Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: Internet Capacity Warning

July 16, 2015 by The T By D Team Leave a Comment

ALERT:  Internet Capacity Warning

This new email scam is possibly fueled by the recent U.S. news that they have run out of IPv4 addresses in the U.S.

 

 Internet Capacity Scam

 

This new email scam is making the rounds at both homes and businesses.  

An email is currently being received, supposedly from “IT Services Support Department”, which claims that your Internet capacity is at 70%.  

In order to rectify the situation, they request you to contact “Help Desk” support, for which they helpfully include a link.

Once you click the link, you are asked to leave your user name and password at the (bogus) “Help Desk” site.

You thoughtfully receive a “Thank You” page once you have completed all steps.

THIS IS A SCAM
They are trying to hijack your email account.

 

In the past, you may have received notifications from your Internet provider about your email account exceeding its maximum storage limit.  However, the name of the service provider is always clearly visible, and they never ask you to click on a link to rectify the issue.

Rogers Email Capacity Warning

 

Do not click on links or attachments in emails from unknown or suspicious people.
If you suspect the item may be real, contact the company directly, from a number or email you look up elsewhere.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Payment by Facebook Friend

July 7, 2015 by The T By D Team Leave a Comment

buy with Facebook

Facebook recently announced person-to-person (P2P) payments.  

This new feature that allows you to “instant-message” money to a friend, using your debit card and your friend’s debit card, which are, of course, connected to both of your bank accounts.

You simply need to attach your debit card to your Facebook messenger to send and receive money.  

To Send Money: 
  1. Start a message with a friend.
  2. Top the “$” (dollar) icon, and enter the amount you want to send.
  3. Tap “Pay” on the top right, and add your debit card to send money.
To Receive Money:
  1. Open your friend’s conversation.
  2. Click “Tap Add Card” in the message.
  3. Add your debit card to accept money for the 1st time.
  4. You can also create a PIN for additional security.

The money transfer take between 1-3 business days.

Facebook, of course, claims this is all technically secure.

That’s what Apple thought when they introduced “Apply Pay”.  apple pay

 Fantastic Idea!  Until CyberCriminals got a hold of it, and started gaming the system, and making tons of cash doing it…

This new Facebook payment option could allow several kinds of scams.

To start with, you have to be alert when you get emails that claim a Facebook friend has sent you money.

Also, when a friend messages you, and their account has been hacked – there is a criminal trying to scam you, while impersonating your friend.

caution

Use Extreme Caution with anything to do with Facebook Payments.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

ALERT: Resume Ransomware

June 19, 2015 by The T By D Team Leave a Comment

Skull Threads

THREAT LEVEL:  HIGH

 Beware of unsolicited resumes!

 

This attack uses both infected attachments, and compromised websites to infect your computer!

Unsolicited resumes have been received worldwide.  The email contains a zip file the sender claims is a copy of their resume.  The zip file contains extremely nasty malware, called the Angler exploit kit (EK), that attacks your computer from several angles at the same time, until it finds a vulnerability.

Sample of an actual received email:

Resume Email

Since the end of May, CyberCriminals have started 2 new ransomware attacks, using both malicious spam and the Angler exploit kit (EK).  The attack wave increased significantly since the beginning of June.

Both campaigns are very active as of Friday June 12th.  

The path of infection:

Angler EK Mode of Infection

How To Prevent Infection:

  1. DO NOT  open any attachments that look anything like “my_resume.zip”.
  2. DO NOT visit unknown websites.
  3. Make sure all the applications on your computer are up to date.
  4. You can go to Secunia to download the free Secunia PSI.  This scans for old software versions that need to be updated.
  5. Call Technology by Design at 1-204-800-3166 and ask about our Core Security Package.  

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

ALERT: Sleeper Randomware “Locker”

June 3, 2015 by The T By D Team Leave a Comment

Locker VirusA new strain of ransomware has infected computers, over the past few months.  The infection is thought to be spread through infected sports websites, or through a compromised MineCraft installer.  Based on experts’ opinions, they state that this strain has a large global “installed” base, which means there are one heck of a lot of computers out there all over the world, with this virus installed…

It’s called “Locker”, and sat silently in infected computers, until midnight May 25, 2015.

At that time, it woke from its slumber and reared its ugly head, and wreaked havok in an ugly way.

Bleepingcomputer has a support topic that is 14 pages long, and they received 100s of emails from consultants all over the world.  Similar websites with topics related to this new strain are suddenly posted on all the major support boards, AV forums, etc.

Here’s what “Locker” does:
  • A series of Windows services are used to install Locker on the computer, and encrypt data files.
  • During the install process, Locker will check if the computer is a virtual machine, and will terminate installation if detected.
  • Encrypts data files with RSA encryption, and does not change the file extension.
  • After the encryption, it deletes your c:/shadow volume copies, and displays its ransom interface.
  • If you backups failed and you are forced to pay the ransom, once the payment is confirmed, the ransomware will download the private key, and automatically decrypt your files.

Locker PaymentThe files that are encrypted have the following suffix extension:  .doc, .docx, .xlsx, .ppt, .wmdb, .ai, .jpg, .psd, .nef, .odf, .raw, .pem, .rtf, .raf, .dbf, .header, .wmdb, .odb, .dbf.  Locker does not change the file extension, so users will simply receive error messages from their applications that the file is corrupted.

Once the files are encrypted, a Bitcoin ransom is demanded from victims.  Once payment is confirmed, victims are provided with a “private key” in order to retrieve their data.Private Key

 

 

By Time of Publication:

CyberCriminal has remorse?  Or he’s made so much money already, he’s pulling out of this campaign, or he’s gotten cold feet & is afraid of getting caught by law enforement, or damaged by a local cyber mafia.  Either way, he claims the release was “a mistake”, and has uploaded a CSV file with a dump of the encryption keys.  He states that automatic decryption of all infected computers will start on June 2nd.

CyberCriminal states, “I am the author of the Locker ransomware and I’m very sorry about that has happened.  It was never my intention to release this.  I uploaded the database to mega.co.nz containing “bitcoin address, public key, private key” as CSV.  This is a dump of the complete database and most of the keys weren’t even used.  All distribution of new keys has been stopped.”

Locker DecryptedThis seems very fishy.  If you build code like this, you know exactly what you are doing (and the fact that it was a ‘sleeper’ shows months-long careful planning).  If he was really remorseful, he’d refund everyone’s money (which hasn’t happened). So far, it’s not clear if current infection vectors (infected websites/ads etc) have been turned off yet.  

We can assume that this CyberCriminal wanna-be, is exactly that.  He’s a talented coder that sees all these other ransomware viruses/malware being very lucrative, and wants some of that money action.  However, he’s not yet experienced, because a “mix-up” like this would not happen with a professional CyberCrime gang.

 

 

If you have infected computers, there is a chance you can find the decryption key in this database:

https://mega.co.nz/#!W85whbSb!kAb-5VS1Gf20zYziUOgMOaYWDsI87o4QHJBqJiOW6Z4

This file does not seem to be malicious, based on a brief virustotal analysis.  It does contain a large quantity of RSA keys and Bitcoin addresses.  OPEN AT YOUR OWN RISK, until further analyses are completed.

TbyD will keep you posted, as more information is released.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: ALERTS, Featured

Adult Friend Finder (AFF) Hack

May 28, 2015 by The T By D Team Leave a Comment

AFF Hack

Adult Friend Finder (AFF) Hack Affects Businesses

 

 

 

Last week, news broke that the Adult Friend Finder (AFF) website was hacked.  The site bills itself as a “thriving sex community”, and as a result users often share sensitive sexual information when they sign up.  This is one of the top adult websites for people that want casual encounters, possibly cheating on their spouse.  The site is one of the most heavily trafficked websites and has 63 million registered users worldwide. AFF2 

Now millions of these records are now in the open, exposing highly sensitive personal information.  Internet CyberCriminals are going to exploit this in many ways, sending spam, phishing, and possibly blackmail messages, using social engineering tactics to make people click on links or open infected attachments.  Be on the lookout for threatening messages like this that slip through and delete them immediately.

This is not an easy one.  It only takes one second for a worried person to click on a link in an email and expose the whole network to attackers.  I suggest you send this link to this post, in order to warn people not to take the bait.

The Background Story:

The story goes that the AFF site owed $240,000 to someone, likely an affiliate that was feeding them webtraffic, and supposedly the AFF did not pay their bill.  The affiliate had a hacker buddy who calls himself ROR[RG], and this guy decided to teach AFF a lesson.

ROR[RG] hacked them, exfiltrated at least 4 million records and then sent them a ransom demand of $100,000 to return the data.  Apparently AFF did not pay again, and in retaliation, ROR[RG] posted the stolen data on a Darknet Tor site loaded with a ton of highly sensitive, personal information.  The stolen data includes their age, procreation preferences, state, zip code, username, IP address, email address, usernames, dates of birth, marital status, sexual preferences, and whether they are looking for a “cheating one night stand” or more “unorthodox” procreation activities.  With a little digging, these people are easy to find.ROR Rg

FriendFinder Network, a California-based company, hired a public relations company specializing in cybersecurity, and released this statement:

“FriendFinder Networks Inc…understands and fully appreciates the seriousness of the issue.  We have already begun working closely with law enforcement and have launched a comprehensive investigation with the help of leading third-party forensics expert. We cannot speculate further about this issue, but rest assured, we pledge to take the appropriate steps needed to protect our customers if they are affected.”

The company could not be reached for further comment.  UK TV Channel 4 reported it first, and stated exposed email addresses are receiving spam.  Here is their 4-minute segment:  http://www.channel4.com/news/adult-friendfinder-dating-hack-internet-dark-web.

The Problem:

The problem is, that any of these 40 million registered users are now a target for a multitude of social engineering attacks.  People that have extramarital affairs can be made to click on links in emails that threaten to out them.  Or phishing emails that claim people can go to a website to find out if their private data has been released.  This is a nightmare that will be exploited by all facets of CyberCriminals:  spammers, phishers, and blackmailers.  All of which are rubbing their hands together in gleeful greediness.  Undoubtedly jilted spouses, divorce attorneys and private investigators are already pouring over the data to see if it’s of any use to them.

How it Affects Your Business

&

What You Need To Do:

Take immediate preventive action.  It only takes one second for a worried end-user (any employee with computer access) to click on a link in an email, and expose the entire network to attackers.  

I suggest you send the link to this post to friends, family, coworkers, and employees, in order to warn people not to take the bait.  Explain that you are sending a mass email to everyone, without judgement, in order to protect them from further attacks.  Warn them that clicking on the link in an email has far worse implications.  

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shield up.

 

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

ALERT: Red Bull Ad Scam

May 20, 2015 by The T By D Team Leave a Comment

Red Bull‘Red Bull’ Money Laundering Scam

Emails are being received that claim to be from ‘Red Bull’.  They offer to place Red Bull ads on your car for $600/week.  They explain the benefits of the “business offer”, and promise easy money that will basically pay for the whole car, gas money included.  

A sample of the email, below.

Red Bull email

 

 

Sounds like a great deal, right?

 

 

 

Unfortunately, if something seems too good to be true, it usually is.

The first payment received is usually larger than originally agreed upon.  The CyberCriminals apologize for the “error”, and requests the you to wire the ‘extra’ money back to them, minus the your ‘fee’.

Oh yeah, and the cheque you were sent, was either a forged or stolen cheque, or a fraudulent wire transfer from an account that was illegally taken over by the CyberCriminals.

In both cases, you’ll be charged with fraud and money laundering.

This scam originally reared it’s ugly head during spring break in 2014.  

If you receive an email, or see an ad on Social Media stating it’s from Red Bull and offering you an opportunity to “work from home”.  Delete it immediately.

Beware of internet “work from home” schemes.  Most of them are fruadulent.
Warn family, friends, coworkers and employees.

 

You can’t stop CyberCriminals from targeting you, 
But you can be prepared for their arrival, and have full shields up.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: ALERTS, Featured

ALERT: Rombertik Kills Your Hard Drive

May 14, 2015 by The T By D Team Leave a Comment

 

ALERT:  Rombertik Kills Your Hard DriveALERT:

Rombertik Kills Your Hard Drive

 

CyberCriminals are sending out a new phishing email, hoping to entice users to download, and open the attachments.

 

The attachments, instead of containing the information promised, infects the user’s machine with the extremely deadly malware Romertik.

 

Here is an example of the phishing email being received:

Rombertik email

 

What is Rombertik:

Rombertik is a new strain of malware recently discovered by InfoSec researchers at Cisco’s TALOS group, which spreads through phishing emails.

Rombertik, monitors everything that happens inside an infected machine’s browser, and exfiltrates it to a server controlled by the attacker.

It steals your information, and sends it to the CyberCriminals.  
All that’s missing is the bow on top.

However, if Rombertik detects it is being analyzed by Anti-Malware Software it acts similar to a suicide bomber.  It takes deadly evasive action and actively attempts to destroy the computer.  It wipes the Master Boot Record (MBR) or home directories.  This traps the computer in an endless boot loop, rendering it unusable.

In the case that Rombertik cannot get access to the MBR, it starts encrypting all files in the user’s ‘home’ folder (ex. C:\Documents and Settings\Administrator\).  You then end up with random, shredded bits instead of files.

 

What You Can Do About It

      1.  Have multiple layers (and different Anti-Virus engines) of malware scanning in place.  The firewall, your mail server/email gateway, and the desktop.  That means a different vendor, using a different Anti-virus engine for your firewall, your mail server/email gateway, and your endpoint Anti-Virus.Layered Security

 

 

 

 

2.  Have Security Awareness Training in place.  Follow up with random simulated phishing attacks, which will keep them on their toes, and aware of security.

Security Awareness Training

 

 

 

 

You can’t stop CyberCriminals from targeting you, 
But you can be prepared for their arrival, and have full shields up.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Beware of Juice-Jacking

May 11, 2015 by The T By D Team Leave a Comment

 

Beware of Juice-JackingBeware of Juice-Jacking

 

In this age of everything and everywhere digital, more and more public places are providing conveniences for your laptop and smartphone.

Airports, hotels, and some shopping malls now provide free charging kiosks to charge up  your laptop or smartphone, provided you have a USB cord.

Juice Jack Charge

 

But they are just another way you can get jacked!

These publicly-available devices could be configured to read most of the data on your phone, and perhaps even upload malware.

 

What Is Juice-Jacking?

Juice-Jacking:  The illegal downloading of data from a smartphone while it is recharging at a free charging kiosk at an airport or other location.

Juice-Jacking was identified by Black Hat in 2013 as the #1 threat for identity theft and malware for mobile device users.

USBRegardless of the kind of smartphone you have (Android, iPhone, Blackberry, etc.) there is 1 common feature they all have – the power supply and the data stream pass over the same cable.  Whether you’re using the now standard USB miniB connection, or Apple’s proprietary cables, it’s the same:  the cable used to recharge the battery in your phone is the same cable used to transfer and sync your data.

With data and power on the same cable, this offers a way for a malicious user to gain access to your phone during the charging process.  This process, leveraging the USB data/power cable to illegitimately access the phone’s data and/or inject malicious code onto the device, is what is referred to as “juice-jacking”.

