Email Red Flags
Received an email that looks suspicious, but you’re not quite sure?
Does it fall under any of the ‘flags’ in our “Email Red Flags“?
If so, Delete It Immediately. Do NOT open any attachments.
Technology news, reviews, and how to keep your technology running fast and smooth!
Victims receive a fake text from their ‘bank’ on their cell phone, stating there is a problem with their account. The text urges them to call a number in their own area code. When they dial the number provided, they receive the following automated message:
“Thank you for calling [name of bank]. A text message has been sent to inform you that your debit card has been limited due to a security issue. To reactivate, please press 1 now.” After pressing 1, the caller is prompted to enter the last 4 digits of their Social Security number, then the full card number and expiration date.
This is a mix of scams, known as “SMiShing” – phishing attacks sent via SMS text message – and voice phishing aka “vishing”, where people are directed to call a number that answers with a voice prompt, spoofing their bank and instructing the caller to enter confidential data.
Security researchers at Invincea have discovered a new Russian ransomware strain called “Fessleak” which delivers its code straight into system memory and does not drop any files on disk.
The Cybercriminal setup a short-lived burner domain (disposable domain) directing to a landing page where the exploit kit (malware infector) is hosted. Then they post a legitimately paid-for ad on legitimate major sites such as HuffingtonPost, Answers.com, Thesaurus.com, and Match.com.
The ad is usually similar to “Granny opening a new iPhone video”.
You are then presented with a full screen image that announces all personal or business files, photos, and videos have been ecrypted and to get them back you need to pay a ransom in Bitcoin.
Invincea states:
“We continue to see new innovations in ransomware. More advanced versions use file-less infections, and communicate via the TOR network…they are also able to check to ensure the host is not running on a virtual machine to frustrate security researchers and analysis.
At this time, there is no detection for the malicious code, which rotates its hash value to avoid Anti-Virus detection.“
A lot of this is confusion over how batteries used to work, not how they work today. Luckily, most or all of your gadgets today run on Lithium Ion batteries, which are easy to take care of.
The short answer – – Charging incorrectly can decrease their lifespan. Most lithium batteries should last you a few years, and batteries have a finite life, no matter what, so your efforts will only help to extend the life so much. However, improper care can decrease that lifespan, meaning your battery will be unable to hold a charge – or unable to hold as big a charge as it used to – quicker.
Here’s some guidelines to help to extend your battery’s health as much as possible:
If you follow these tips, your battery should last.
TechTips Newsletter is published monthly, full of technology news and information (and other stuff!). If you’re not a Geek, not to worry, there’s tons of information for non-Geeks too!:
This and much more! You don’t want to miss this issue!
Get your newsletter HERE!
Comments? Let me know what you think at marketing@tbyd.ca
Regular weekly ALERTS on the latest security threats to your computer network
Check out the ALERTS here.
Do you have a question for our Resident Geek? Email it to: geek@tbyd.ca!
An urgent security warning for businesses running Windows XP, Office 2003, and Microsoft Windows Server 2003!
Windows XP and Office 2003 are no longer supported by the manufacturer.
Server 2003 will no longer be supported by the manufacturer after April 2015.
If your business or organization is currently running Windows XP, Office 2003, Microsoft Server 2003, or Exchange 2003 on any computers or servers in your office, you need to know about a dangerous security threat that must be addressed NOW!
As your local Microsoft Partner, we are aggressively reaching out to all local businesses that use any of these programs to alert you to this serious security risk and inform you about what you need to do NOW to protect your company or organization!
WINDOWS XP AND OFFICE 2003 REPLACEMENTS MUST BE MADE NOW
WINDOWS SERVER 2003 AND EXCHANGE 2003 REPLACEMENTS MUST BE MADE BY JULY 14, 2015
Microsoft has officially announced that it retired all support for Windows XP and Office 2003 April 2014, and on the Server 2003 operating system on July 14, 2015.
