Fake Tech Support Claims To Be From Your ISP

We have all received a fake tech support call from someone claiming to be a Microsoft employee.  Now there is a new twist on the scam involving a fake screen pop-up and tech support fakers who claim to be from your Internet service provider.  Google has an extensive collection of fake tech support pop-ups, these are all fake.  Take a look.

We have reported on this issue several times in this blog.  Like here and here and ...

Continue Reading →
0

Mac Users Targeted By Cyber-Attackers

applelogoThe Apple OSX platform has long held the cache of being invulnerable to attack.  Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012.  The reason for this, as explored in a recent article on SiliconBeat, is that Apple users tend to have more disposable income.  If you willingly pay more to have “the best” or ...

Continue Reading →
0

Your Smartphone and Tablet Need Security Too

phone-thiefMobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing ...

Continue Reading →
0

Does Your Computer Have A Malware Infection? – Part 2

malwareOn Wednesday we looked at the obvious, visual symptoms of a malware infection.  Today we will explore some changes in performance that can indicate that your computer is infected.

Performance Symptoms

Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.

  • Constantly Flashing Hard Drive Light – If the hard drive activity light is ...
Continue Reading →
0

Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I ...
Continue Reading →
0

How Did They Take Over My Computer?

Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails.  Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal marketplaces.  Or sometimes you are tricked into giving them up on clever fake websites.  Phishing is one way that credentials are stolen.  The links in phishing emails often will direct the unwary user to the fake web page with the helpful web ...

Continue Reading →
0

The Growing Threat of Ransomware

The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes.  These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key.  I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.

ransomeware-infographic Continue Reading →

0

Google Says: Bet You Can’t Hack A Chromebook

google-logoWe have been recommending the Google Chromebook to our clients for use as a dedicated online banking system.  The reason we like this platform even more than a Linux LiveCD boot disk is that because the Chrome operating system simply supports the operation of the notebook itself, and the Chrome browser.  That’s it.  There is not a way to install any programs to ...

Continue Reading →
0

Windows Defender Gets Muscles

Windows10Tired of cyber-creeps kicking sand in your face at the virtual beach?  Microsoft wants to pump you up!!.  Businesses using the Enterprise version of Windows 10 will have the option of using Microsoft’s new enhanced Windows Defender Advanced Threat Protection.  In addition to providing end point security through Windows Defender, Defender ATP will connect with a cloud services based SIEM (security Information and Event Management) that will provide more ...

Continue Reading →
0
Page 11 of 13 «...910111213