Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Email Red Flags

February 12, 2015 by The T By D Team Leave a Comment

HERE

Email Red Flags

 

Received an email that looks suspicious, but you’re not quite sure?
 Does it fall under any of the ‘flags’ in our “Email Red Flags“?

 

If so, Delete It Immediately.  Do NOT open any attachments.

 

 

Got A Bug In Your System?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS

ALERT: Bank Phishing Attack Using SMS Text Messaging

February 10, 2015 by The T By D Team Leave a Comment

ALERT:  Bank Phishing Attack Using SMS Text Messaging

Smishing

Victims receive a fake text from their ‘bank’ on their cell phone, stating there is a problem with their account.  The text urges them to call a number in their own area code.  When they dial the number provided, they receive the following automated message:

“Thank you for calling [name of bank].  A text message has been sent to inform you that your debit card has been limited due to a security issue.  To reactivate, please press 1 now.”  After pressing 1, the caller is prompted to enter the last 4 digits of their Social Security number, then the full card number and expiration date.

 

This is a mix of scams, known as “SMiShing” – phishing attacks sent via SMS text message – and voice phishing aka “vishing”, where people are directed to call a number that answers with a voice prompt, spoofing their bank and instructing the caller to enter confidential data.

NEVER call your bank from a number in a text or email.  
Always double-check the phone number from your bank’s website.  

 

Security Issues?

Call 1-204-800-3166

For Cyber-Fortress Security!

Filed Under: ALERTS, Featured

ALERT: New Ransomware Strain Encrypts Files From RAM

February 10, 2015 by The T By D Team Leave a Comment

Fessleak3

ALERT:  New Ransomware Strain Encrypts Files From RAM

 

Security researchers at Invincea have discovered a new Russian ransomware strain called “Fessleak” which delivers its code straight into system memory and does not drop any files on disk.

This means that almost all antivirus software is not able to catch this malicious malware.
The infection is spread through malicious ads on popular websites.  

The Cybercriminal setup a short-lived burner domain (disposable domain) directing to a landing page where the exploit kit (malware infector) is hosted.  Then they post a legitimately paid-for ad on legitimate major sites such as HuffingtonPost, Answers.com, Thesaurus.com, and Match.com.

The ad is usually similar to “Granny opening a new iPhone video”.

When you click on the link, you are redirected to the malicious domain, which infects your workstation.

You are then presented with a full screen image that announces all personal or business files, photos, and videos have been ecrypted and to get them back you need to pay a ransom in Bitcoin.

Invincea states:

“We continue to see new innovations in ransomware.  More advanced versions use file-less infections, and communicate via the TOR network…they are also able to check to ensure the host is not running on a virtual machine to frustrate security researchers and analysis.  

At this time, there is no detection for the malicious code, which rotates its hash value to avoid Anti-Virus detection.“
How do you pre-plan for a possible attack?
  1. BACK UPS!   All malware and virus effects can be prevented by having all important data backed up.  Take a weekly copy off-site.
  2. Keep your attack surface as small as possible, and religiously keep all OS and third-party patches up-to-date.  All our monthly service plans do this automatically.
  3. Disable Flash in your browser, or at least set Flash to Click to Play.  This way, you can activate only the ads or videos using Flash that you want to see, and the others will remain disabled.
  4. Run a multi-layer security system, block ads centrally rather than machine by machine.  If that’s not possible, AdBlocker plugins for each browser.
  5. It is increasingly clear that effective security awareness training is a must.  End users need to be on their toes, and need to keep security in mind at all times.

Cyber-Security Issues?

Call 1-204-800-3166

For Cyber-Fortress Security

Filed Under: FAQ, Featured

Keeping Laptop Batteries In Good Health

February 9, 2015 by The T By D Team Leave a Comment

Batteries – To Drain Or Not To Drain…

Laptop Battery

 

Everyone, from your neighbor to your great-aunt’s dog-walker’s niece, has their opinion on this.  Some say to drain it completely before re-charging, some say that you should keep it between 40% and 80% at all times.

But which is the truth?

 

A lot of this is confusion over how batteries used to work, not how they work today.  Luckily, most or all of your gadgets today run on Lithium Ion batteries, which are easy to take care of.

The short answer – – Charging incorrectly can decrease their lifespan.  Most lithium batteries should last you a few years, and batteries have a finite life, no matter what, so your efforts will only help to extend the life so much.  However, improper care can decrease that lifespan, meaning your battery will be unable to hold a charge – or unable to hold as big a charge as it used to – quicker.

