen
Let’s be real here—passwords are the worst. You’re supposed to make them long, complicated, and unique for every website, but who actually remembers all of that? So we reuse them, or write them down, or forget them entirely. That’s where passkeys come in, and they’re kind of a game-changer.

A passkey is a new, easier, and way more secure way to sign in to apps and websites. Instead of typing out a password, your phone or computer can log you in with something you already use—like your fingerprint, face, or device PIN (this one is best!). It’s still secure, but you don’t have to remember anything.

The cool part is that passkeys are way harder for hackers to steal. With passwords, someone can trick you into typing them on a fake site or grab them in a data breach. Passkeys don’t work like that. They’re tied to your device and your identity, and they never leave your phone or computer. So even if a company gets hacked, your passkey can’t be stolen.

Basically, tech companies are pushing passkeys because they’re safer, simpler, and a whole lot less annoying than passwords. And don’t worry—if you’ve ever used Face ID or a fingerprint to unlock your phone, you’ve already got the hang of it.
0 Comments

Choosing a Smartphone

4/10/2025

0 Comments

 
a closeup of a phone screen
​Picking out a new smartphone can feel overwhelming with so many choices, brands, and plans to navigate. But it really boils down to figuring out what matters most to you—without overpaying for features you'll never use.

First things first: think about how you actually use your phone. Are you snapping a million photos, streaming Netflix constantly, or just sending texts and occasionally checking social media? If you're into photography or videos, something like an iPhone or a higher-end Samsung Galaxy might be worth the investment. On the other hand, if you're just texting your family or making calls, a more affordable phone from Motorola or Google Pixel's budget lines will do just fine.

Considering your available providers is always important. Around here, you've got Verizon, US Cellular, T-Mobile, and Cricket. Verizon's coverage is rock-solid almost everywhere you go, especially handy if you're traveling outside city limits often. But they do tend to charge premium prices for their reliability. US Cellular offers good regional coverage and more personal customer service, but their national coverage can be spotty if you're frequently on the move. T-Mobile gives you a nice balance: generally lower prices, decent nationwide coverage, and great perks like streaming bundles. Cricket, owned by AT&T, usually has attractive plans without too many strings attached, perfect if you're budget-conscious but still want good coverage.

Then there’s the option of something like Tracfone, which can save you a ton of cash if you're not constantly glued to your phone. The upside? No contracts, cheap prepaid plans, and a lot of flexibility. The downside? Customer support can be tough to non-existent, and data can run out quickly if you're streaming a lot. Plus, if you're someone who loves to upgrade your phone frequently or relies heavily on fast mobile data, a prepaid service might feel restrictive.

In the end, choose a phone and plan based on your real-life habits—not just what's trendy. Match that to a provider that aligns with your budget and lifestyle, and you'll end up happier in the long run.

0 Comments

    Aimee Clark

    Hi there! I’m the IT Librarian at the Spencer Public Library. Welcome to the Tech Corner, where I’ll be diving into all the excitement — and headaches — from the ever-changing world of tech!

    Need Tech Help?
    ​Click Here


    Quickstart Guides

    Archives

    April 2025
    March 2025
    February 2025
    January 2025
    November 2024

    Categories

    All
    2FA
    AI
    Android
    Biometrics
    Cell Phone
    ClickFix
    Cybersecurity
    Data Breach
    Device Security
    Discontinued Products
    Discontinued Services
    Face ID
    Fingerprint
    How To Deal With Scams
    IPhone
    Passkeys
    Passwords
    Phishing
    Ransomware
    Scams
    Security
    Signal
    Smartphone
    Stalkerware
    Two-Factor Authentication
    VPN

    RSS Feed

Location

    Question or Comment?
    ​Send us a message!

Submit

Check us out on social media!

Facebook Icon
Instagram Icon
TikTok Icon
Youtube Icon
Tumblr Icon
  • Home
  • Search Our Catalog
  • Library of Things
  • Calendar
  • About Us
    • Staff and Board
    • Policies
  • Services
    • Youth Services
    • Adults
      • Adult Services News
    • Interlibrary Loan
    • Home Delivery Service
    • Meeting Rooms
    • Blood Pressure Monitors
    • Mobile Hotspots
    • Mobile Print
    • Notary Public
    • Little Free Pantry
    • Genealogy Help
    • Newsletter
    • Audiolab
    • Tech Help
      • Quickstart Guides
        • Catalog Tips and Tricks
  • eBooks & Audiobooks
  • Online Resources
  • Do Research
    • Iowa Lakes Genealogy Society
  • Summer Reading Program
    • RPG Camp
  • Staff Picks
  • Beanstack Reading Challenges
  • Tech Corner
  • Dewey the Library Cat
    • Dewey's Job Description
    • Dewey Merch
    • Dewey's Rules