email
Get the newsletter
Newsletter
search
Search blog
May 19, 2025 • read

Technology Tips: May 2025 Edition

Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

Scamwatch Summer 2025

Colleagues and cousins getting a little sick of your security tips?

Luckily, the American Bankers Association and Bank of America are also hip to the hacker games. They’ve put together a resource for speaking with loved ones of all ages and a link to a phishing/smishing quiz to test your security spidey senses.

Visit the Bank of America security center.

Note: When in doubt, go right to the American Bankers Association for the quiz.
 


Juice jacking ft. O.MG cable  

We’ve covered “juice jacking” (when bad actors plant malicious software via public charging stations), but now for the low, low price of a couple Benjamins any kid can become a baby hacker with the O.MG cable.

Marketed as a tool to help orgs test their security, the cable comes custom-built with all kinds of hacky doohickeys—think keylogger, stealth features, WiFi control, even self-destruct to wipe the cable after using it.

Not only is the cable an interesting lesson for IT pros, but it’s another threat in the Wild West of K12 information security. (Hey, if they’re lighting Chromebooks ablaze, where’s the limit?)
 


Fake jobs or sales from phony LinkedIn recruiters  

‘Tis the season for job hunting and hopping, and hackers know it.

If that new position sounds just too good to be true, it probably is. But did you know that cool sales guy who reached out might just be a fake profile, too?

Tips for spotting fake profiles include:
  • AI headshots: look for missing or extra features and jewelry, over-airbrushed complexions, and lots of smoothness instead of our natural angles and wrinkles
  • A strangely generic job history and profile
  • Asking for any personal information
  • Receiving the same message from different profiles, copied and pasted
 


Malware of the month: Fake CAPTCHA captures students' machines 

Pro tip for students and staff: Verification shouldn’t require running script commands. 🚩

Unfortunately, thanks to a combo of recognizable visual design and some smooth step-by-step instructions, bad actors conned a bunch of students into a “ClickFix” attack. Here’s how it works:
  1. Hack a popular student response clicker site to display a fake CAPTCHA
  2. Embed malicious scripts in the CAPTCHA
  3. Add a bogus set of “verification steps” that were really steps to run the malware on the machine
You can read all the gory details and learn how to protect your students from similar threats at BleepingComputer.

 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Once Upon An iCon: A Learning Story

Once upon an iCon, 323 educators traveled to iCon, the greatest international conference in the land. Find out what happened next!

April 01, 2019 • Events
Built Not Bought: The Skyward Difference

At Skyward, we are proud to say we build 100% of our software. But we can't make the best products without your help! 

June 23, 2022 • Product Updates
Technology Tips: April 2025 Edition

Prevention is the best cure! Learn about mobile malware types, see how your Safari browser is keeping you safe, and watch out for phony texts! Plus, don't miss the malware of the month.

April 10, 2025 • Tips

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.