Here’s some guidelines to help to extend your battery’s health as much as possible:

  1. Perform shallow discharges.  Instead of discharging to 0% all the time, lithium ion batteries do best when you discharge them for a little bit, then charge them for a little bit.  Discharges to 50% are better for your battery’s long-term life then small discharges to 90% or large discharges to 0%.
  2. Don’t leave it fully charged.  Lithium ion batteries don’t need to be charged 100%.  In fact, they prefer not to be.  So the 40%-80% rule is a good guideline.  When possible, keep it in that range to prolong its life as long as you can.  And if you do charge it 100% – don’t leave it plugged in.  If you charge it overnight, use something like the Belkin Conserve Socket to stop it from charging after it’s full.
  3. Fully discharge it once a month.  While lithium ion batteries shouldn’t be discharged 100% regularly, most modern batteries are what’s called “smart batteries”, which means that they can tell you how long you have until your battery dies.  This feature can get mis-calibrated after a lot of shallow discharges.  Manufacturers recommend fully discharging your battery once a month to make sure this stays accurate.
  4. Keep it cool.  Excess heat is not only bad for your processor, but your battery as well.  A hot battery will degrade in health much quicker than a cool one.  For this reason, we highly recommend not using your laptop on a soft surface like a bed or your lap (does not allow for sufficient air intake), and we highly recommend using a laptop stand with cooling fans built-in.

If you follow these tips, your battery should last.

Computer problems?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

February Newsletter

February 5, 2015 by The T By D Team Leave a Comment

Police Dash-Cam Confessionals!

FEBRUARY 2015 TECHTIPS NEWSLETTER

TechTips Newsletter is published monthly, full of technology news and information (and other stuff!).  If you’re not a Geek, not to worry, there’s tons of information for non-Geeks too!:

  • Police dash-cam confessionals!
  • How you can make money off Youtube videos too!
  • CyberCriminals makes software more user-friendly!
  • A Canadian-made hitchhiking robot treks through Germany!
  • Famous Star Wars mis-quotes!
  • How to overeat…in style!
  • Internet cafe deaths go unnoticed for days!
  • AND MORE!

This and much more!  You don’t want to miss this issue!

Get your newsletter HERE!

Comments?  Let me know what you think at marketing@tbyd.ca


Keep Up-To-Date on the Latest Threats To Your Computer Network!

Regular weekly ALERTS on the latest security threats to your computer network

Check out the ALERTS here.

Do you have a question for our Resident Geek?  Email it to:  geek@tbyd.ca!

Like us on Facebook!

Follow us on Twitter!


EXPIRATION NOTICE:

An urgent security warning for businesses running Windows XP, Office 2003, and Microsoft Windows Server 2003!

Windows XP and Office 2003 are no longer supported by the manufacturer.

Server 2003 will no longer be supported by the manufacturer after April 2015.

If your business or organization is currently running Windows XP, Office 2003, Microsoft Server 2003, or Exchange 2003 on any computers or servers in your office, you need to know about a dangerous security threat that must be addressed NOW!

PLEASE TAKE A MOMENT TO READ THIS IMPORTANT SECURITY ANNOUNCEMENT!

As your local Microsoft Partner, we are aggressively reaching out to all local businesses that use any of these programs to alert you to this serious security risk and inform you about what you need to do NOW to protect your company or organization!

WINDOWS XP AND OFFICE 2003 REPLACEMENTS MUST BE MADE NOW

WINDOWS SERVER 2003 AND EXCHANGE 2003 REPLACEMENTS MUST BE MADE BY JULY 14, 2015

Microsoft has officially announced that it retired all support for Windows XP and Office 2003 April 2014, and on the Server 2003 operating system on July 14, 2015.

This means any business or organization still running any of these programs will be completely exposed to serious hacker attacks, aimed at taking control of your network, stealing data, crashing your system, and inflicting a host of other business-crippling problems you do NOT want to deal with.

This is such a serious threat that the U.S. Department of Homeland Security has issued an official warning to all companies still running these programs, because firewalls and antivirus software will NOT be sufficient to completely protect your business from malicious attacks or data-exfiltration.  Running some of these programs will also put many organizations out of compliance.

CALL 1-204-800-3166

for a FREE QUOTE

Filed Under: Featured, TechTips Newsletter

ALERT: Old Phishing Tricks For New Victims

February 5, 2015 by The T By D Team Leave a Comment

LinkedIn

ALERT:  Old Phishing Tricks For New Victims

 

CyberCriminals are using old phishing tricks to find new victims.
Unfortunately, this phishing scam still works.

Scammers are attacking people with LinkedIn accounts using phishing emails.

These emails claim to be a LinkedIn Tech Support message.  In these fake emails, they state that “irregular activities” are happening on your LinkedIn account, which require a mandatory security update of your account.

