Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT! More Celeb Misfortunes

September 3, 2014 by The T By D Team Leave a Comment

lawrence-620x400

 

Alert:  More Celeb Misfortunes

 

There is a new current event, which is unfortunately going to be the new click bait for CyberCriminals.

Apple’s iCloud has been hacked.  As a result, the account of Jennifer Lawrence, as well as many other celebrities have been ‘outed’. Apparently, Jennifer Lawrence had taken nude photos of herself and the photos are now out and about on the internet.

Apple has patched a bug that would allow brute force attacks on iCloud, which may have been how the hack was done.

The cyber mafia are already working on campaigns to exploit Jennifer Lawrence’s misfortune, and there will be some interesting phishing attacks over the next few months regarding this.

CyberCriminals are going to use this ‘scandal’ to use people’s curiosity against them by tricking them to click on links and open attachments, which will infect their computer with malware.

Remember:  “Curiosity killed the cat”…
Ask About Our ‘Core Security’ Package!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Facebook at work

September 2, 2014 by The T By D Team Leave a Comment

we-do-not-provide-any-government-organization-with-direct-access-to-facebook-serversDear Geek,
While I am at work, I can’t access my Facebook account. I don’t know why it hasn’t been working, and it’s only while at work. Has my Facebook account been disabled? What is going on?
Sincerely,
Want to check my messages

 

Dear Facebook,

Your Facebook account can not be disabled without your consent, and this is not the reason for the lack of access while at school or work. There could be several reasons why you may be unable to access certain web pages such as Facebook while at school and work. Often it relates to the security settings and access control your school or work administration has setup on the Network.

Often these security measures are put on the network to help protect the employer or school from improper use of time and attempting to bypass the security measures can cause you to be fired or kicked out of school.

If it is a website that is needed for school or work materials, contact those in charge of your network, and they should be able to find a way to let you on the site.
If you are wanting to find out more about how you can minimize the amount of time your employees spend on websites such as Facebook, call 204-800-3166 or email helpdesk@tbyd.ca.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

Crybercriminals Target Through YouTube

August 27, 2014 by The T By D Team Leave a Comment

YouTube

 

 

Alert:  CyberCriminals Target Through YouTube

 

It has been reported that cybercriminals have now found a way to spread Cryptolocker and CryptoWall through YouTube. There has been in increase in the amount of cybercriminals purchasing advertising space and using exploit kits to infect workstations.

YouTube Ad space turns out to be a cheap and efficient way to spread browser malware while using the powerful YouTube geo-targeting features. The researchers stated there was very little advertising networks could do to prevent the attacks. Obviously YouTube (Google) is going to try hard but preventing this is not easy.

YouTube chart

Now, spreading malware via ad-networks in itself is nothing new. We have seen this since 2010 where scareware was promoted as “Free Security Scans”. The free scan found a host of “problems” and sold you a rip-off bogus AV product. Some of these same gangs have moved on to ransomware.

 

What is new here is this: clicking on a thumbnail after the CryptoWall YouTubefirst video causes a redirect, an exploit kit located on a compromised website kicks in, finds a known unpatched vulnerability, and once found, executes ransomware code which locks all files and extorts $500. These exploit kits check for hundreds of known holes in mere seconds, so the “ad-network” threat just escalated to a much higher level.

Because of this, it is more important than ever to know what you are clicking on, especially when on websites such as YouTube, where ad space is easy and cheap to purchase, and available for anyone.

Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Open Wi-Fi

August 25, 2014 by The T By D Team Leave a Comment

danger-free-wi-fiDear Geek,
I was sitting in my local coffee place of choice with my laptop, using their Wi-Fi. I was about to log into my bank account to check if a payment had been put through, but I remembered that a coworker had told me I should not be using public Wi-Fi for things like that. Is this an issue? Will someone steal my money?
Sincerely,
Don’t Steal My Money!

 

Dear Money,

On an open Wi-Fi network like the one in the coffee house, hackers can snoop onto the network to see what you’re doing, or even use keystroke recording programs to learn passwords.

When you connect to an open Wi-Fi network, the network is generally unencrypted, you can tell this by the fact that you don’t have to enter a passphrase when connecting. Your unencrypted network traffic is then clearly visible to everyone in range, and people are able to see what unencrypted websites you are looking at.

If it’s something like online banking, I would wait until you got home. Anything like checking the news or the weather is fine, but anything like banking or online shopping can be risky. It’s better to be safe than sorry!

 

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

Alert: TorrentLocker Mimics CryptoLocker

August 20, 2014 by The T By D Team Leave a Comment

TorrentLocker

Alert:  TorrentLocker Mimics CryptoLocker

Another new strain of ransomware is using the “marketing” components of CryptoLocker and CryptoWall, but the coding is completely different.

This new strain is called “TorrentLocker” because of the way it is working.

Despite its unique code, the malware tricks victims into thinking that it’s CryptoLocker by copycatting the CryptoLocker ransom message, however the design of the ransom page is made to look more like CryptoWall. The malware installs itself on the infected machine and injects a binary into a legitimate process.  This injected binary contains the functionality to encrypt files using the Rijndael algorithm.

Once files are encrypted, the victim is prompted with a ransom message and a decryption deadline. The victim is required to purchase Bitcoins and send the payment to the Bitcoin address provided.

The malware and its configuration reside in the Windows Registry, in \Software\Bit Torrent App\ for continued persistence on the infected machine. The registry contains items such as the original binary, ransom message, install locations, autorun key and number of encrypted files.