This means any business or organization still running any of these programs will be completely exposed to serious hacker attacks, aimed at taking control of your network, stealing data, crashing your system, and inflicting a host of other business-crippling problems you do NOT want to deal with.
This is such a serious threat that the U.S. Department of Homeland Security has issued an official warning to all companies still running these programs, because firewalls and antivirus software will NOT be sufficient to completely protect your business from malicious attacks or data-exfiltration. Running some of these programs will also put many organizations out of compliance.
Scammers are attacking people with LinkedIn accounts using phishing emails.
These emails claim to be a LinkedIn Tech Support message. In these fake emails, they state that “irregular activities” are happening on your LinkedIn account, which require a mandatory security update of your account.
They then ask you to fill out an attached HTML form, which is a spoofed LinkedIn page. The form you fill out does not log you into the LinkedIn site. Instead, the information you just filled out gets sent to CyberCriminals who then hijack your account.
Note: Spelling and grammar mistakes are a huge Red Flag with scam emails.
The scam email looks similar to this:
As I said earlier, this is an old scam, but CyberCriminals keep using it because it keeps working.
If your CD/DVD drive stops reading disks, the 1st thing to check is another disc. If it’s still not reading them, ensure that you are caring properly for your discs. CD/DVDs are affected by excessive heat, scratches, bending, or twisting.
This will uninstall, then reinstall the drive.
If this does not correct the problem, you will need to bring your computer in to have it correctly diagnosed.
The email has a subject line such as
“Alert: There is a child predator living near you! This information is based on your local area zip code.”
But you don’t remember signing up for such a service (Red Flag!)
When you open the email, it ‘warns’ you that a predator has moved into your area and it provides a link to click on for more information. If you click on the link, you are re-directed through several sites to land on the “Kids Live Safe” website, which is a service that sells localized reports on sex offenders. They just send you there to try to look credible, and to distract you from the fact that your computer is now infected with malware that will steal your passwords, credit information, everything from your passwords up to and including your identity.
The FBI states “Victims may also first receive “phishing” e-mails requesting additional details of the business or individuals being targeting (name, travel dates, etc.). Some victims reported being a victim of various scareware or ransomware cyber intrusions immediately preceding a BEC scam request.”
The intial phishing emails and/or ransomware attacks are used to drop keyloggers and trojans on the workstations of an employee. With these credentials, they tunnel into the network and put keyloggers on C-level executive workstations. After studying the traffic, the cybercriminal craft an email that is carefully and artfully spoofed, to look as legit as possible.
Your C-level executive receives a business email from an existing, well-known vendor who requests a wire transfer to a specific bank account. The email looks legit, and it comes from a known, trusted business associate, and is about a recent delivery or transaction.
The wire transfers rapidly get forwarded and transferred several times, usually ending up in Hong Kong banks (Chinese Cyber mafia).
I admit it. I get lazy sometimes. You’re logging onto a new site, and it asks you to create a password. ANOTHER ONE! I have so many passwords it’s not funny anymore. Not at all. I feel the urge to rebel and punch in “1 2 3 4 5”.
But I resist. Because I know that’s one of the most used, and worst passwords. AND most likely one of the 1st ones that hackers will try.
When hacking into a personal computer, Cyber Criminals usually don’t have to break a sweat trying to guess our “clever” password, that’s so secretive no one will ever guess it!
Here is the complete list from SplashData’s Annual “Worst Passwords” List. This list was compiled from a list of 3.3 million leaked passwords. Superheros and fantasy sports entered the list for the first time. However, some of the top ones have staying power – “123456” and “password” have occupied the top 2 spots for the past 4 years.
This list shows that many people continue to put themselves at risk by using weak, easily guessable passwords.
“Passwords based on simple patterns on your keyboard remain popular despite how weak they are,” says Morgan Slain, CEO of SplashData. “Any password using numbers alone should be avoided, especially sequences. As more websites require stronger passwords or combinations of letters and numbers, longer keyboard patterns are becoming common passwords, and they are still not secure.”
Tips from SplashData: