Bing Bans Online Tech Support Ads

call center_sI am always mystified when clients of mine fall for fake tech support phone calls or browser pop-ups.  Didn’t their Mom tell them not to talk to strangers?  After all, they are my clients, shouldn’t they be calling me FIRST?

Naked Security reported on May 13th that Microsoft’s search service, Bing, will no longer accept advertising for online tech support companies.  This is good news for everyone except the legitimate computer support ...

Continue Reading →
0

Does Your Computer Have A Malware Infection? – Part 2

malwareOn Wednesday we looked at the obvious, visual symptoms of a malware infection.  Today we will explore some changes in performance that can indicate that your computer is infected.

Performance Symptoms

Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.

  • Constantly Flashing Hard Drive Light – If the hard drive activity light is ...
Continue Reading →
0

Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I ...
Continue Reading →
0

Important Alert for Lenovo Owners

Lenovo-logoA rare Tuesday post, but this is too important to wait.  If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application.  A recent security advisory from Lenovo reveals that the Accelerator application can allow an attacker to access Lenovo computers

“A vulnerability was identified in the Lenovo Accelerator Application software which could lead to exploitation by an attacker ...

Continue Reading →
0

How Did They Take Over My Computer?

Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails.  Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal marketplaces.  Or sometimes you are tricked into giving them up on clever fake websites.  Phishing is one way that credentials are stolen.  The links in phishing emails often will direct the unwary user to the fake web page with the helpful web ...

Continue Reading →
0

Learning Linux

linux-logoAlthough my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part.  Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994.  I do have an iMac in my current computer collection.  But lately I have been playing around more and more in the Linux platform, both Ubuntu ...

Continue Reading →
0

Typographical Errors Can Have Surprising Results

typosquattingThis is not a gripe about Spell-Check, although I am driven mad when my phone tries to “correct” the spelling of something I spelled correctly.  Sometimes I get really funny and/or embarrassing results.

Speaking of embarrassing, have you ever mis-typed a domain name and ended up at a porn site?  And caught a virus?  (The computer equivalent of an STD?) This is the result of something called “typo-squatting.”  Individuals will ...

Continue Reading →
0

The Growing Threat of Ransomware

The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes.  These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key.  I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.

ransomeware-infographic Continue Reading →

0

Was Your Email Password Stolen?

Email_thumb2One of the very worst breaches that can happen to you is for an attacker to be able to access your email account.  If someone else can access your email, and read the messages you send and receive, and access your contact list and calendar, then they can learn many personal details about you that would make it easier to steal your identity, access other web accounts using the password reset ...

Continue Reading →
0
Page 49 of 61 «...2030404748495051...»