The Moral of This Story?
Backups, backups, backups!
Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS

How To Adjust Screen Brightness

August 18, 2014 by The T By D Team Leave a Comment

Want to work outside, but the sun is too bright for the laptop screen? We show you how to adjust the brightness, so you can see again!

 

Filed Under: How To Videos

Facebook Hacked

August 18, 2014 by The T By D Team Leave a Comment

So your Facebook account has been hacked! We help explain what to do next!

 

Filed Under: How To Videos

Size Does Matter!

August 18, 2014 by The T By D Team Leave a Comment

just_how_you_feel_out_of_memoryDear Geek, 
Bytes, Gigabytes, Terabytes…What does it really mean?  I am getting a new iPod, but they are all different memory sizes. I don’t know how I can decide on a size if I don’t know what any of these sizes actually mean. How big is a GB really? How can I make sure I have enough space?
Sincerely,
iConfused

 

Dear confused,

The very smallest value of memory is a bit. You can think of a bit as a value of 1 or 0, (on or off).

A byte is the equivalent of 8 bits, and has the memory of one character.

A Kilobyte is 1,024 bytes and can hold around 2 or 3 paragraphs of text.

A Megabyte is 1,048,576 bytes or 1,024 Kilobytes. It can hold 873 pages of plaintext (1,200 characters) or 4 books (200 pages or 240,000 characters).

A Gigabyte is 1,073,741,824 bytes, 1,048,576 Kilobytes, or 1,024 Megabytes. This can hold 894,784 pages of plaintext (1,200 characters), 4,473 books (200 pages or 240,000 characters), 640 webpages (with an average 1.6MB file size), 341 digital photos (with an average 3MB file size), 256 MP3 audio files (with an average 4MB file size), or one 650 CD.

A Terabyte is 1,099,511,627,776 bytes, 1,024 Gigabytes, or 1,048,576 Megabytes. 916,259,689 pages of plaintext (1,200 characters), 4,581,298 books (200 pages or 240,000 characters), 655,360 web pages (with 1.6MB average file size), 349,525 digital pictures (with 3MB average file size), 262,144 MP3 audio files (with 4MB average file size), 1,613 650MB CD’s, 233 4.38GB ’,or 40 25GB Blu-ray discs.

The size you need really depends on how many songs, apps, photos, and other things you are wanting to be able to have on your iPod. You have 2,000 songs on your computer? That will be around 7.8 GB, but knowing an iPod is “missing memory” (see that blog here), and maybe there are a few apps you are looking at, so you may want to go up to at least a 16 GB iPod.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.
Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

Robin Williams’ Death and Your Computer

August 13, 2014 by The T By D Team Leave a Comment

rap1

ALERT:  Robin Williams’ Death, and Your Computer

As many of us know, this week we lost an actor that was enjoyed by many, Robin Williams.

With this sad news, there are always those few that want to exploit the situation including some cyber criminals.  
It is important to be aware of what you are clicking on when there is a tragedy like this.

Many links with a subject such as “Robin William’s last words” play on the emotional aspect of this death in order to get people to click on the link and download malware, or viruses on to their system.

Robin Williams Scam

Be aware of what the link, which can be sent through anything such as Facebook, email, or other modes of communication, is leading you to. If it is not a trustworthy site, or one you’ve never heard of before, be cautious about clicking on the link.

It is also important to have your malware and virus protection software up to date with the latest update.
Ask about our ‘Core Security’ Package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

C Is For Cookie

August 11, 2014 by The T By D Team Leave a Comment

cookieDear Geek,
I hear a lot about cookies on my computer. I’m assuming they aren’t the kind like Grandma makes, and I have no idea what they do. How do I get them on my computer in the first place?
Sincerely,
C is for Cookie.

 

Dear Cookie Monster,

Cookies are small files that websites put on your computer hard drive when you first visit the site. It is a computer version of your ID in the way that it tells the website who you are.

A cookie notifies the website that you have returned, and of any preferences you have set for the site. If you have not told the website of any preferences or left any personal information with the site, the website will only know that someone with your cookie has returned to the website.

How can this be helpful? Cookies can save your settings on a website if you want it viewed a certain way. For example, if you go to a sports site and specify that you want to ignore all the news regarding the “sport” of darts, when you return to the site a cookie will remember this and not show you the results of the international darts tournament.

Another example is in online shopping when you return to a website and your items are still stored in your cart. Imagine searching hours online for the perfect set of Star Wars action figures. You are about to pay, when your Mom wants to print off the new meatloaf recipe that was sent to her by email. When logging out of her email, she accidentally closes all the browsers. Cookies will remember that you had these certain settings and that you had wanted those items in your cart, otherwise you would have to scour the site again, looking for the exact same items you just spent hours trying to find.

A cookie cannot be used to get data from your hard drive, get your email address, or steal information. Very early versions of Java and JavaScript could allow people to do this, but these security leaks have been fixed, and this is no longer an issue.

An HTTP cookie can be used to track where you travel over a particular site, but this is done other ways as well. This tracking information is, for the most part, used by people such as web developers to find where their website visitors find is most interesting or helpful to their visitors, and where they can improve their traffic. This information can also be used for the web developer to figure out what kinds of ads and information you might want to see. If you are on a sports website, cookies tell the website that you might want to view ads for sports jerseys or autographed memorabilia, and not show you ads for something such as greenhouse gardening

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 22
  • 23
  • 24
  • 25
  • 26
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in