Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Alert: Home Depot Hacked

September 22, 2014 by The T By D Team Leave a Comment

Home Depot Hacked

Alert:  Home Depot Hacked

 

After Target was hacked, execs at Home Depot Inc. put together a task force to prevent being the victim of a similar attack.

 

The task force recommended to fully encrypt any payment card information at all of the chain stores, but it wasn’t until months later that the work was begun.

The reason for this kind of action is that they thought they could defend against a hack like this, and apparently gave the wrong priority to the possibility that they had already been breached. Instead of prevention, they should have focused on the detection of the existing breach and getting the hackers out of their network.

The data breach is very similar to the breach that occurred at Target. The malware used to steal card data from Home Depot had the same code base as the tool used against Target, said the people who analyzed. (The data is generally vulnerable in the brief moment it passes into the system’s memory after the card is swiped.) After analyzing the malware, it was found that in both “malwares’, the code had Russian words in it.

It is a possibility that the hackers accessed Home Depot the same way they accessed Target, and used spear-phishing to access one of the Home Depot vendors.

If Home Depot and Target can be vulnerable to spear-phishing attacks, so can you.
Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

ALERT: Hackers Attempting To Access BitCoin Wallet

September 10, 2014 by The T By D Team Leave a Comment

bitcoin-wallet

Alert:  Hackers Attempting to Access BitCoin Wallets

 

A recent study has shown that phishing attacks using Bitcoin as scam-bait have a much higher click through rate than other campaigns.

In the past while, new criminal phishing campaigns have started claiming that hackers have tried to access your “Bitcoin Wallet”, even if you do not have a wallet with this kind of currency.

The email subject is a bogus alert of a “Suspicious sign-in attempt” and to make sure no Bitcoins are stolen, you are supposed to reset your password. The email even has a “case incident” number to make it look official.

BitCoin Scam

Do not click on any attachments!

If you are suspicious that your BitCoin Wallet has been tampered with, manually look up your BitCoin wallet (do not click on the link provided – manually type the URL, or address).

Ask About Our ‘Core Security’ Package!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

ALERT! More Celeb Misfortunes

September 3, 2014 by The T By D Team Leave a Comment

lawrence-620x400

 

Alert:  More Celeb Misfortunes

 

There is a new current event, which is unfortunately going to be the new click bait for CyberCriminals.

Apple’s iCloud has been hacked.  As a result, the account of Jennifer Lawrence, as well as many other celebrities have been ‘outed’. Apparently, Jennifer Lawrence had taken nude photos of herself and the photos are now out and about on the internet.

Apple has patched a bug that would allow brute force attacks on iCloud, which may have been how the hack was done.

The cyber mafia are already working on campaigns to exploit Jennifer Lawrence’s misfortune, and there will be some interesting phishing attacks over the next few months regarding this.

CyberCriminals are going to use this ‘scandal’ to use people’s curiosity against them by tricking them to click on links and open attachments, which will infect their computer with malware.

Remember:  “Curiosity killed the cat”…
Ask About Our ‘Core Security’ Package!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Crybercriminals Target Through YouTube

August 27, 2014 by The T By D Team Leave a Comment

YouTube

 

 

Alert:  CyberCriminals Target Through YouTube

 

It has been reported that cybercriminals have now found a way to spread Cryptolocker and CryptoWall through YouTube. There has been in increase in the amount of cybercriminals purchasing advertising space and using exploit kits to infect workstations.

YouTube Ad space turns out to be a cheap and efficient way to spread browser malware while using the powerful YouTube geo-targeting features. The researchers stated there was very little advertising networks could do to prevent the attacks. Obviously YouTube (Google) is going to try hard but preventing this is not easy.

YouTube chart

Now, spreading malware via ad-networks in itself is nothing new. We have seen this since 2010 where scareware was promoted as “Free Security Scans”. The free scan found a host of “problems” and sold you a rip-off bogus AV product. Some of these same gangs have moved on to ransomware.

