Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: Second Generation Ransomware

August 6, 2014 by The T By D Team Leave a Comment

images

ALERT:

2nd Generation Ransomware

 

There is a second-generation type of ransomware called CTB-Locker (Curve-Tor-Bitcoin) being described as the potential successor to CryptoLocker.

 

Because of the way it is run, this second generation of ransomware is much harder to shut down, or intercept. This new generation of ransomware uses the anonymous TOR network for it’s command & control servers, making it harder to shut down. Traffic between the malware that lives on the infected machine and its c&c servers is much harder to intercept.

The way the files are encrypted on this new generation, it is also a lot harder to retrieve the files yourself. First the infection on the computer will compress the files before encrypting them. Then, because CBT-Locker encrypts files using little-used and super strong Elliptic Curve Diffie-Hellman cryptography, it makes decrypting the machine yourself impossible.

The worst part of this new generation of ransomware is that because it was built as commercial crimeware, it can be sold globally to other cybercriminals. The Bitcoin ransom can be specified, as can the extensions of the files to be encrypted.

More than ever, it is important to be aware of what you are clicking on, or opening,
as well as have a good backup solution, just in case of infection.

 

If you would like more information on how you can protect your business from being infected, or how you can prevent the damage to your files, (204) 800-3166 or email helpdesk@tbyd.ca.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Screen Brightness

July 28, 2014 by The T By D Team Leave a Comment

relaxing-computer-outsideDear Geek,
Sometimes while on my lunch break, I like to take my laptop outside so I can enjoy the air while checking my personal email. When I take my laptop outside like this though, I notice that the screen darkens up. Is there a way to increase the brightness? I’m not outside too long, so losing power quicker will not be an issue.
Sincerely,
Making the most of my lunch

 

Dear lunchtime!

There is a way to increase the screen brightness while working of a battery, and you’re right, a brighter screen means more battery power is needed. In the bottom right hand corner of your screen, you should see a little battery icon in your toolbar. When you click on this, it gives you some options for how your computer is going to run off the battery, and the screen brightness. When you click on the screen brightness option, it will open up a window. There is a slider at the bottom of this new window to adjust the screen brightness.

Got a question?  Email geek@tbyd.ca

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Projectors vs. Chromecast

July 21, 2014 by The T By D Team Leave a Comment

Chromecast_dongleDear Geek,
 I got a new promotion (yay)! With this new promotion, I am expected to do more presentations, and marketing strategies to my team. I don’t want to be like the last guy where he would show us slides off of his laptop, which was so small, you couldn’t see. Is there a solution that won’t cost me hundreds of dollars for a projector? 
Sincerely,
Promoted to “Ruler of the Office”

 

Dear “Ruler”,

Projectors are expensive, that’s true, and the I don’t know about you, but I feel the cords from the projector are also a liability every time someone gets up to walk to the washroom.

One product we have found to be very helpful is the Google Chromecast. Chances are, your meeting rooms probably have a TV. The Chromecast makes it very easy to transmit what is on your tablet, iPhone or laptop onto a TV screen with no wires. This means no more huddling around a small screen and tiny speakers.

With a projector, you are spending a good part of your meeting time setting up the screen, the equipment, and attempting to make the cords as least hazardous as possible. With the Chromecast, it only takes three steps. Plug Chromecast into any HDTV, connect it to WiFi, then send videos and more from your smartphone, tablet or laptop to your TV with the press of a button.

Showing off your slides, videos and webpages easier sounds good, right? How about paying $40 for the Chromecase, instead of $700 for a projector?

Want to know if the Google Chromecast is a good option for you? Call Technology by Design for some more information about how we can help with all your technology needs!

 

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: Travel Scams

July 17, 2014 by The T By D Team Leave a Comment

your-mind-is-like-an-airplane

ALERT:  Travel Scams

With everyone still trying to plan last minute plans before summer is over, there have been a lot of computer scams popping up.
Making sure your information is safe, is one worry you should not leave at home.

