email
Get the newsletter
Newsletter
search
Search blog
April 10, 2025 • read

Technology Tips: April 2025 Edition

Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

The scams start coming and they don't stop coming.

Have you noticed? Smishing attempts have been ruthless lately. Keep on the lookout for texts with an urgent or threatening tone, like this one about paying fake toll fees. Notice how this text also includes a link – clicking on it (or copy & pasting) could lead to malware. When in doubt, visit the state websites of places you’ve visited lately to see if you owe any fees.  

toll smishing


Safari’s intelligent tracking prevention  

If you use Safari, you may have noticed this Privacy Report feature. It feels a bit jarring, but it is helpful to know that there are browsers actively working for your best interest.

Intelligent Tracking Prevention (ITP) limits cross-site tracking and cookies (think of ads popping up after you visit an online store). While marketers may hate this feature, it keeps your browsing history private. This could mean more money in your wallet by deterring those highly specific ads. 

safari privacy


Brush up on your mobile malware knowledge  

While hackers are still targeting corporations and businesses, they are preying on individuals now more than ever. Many people are continuing to work from home using their own personal devices, which can be a big security threat. Here’s how bad actors exploit mobile and personal devices: 
 
Remote Access Tools (RATs): RATs can steal a lot of data. When a device gets infected, hackers can access call history, web browsing history, and GPS coordinates. They can also enable the device’s camera and send SMS messages. 
 
Advertising click fraud: This form of malware allows a hacker to generate ad revenue through fake clicks. 
 
Polymorphic malware: When it infects a file, part of the malware mutates to make it difficult to detect (yikes!). This unfortunately makes antivirus scans unreliable. 
 
Keyloggers: Like the name suggests, this type of malware records your keystrokes to capture important passwords and login credentials. 
 
Jailbreaking and rooting: If you root an Android device or jailbreak an Apple device, it loses all manufacturer security protections. 


Malware of the month 

Wanted by the FBI: Cyber espionage group Aquatic Panda 

China-linked group Aquatic Panda, who are employees of Chinese tech company i-Soon, has been causing mayhem for years. They’ve been charged with computer and wire fraud among governments, religious charities, and think tanks across the United States, France, Türkiye, Thailand, Hungary, and Taiwan. Their actions took place during January–October of 2022 and officials are now finding evidence.  

The Diplomatic Security Service’s Rewards for Justice Program is offering up to $10 million for information.  




 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Qmlativ Spotlight: Travel Reimbursements Just Got Easier

Most of us haven’t found a way to teleport yet. That means it takes time and money to move from one place to the next. If your district has employees splitting time between buildings, reimbursing their travel just got a whole lot easier.

January 07, 2025 • Tips
Prepare Your Summer Payrolls

Those summer nights are getting closer and closer… Wouldn’t it be nice not to have to worry about teacher payrolls over summer? Find out how to finish up summer payrolls before school's out.

May 25, 2018 • Tips
Technology Tips: February 2016 Edition

The Tech Tips series is designed to help you stay safe, increase productivity, and build your digital literacy. Check out this month's article for information on how to properly position wireless antennae, what to do if a device is slow to charge or will not charge, a free online fax service, and the featured Malware of the Month.

February 02, 2016 • Tips

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.