They then ask you to fill out an attached HTML form, which is a spoofed LinkedIn page.  The form you fill out does not log you into the LinkedIn site.  Instead, the information you just filled out gets sent to CyberCriminals who then hijack your account.

An easy way to recognize this as a scam, is that the email uses a lowercase “i” instead of a capitol “I” when spelling “LinkedIn”.

Note:  Spelling and grammar mistakes are a huge Red Flag with scam emails.

The scam email looks similar to this:

linkedin-email-scam

 

 

 

 

As I said earlier, this is an old scam, but CyberCriminals keep using it because it keeps working.

The only way to stop phishing attacks, is to create a “human firewall” that is educated about these tricks.
Do your part.  Tell others about these ALERTS!

 

Got Malware?

Call 1-204-800-3166

To Get Your Computer CYBER-EXTERMINATED!

Have you been affected by this email scam?  Tell us your experience below!

Filed Under: ALERTS, Featured

CD/DVD Drive Not Reading Discs

February 2, 2015 by The T By D Team Leave a Comment

CD DriveCD/DVD Drive

Not Reading Discs?

 

If your CD/DVD drive stops reading disks, the 1st thing to check is another disc.  If it’s still not reading them, ensure that you are caring properly for your discs.  CD/DVDs are affected by excessive heat, scratches, bending, or twisting.

 

The following steps will help you properly care for your disks:

  1. When removing a disc from a hard protective case (a “jewel” case), push down on the centre hub, then remove the disc by handling only the outer edges of the disc.  Never remove a disc by prying upwards on the outer edges.
  2. Make sure when you place a disc into the drive, that it is placed properly into the drive.  If it is not properly seated, when the drive’s carriage is closed it will bind up on the disc and possibly gouge or scratch the disc.
  3. The single-sided disc is inserted into the drive with the title/artwork facing upwards.
  4. Keep your discs away from extreme heat.  Never store a disc in direct sunlight, such as on the dashboard of your car.
  5. Clean your discs with a soft cloth slightly dampened with water.  Never use any abrasive materials on the disc.  When wiping, use straight-line strokes, from the inner circle to the outer edges of the disc.  Never wipe in a circular motion.  Be sure that the CD/DVD is completely dry before returning it to its protective case, or inserting it into the drive.
  6. Do not stack discs on top of one another.  Store them in their protective cases.

If the problem is not with the disc itself, try the following steps:

  1. Go to “Start”.  Right click on “My Computer”, then “Properties”, “Hardware” tab, “Device Manager”, “DVD/CD-ROM Drives”.
  2. Right click on the correct drive, and select “Uninstall” from the menu.
  3. Restart your computer.

This will uninstall, then reinstall the drive.

If this does not correct the problem, you will need to bring your computer in to have it correctly diagnosed.

Got Computer Gremlins?

Call 1-204-800-3166

Get Gremlin-Free!

Filed Under: FAQ, Featured

ALERT: Child Predator Phishing Scam

January 30, 2015 by The T By D Team Leave a Comment

images

Just when you think CyberCriminals can’t sink any lower…they prove you wrong.

 

The new phishing scam preys on a parent’s fear for their child.  

 

The scam email looks like a warning for parents about a child predator that moved into their neighborhood.

The email has a subject line such as

“Alert:  There is a child predator living near you!  This information is based on your local area zip code.”

But you don’t remember signing up for such a service (Red Flag!)

When you open the email, it ‘warns’ you that a predator has moved into your area and it provides a link to click on for more information.  If you click on the link, you are re-directed through several sites to land on the “Kids Live Safe” website, which is a service that sells localized reports on sex offenders.  They just send you there to try to look credible, and to distract you from the fact that your computer is now infected with malware that will steal your passwords, credit information, everything from your passwords up to and including your identity.

The email looks similar to this:

pred-scam

 If your computer is infected with malmare, bugs, or other annoying critters,

Call 1-204-800-3166

For A Cyber-Extermination!

Filed Under: ALERTS, Featured

ALERT: FBI Warns About “Business Email Compromise”

January 28, 2015 by The T By D Team 1 Comment

FBI LogoThe FBI and Internet Crime Complaint Enter is warning about a new global email scam that is targeting companies working with foreign suppliers and/or businesses that regularly perform wire transfer payments.  Please send these people in your company a link to this blog post.  Up until December 1, 2014, this email had scammed over 2100 victims worldwide, with a total loss of over 214 million dollars.  The FBI is confident this amount will continue to increase.

 

The FBI calls it the

“Business Email Compromise” (BEC)

The FBI states “Victims may also first receive “phishing” e-mails requesting additional details of the business or individuals being targeting (name, travel dates, etc.).  Some victims reported being a victim of various scareware or ransomware cyber intrusions immediately preceding a BEC scam request.”

The intial phishing emails and/or ransomware attacks are used to drop keyloggers and trojans on the workstations of an employee.  With these credentials, they tunnel into the network and put keyloggers on C-level executive workstations.  After studying the traffic, the cybercriminal craft an email that is carefully and artfully spoofed, to look as legit as possible.

Your C-level executive receives a business email from an existing, well-known vendor who requests a wire transfer to a specific bank account.  The email looks legit, and it comes from a known, trusted business associate, and is about a recent delivery or transaction.

The wire transfers rapidly get forwarded and transferred several times, usually ending up in  Hong Kong banks (Chinese Cyber mafia).

There are 3 different versions of this scam, targeting different businesses, but the characteristics are the same:
  • Businesses and personnel using open source email are most targeted.
  • Individuals responsible for handling wire transfers within a specific business are targeted.
  • Spoofed e-mails very closely mimic a legitimate email request.
  • Hacked e-mails often occur with a personal email account.
  • Fraudulent email requests for a wire transfer are well-worded, specific to the business being victimized, and do not raise suspicious to the legitimacy of the request.
  • The phrases “code to admin expenses” or “urgent wire transfer” were reported by victims in some of the fraudulent email requests.
  • The amount of the fraudulent wire transfer request is business specific; therefore, dollar amounts requested are similar to normal business transaction amounts so as to not raise doubt.
  • Fraudulent emails received have coincided with business travel dates for executive whose emails were spoofed.
  • Victims report that IP addresses frequently trace back to free domain registrars.
How Do You Prevent CyberCriminals from Accessing Your Network?
  1.  Alert executives to this scam.
  2. Most of these scams start the same way – “phishing“ emails.  Make sure you (and your coworkers, colleagues, employees, etc) don’t click on any suspicious emails.
  3. Read the IC3 Alert in full, and apply their Suggestions For Protection.

 

Bugged by viruses, malware, ransomware?

Call 1-204-800-3166

For A Cyber-Extermination!

 

Filed Under: ALERTS, Featured

Worst (And Most Popular) Passwords of 2014

January 26, 2015 by The T By D Team Leave a Comment

password incorrect

I admit it.  I get lazy sometimes.  You’re logging onto a new site, and it asks you to create a password.  ANOTHER ONE!  I have so many passwords it’s not funny anymore.  Not at all.  I feel the urge to rebel and punch in “1 2 3 4 5”.

But I resist.  Because I know that’s one of the most used, and worst passwords.  AND most likely one of the 1st ones that hackers will try.

When hacking into a personal computer, Cyber Criminals usually don’t have to break a sweat trying to guess our “clever” password, that’s so secretive no one will ever guess it!

Here is the complete list from SplashData’s Annual “Worst Passwords” List.    This list was compiled from a list of 3.3 million leaked passwords.  Superheros and fantasy sports entered the list for the first time.  However, some of the top ones have staying power – “123456” and “password” have occupied the top 2 spots for the past 4 years.

  1. 123456, no change from 2013
  2. password, no change from 2013
  3. 12345, up 17 spots
  4. 12345678, down 1 spot
  5. qwerty, down 1 spot
  6. 123456789, no change from 2013
  7. 1234, up 9 spots
  8. baseball, new
  9. dragon, new
  10. football, new
  11. 1234567, down 4 spots
  12. monkey, up 5
  13. letmein, up 1 spot
  14. abc123, down 9 spots
  15. 111111, down 8 spots
  16. mustang, new
  17. access, new
  18. shadow, no change from 2013
  19. master, new
  20. michael, new
  21. superman, new
  22. 696969, new
  23. 123123, down 12 spots
  24. batman, new
  25. trustno1, down 1 spot

This list shows that many people continue to put themselves at risk by using weak, easily guessable passwords.

“Passwords based on simple patterns on your keyboard remain popular despite how weak they are,” says Morgan Slain, CEO of SplashData.  “Any password using numbers alone should be avoided, especially sequences.  As more websites require stronger passwords or combinations of letters and numbers, longer keyboard patterns are becoming common passwords, and they are still not secure.”

Tips from SplashData:

  • Don’t use sequences on your keyboard, such as the letters on the top row, for your password.
  • Don’t use a favorite sport as your password.  “baseball” and “football” are in the top 10, and “hockey”, “soccer” and “golfer” are in the top 100.  Don’t use a favorite team either.  Many are in the top 100.
  • Don’t use your birthday, or especially just your birth year.
  • Don’t use your children’s names for picking passwords.  Many common names are in the top 50.

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in