 

Here are 5 of the vacation scams that have been on the rise this summer:
  1. Fake Free Wi-Fi Network- You will find these when looking for access to your business accounts. They will have a hotel name, but the scammers are listening in and watching the (company confidential) traffic. It is important to check with the hotel which Wi-Fi is theirs.
  2. Fake Software Updates- When a traveller attempts to set up a hotel internet connection, they will see a “Update-popup” for a popular software product. When you click on it, it will infect the computer with malware. You should always do updates on a laptop before you leave, and never update while you are travelling.
  3. Pizza Delivery Scam- You will find a flyer slipped under your hotel door. When you call to order, they take your credit card data, but never deliver because it was a scam. Get some food recommendations from the front desk, and pay attention to who you are giving your credit card number to.
  4. ATM Security- An ATM security team is warning about new ATM skimmers that are almost impossible to detect with the naked eye. Thanks to a slimmed-down profile, the devices sit within the throat of an ATM card slot, capturing data when a traveler slides their card inside. A spy camera then tapes the customer as they enter their PIN number on the keypad. Especially when on the road, COVER YOUR HAND WHEN TYPING IN THE PIN!
  5. Late Night Hotel Front Desk Call- You get a phone call from front desk alerting you that there has a been a problem with your credit card and they are wanting you to verify your credit card number. This is not front desk, but a scammer, who now has your number or who has maybe just skimmed your card at the ATM and needs some more information to make a fake duplicate card so they can grab more cash. Especially when you travel, do not give out credit card information if you did not initiate the call, and be aware of who you are talking to.

If you need information about how to protect your information while travelling, contact Technology by Design at helpdesk@tbyd.ca

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

July 2014 TechTips Newsletter!

July 14, 2014 by The T By D Team Leave a Comment

Click here for the July, 2014 TechTips Newsletter!

How can you make your own Super Mario levels?
Spider web undies on the market!
How two Manitoba teens broke into an ATM.
How the TSA is getting attention on social media.

All this and more!

**************************************************************************
Check out our blog for “Ask The Geek” where our resident Geek answers your questions, AND translates them from Geek-lish to English!
If you have a question for our resident Geek, email it to: geek@tbyd.ca!
Visit our website for access to past issues, security alerts, free ebooks, and more!
Like us on Facebook at: facebook.com/TechnologybyDesign

Follow us on Twitter: @techbyd

 

http://tbyd.ca/wp-content/uploads/2013/11/July-2014-Newsletter.pdf

Filed Under: Featured

Multiple Anti-Virus Programs

July 14, 2014 by The T By D Team Leave a Comment

keep_computer_virusfree_update_antivirus_600x450Dear Geek,
I currently have one Anti-Virus software program, but a friend told me that there is another one I should use with it to make sure I catch anything. I’m very worried about someone hacking my computer and stealing my Game of Thrones spin-off ideas, with the characters that are still alive of course. Is it okay to have more than one Anti-Virus software program installed?
Sincerely,
The next George R.R. Martin.

 

Dear Mr. Martin,

Having more than one Anti-Virus software program can cause quite a few issues. The most important, and common issue of having two programs installed is that the two programs may conflict, causing both to miss viruses and your computer to become unprotected. It is kind of a situation where both programs are too busy fighting eachother for power (over the computer of course), that they don’t realize someone else is planning to take them down. Because of this, it is not recommended that you have more than one Anti-Virus program installed on your computer. If you are unhappy with the program you have, you should switch to another program completely, rather than downloading another and running both.

Although we recommend that you have only one Anti-Virus program, it’s completely fine to have more than one spyware or malware protection program on the computer in addition to your Anti-Virus software.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Case-Sensitive Email

July 7, 2014 by The T By D Team Leave a Comment

iStock_000013926354XSmall1-300x199Dear Geek,
This has been bothering me for a good while, but I noticed when my Mom is emailing my Aunt, she is capitalizing my Aunt’s name in the email address. Are email addresses case-sensitive, and does this mean my Aunt will not receive the email?
Sincerely,
Or are we just being ignored for sending Lego Star Wars movies?

 

Dear Lego-Lover,

Sorry to say, your lovely movies are most likely being ignored. Although email providers say anything before the “@” symbol is case-sensitive, typically addresses are not because of the confusion this would cause between users. This means if you needed to email the Geek at Technology by Design, it can be assumed that both GEEK@tbyd.ca and geek@tbyd.ca would send to the same place.

However, when you are logging into your own account, the username associated with your email will be very case-sensitive.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca (or GEEK@tbyd.ca).

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Low Volume On Speakers

June 30, 2014 by The T By D Team Leave a Comment

mix_at-lower-volume-300x274Dear Geek,
I bought brand new speakers for my computer at the beginning of the month, but today they aren’t working properly. They sound like they are only half working. I spent a ton on these speakers! How can they be broken already?
Sincerely,
Beaten by the speakers

 

Dear Beaten,

There could be a few reasons why your computer speakers don’t seem to be working properly anymore. If they were properly working before, it should be easy to fix.

First, check to ensure your cat (or anyone else) has not accidentally partially unplugged the speakers, or unplugged them and plugged them into the wrong spot.

Next, depending on what program you are using, there could be a few spots where you can control the volume. As well as the volume controls on the speakers themselves, there are also the volume controls on your computer. These controls can either be found on your keyboard, or on your toolbar, near where the date and time would be displayed.  The program you are using may also have its own volume controls. On iTunes, for example, there is a volume bar in the top left corner near the play controls. On YouTube, there is a volume control under the video you are viewing.

If your speakers are still not properly working, it could be a hardware issue with either your computer input for the speaker, or the speaker itself.

 

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

ALERT: Cryptowall

June 16, 2014 by The T By D Team Leave a Comment

mqdefaultALERT:

CryptoWall

Another form of Ransomware is on the loose, calling itself Cryptowall.

 

Similar to CryptoLocker, Cryptowall tricks users into downloading infected files or clicking infected web links. It then encrypts your files, and a warning screen pops up, instructing you how to pay the ransom on your files. The criminals ask for a $500 ransom to start, and raise the price to$1,000 if you do not pay before the timer hits 0.

This sort of RansomWare has been focusing on fake Dropbox links, informing the user of a “new fax report” or “new voicemail”. Because of this, it is important to carefully examine any links and emails, especially coming from Dropbox.

If you have any questions or concerns about this strain of Ransomware, call 204-800-3166 or email helpdesk@tbyd.ca

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

RansomWare! What is it?

June 16, 2014 by The T By D Team 1 Comment

ransomware_header_1_contentfullwidthDear Geek,
I’ve been hearing a lot about this “RansomWare”. You’ve been posting alerts about it, it’s been in the news, and it’s everywhere! What is RansomWare, and how can I avoid getting it on my computer?
Sincerely,
Not ready to pay ransom.

Dear Ransom,

RansomWare is a kind of malware that is installed by criminals so they can lock your computer from a remote location. It generates a pop-up window, webpage, or email warning from what looks to be an official authority or reputable company in hopes that someone will open an infected webpage or email. Once a user opens an infected file, your computer tells you that your files have been scrambled and encrypted, and demands payment before you can access your files again. Basically, RansomWare is a way for criminals to hold your files and information hostage, and make it inaccessible for you to use, or even view until you pay their fee.

RansomWare is installed in a few ways; when you open an email attachment infected by the malware, when you visit an infected site, or when you click on an infected link through email, instant message, or social networking site.

The easiest way to avoid being infected is to be aware of what you are clicking on, and what it may lead to. If you are unsure about an email attachment or a website link, do not click on it. It is also important that you ensure your virus protection is up-to-date and will protect you from RansomWare, as many virus programs do not.

The anti-virus programs used by Technology by Design for our clients ensure protection from RansomWare. In event of RansomWare being installed on a computer, payment to the cybercriminals can be avoided if backups are done regularly.

For more information on our anti-virus programs or our scheduled backups, call 204-800-3166 or email helpdesk@tbyd.ca. For more information on the types of RansomWare currently out there, look at the “Alert” section of our website at tbyd.ca.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

Got Cyber-Bugs?

Call 1-204-3166

For Cyber-Extermination

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 23
  • 24
  • 25
  • 26
  • 27
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in