 

What is new here is this: clicking on a thumbnail after the CryptoWall YouTubefirst video causes a redirect, an exploit kit located on a compromised website kicks in, finds a known unpatched vulnerability, and once found, executes ransomware code which locks all files and extorts $500. These exploit kits check for hundreds of known holes in mere seconds, so the “ad-network” threat just escalated to a much higher level.

Because of this, it is more important than ever to know what you are clicking on, especially when on websites such as YouTube, where ad space is easy and cheap to purchase, and available for anyone.

Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Alert: TorrentLocker Mimics CryptoLocker

August 20, 2014 by The T By D Team Leave a Comment

TorrentLocker

Alert:  TorrentLocker Mimics CryptoLocker

Another new strain of ransomware is using the “marketing” components of CryptoLocker and CryptoWall, but the coding is completely different.

This new strain is called “TorrentLocker” because of the way it is working.

Despite its unique code, the malware tricks victims into thinking that it’s CryptoLocker by copycatting the CryptoLocker ransom message, however the design of the ransom page is made to look more like CryptoWall. The malware installs itself on the infected machine and injects a binary into a legitimate process.  This injected binary contains the functionality to encrypt files using the Rijndael algorithm.

Once files are encrypted, the victim is prompted with a ransom message and a decryption deadline. The victim is required to purchase Bitcoins and send the payment to the Bitcoin address provided.

The malware and its configuration reside in the Windows Registry, in \Software\Bit Torrent App\ for continued persistence on the infected machine. The registry contains items such as the original binary, ransom message, install locations, autorun key and number of encrypted files.

The Moral of This Story?
Backups, backups, backups!
Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS

Robin Williams’ Death and Your Computer

August 13, 2014 by The T By D Team Leave a Comment

rap1

ALERT:  Robin Williams’ Death, and Your Computer

As many of us know, this week we lost an actor that was enjoyed by many, Robin Williams.

With this sad news, there are always those few that want to exploit the situation including some cyber criminals.  
It is important to be aware of what you are clicking on when there is a tragedy like this.

Many links with a subject such as “Robin William’s last words” play on the emotional aspect of this death in order to get people to click on the link and download malware, or viruses on to their system.

Robin Williams Scam

Be aware of what the link, which can be sent through anything such as Facebook, email, or other modes of communication, is leading you to. If it is not a trustworthy site, or one you’ve never heard of before, be cautious about clicking on the link.

It is also important to have your malware and virus protection software up to date with the latest update.
Ask about our ‘Core Security’ Package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Second Generation Ransomware

August 6, 2014 by The T By D Team Leave a Comment

images

ALERT:

2nd Generation Ransomware

 

There is a second-generation type of ransomware called CTB-Locker (Curve-Tor-Bitcoin) being described as the potential successor to CryptoLocker.

 

Because of the way it is run, this second generation of ransomware is much harder to shut down, or intercept. This new generation of ransomware uses the anonymous TOR network for it’s command & control servers, making it harder to shut down. Traffic between the malware that lives on the infected machine and its c&c servers is much harder to intercept.

The way the files are encrypted on this new generation, it is also a lot harder to retrieve the files yourself. First the infection on the computer will compress the files before encrypting them. Then, because CBT-Locker encrypts files using little-used and super strong Elliptic Curve Diffie-Hellman cryptography, it makes decrypting the machine yourself impossible.

The worst part of this new generation of ransomware is that because it was built as commercial crimeware, it can be sold globally to other cybercriminals. The Bitcoin ransom can be specified, as can the extensions of the files to be encrypted.

More than ever, it is important to be aware of what you are clicking on, or opening,
as well as have a good backup solution, just in case of infection.

 

If you would like more information on how you can protect your business from being infected, or how you can prevent the damage to your files, (204) 800-3166 or email helpdesk@tbyd.ca.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Travel Scams

July 17, 2014 by The T By D Team Leave a Comment

your-mind-is-like-an-airplane

ALERT:  Travel Scams

With everyone still trying to plan last minute plans before summer is over, there have been a lot of computer scams popping up.
Making sure your information is safe, is one worry you should not leave at home.

 

Here are 5 of the vacation scams that have been on the rise this summer:
  1. Fake Free Wi-Fi Network- You will find these when looking for access to your business accounts. They will have a hotel name, but the scammers are listening in and watching the (company confidential) traffic. It is important to check with the hotel which Wi-Fi is theirs.
  2. Fake Software Updates- When a traveller attempts to set up a hotel internet connection, they will see a “Update-popup” for a popular software product. When you click on it, it will infect the computer with malware. You should always do updates on a laptop before you leave, and never update while you are travelling.
  3. Pizza Delivery Scam- You will find a flyer slipped under your hotel door. When you call to order, they take your credit card data, but never deliver because it was a scam. Get some food recommendations from the front desk, and pay attention to who you are giving your credit card number to.
  4. ATM Security- An ATM security team is warning about new ATM skimmers that are almost impossible to detect with the naked eye. Thanks to a slimmed-down profile, the devices sit within the throat of an ATM card slot, capturing data when a traveler slides their card inside. A spy camera then tapes the customer as they enter their PIN number on the keypad. Especially when on the road, COVER YOUR HAND WHEN TYPING IN THE PIN!
  5. Late Night Hotel Front Desk Call- You get a phone call from front desk alerting you that there has a been a problem with your credit card and they are wanting you to verify your credit card number. This is not front desk, but a scammer, who now has your number or who has maybe just skimmed your card at the ATM and needs some more information to make a fake duplicate card so they can grab more cash. Especially when you travel, do not give out credit card information if you did not initiate the call, and be aware of who you are talking to.

If you need information about how to protect your information while travelling, contact Technology by Design at helpdesk@tbyd.ca

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Cryptowall

June 16, 2014 by The T By D Team Leave a Comment

mqdefaultALERT:

CryptoWall

Another form of Ransomware is on the loose, calling itself Cryptowall.

 

Similar to CryptoLocker, Cryptowall tricks users into downloading infected files or clicking infected web links. It then encrypts your files, and a warning screen pops up, instructing you how to pay the ransom on your files. The criminals ask for a $500 ransom to start, and raise the price to$1,000 if you do not pay before the timer hits 0.

This sort of RansomWare has been focusing on fake Dropbox links, informing the user of a “new fax report” or “new voicemail”. Because of this, it is important to carefully examine any links and emails, especially coming from Dropbox.

If you have any questions or concerns about this strain of Ransomware, call 204-800-3166 or email helpdesk@tbyd.ca

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: iPhone CryptoLocker

June 11, 2014 by The T By D Team Leave a Comment

image

ALERT:  iPhone CryptoLocker

 

Cryptolocker has already found a way to target Android phone, and now they have found a way to hold iPhones and iPads hostage as well.

 

 

 

An attacker using the name “Oleg Pliss” is exploiting the “Find My iPhone” feature to launch the attack. So far, there is no explanation of how the attacker got hold of the iCloud accounts used to lock the devices.

Currently, there are four explanations possible:
  1. A classic phishing attack. People were lured to an Apple phishing site (there are 2,261 of them) and entered their credentials.
  2. A data breach at Apple, but Apple denies that their iCloud service has been breached.
  3. Possibilities of DNS poisoning, meaning people entered the correct Apple domain, but were subverted to a fake site, and entered their credentials there.
  4. There is also the scary possibility that hackers are in possession of usernames and passwords from another databreach like eBay or Target, and are attacking users that use the same credentials for their iCloud account.
The device will simply lock itself, and a message will appear stating “your device has been hacked by Oleg Pliss” and demands money sent to a PayPal account in order for the phone to be returned.

Many people do not know that Technology by Design offers antivirus, anti-malware and site protection for your mobile devices, such as smartphones and tablets.

Site protection does not put additional strain on your battery and blocks malicious sites and attacks, however it doesn’t clean your mobile device if it gets infected. Having either site protection or antivirus would be prudent, but having both would give you full protection. For more information on how we can help prevent this kind of incident, please call 204-800-3166, or email helpdesk@tbyd.ca.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 15
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in