Being “juice-jacked” could be a simple invasion of privacy, where your phone pairs with a computer concealed within the charging kiosk, and private information such as photos, contact information are transferred to the malicious device.  Or, it could be an injection of malicious code onto your device.

Juice Jack Free Charge

At the 2011 DefCon (a massive hacker conference held each year in Las Vegas), at least 360 attendees plugged in their smartphones to a charging kiosk built by the same guys who run the infamous Wall of Sheep (a public shaming exercise at DefCon aimed at educating people about the dangers of sending email and other online communications over open wireless networks).  The charging kiosk was built to educate the attendees about the potential perils of juicing up at random public kiosks.  To attract passerby’s, the kiosk was equipped with a variety of charging cables to fit most popular wireless devices.  When no device was connected, the LCD screen on the kiosk displayed a blue image and “Free Cell Phone Charging Kiosk”.  When a device was plugged in, the LCD screen changed to display a red warning sign reading:

Juice Jack Dont Trust

You should not trust public kiosks with your smart phone.  Information can be retrieved or downloaded without your consent.  Luckily for you, this station has taken the ethical route and your data is safe.  Enjoy the free charge!”

 

Brian Markus explained the motivation behind the experiment:

We’d been talking about how dangerous these charging stations could be.  Most smartphones are configured to just connect and dump off data.  Anyone who had an inclination to, could put a system inside one of these kiosks that when someone connects their phone, can suck down all of the photos and data, or write malware to the device.”

One attendee was so shocked by the kiosk that he sent an email to everyone in his company stating they were now required to bring power cables and/or extra batteries on travel, and no longer allowed to use charging kiosks for smart devices in open public areas.

 

What’s The Safest Way to Charge?

The safest way to charge your device, in and out of the workplace/home, is to use the supplied power cord that plugs into a regular electrical outlet.  

If you absolutely have to use a random charging kiosk, completely power off your device before you plug into the kiosk.  However, this only help to prevent data transfer on a small number of devices.

 

What Does This Mean To Me?Cyber Security

In recent years, there have been many, much more malicious, malware and viruses released.  Cyber attacks are on the rise.  Estimates show that CyberCriminals release 3.5 new threats targeting small and medium businesses every second.

  • Small businesses are now the target of 31% of all cyber-attacks.
  • There are approximately 5 cyber attacks every second.
  • 29% of small businesses have experienced a computer-based attack that affected their reputations, involved theft of business information, resulted in loss of customers, or experienced network and/or data centre downtime.
  • In 60% of cases of cyber attacks, attackers are able to compromise a business within minutes.

Businesses need to educate their employees, and block malicious attacks before mobile malware enters its system through infected devices.  Businesses must ensure network layer Data Leakage Prevention (DLP) to prevent the outflow of user/corporate data.

  • 23% of recipients still open phishing emails.
  • 11% of recipients click on the attachments.

Businesses are still slow to install software patches.

  • An overwhelming majority of cyber attacks exploited known vulnerabilities, where the patch had been available for months prior to the breach!
  • 68% of security breaches took months or years to discover.
  • 69% of breaches were discovered by an external party.

 

You can’t stop CyberCriminals from targeting you.
But you can be prepared for their arrival, and have full shields up.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: ALERTS, FAQ, Featured

FBI ALERT: Nepal Earthquake Scams

May 7, 2015 by The T By D Team Leave a Comment

FBI Logo

FBI ALERT:  

Nepal Earthquake Scams

 

 

CyberCriminals continue to exploit the devastating
Nepal earthquake,
and the even more devastating loss of lives.

CyberCriminals are using the disaster in Nepal to trick people into clicking on links, on Facebook, Twitter, and phishing emails.  They say they are trying to solicit charitable giving for the earthquake victims.

They are trying to get your money, but their intentions are anything but charitable…

The scams that are exploiting the disaster are so abundant, and have victimized so many people, that the FBI has issued a public warning about the scams.

Here are some examples:

Facebook pages ‘dedicated to victim relief’.

These pages contain links to scam websites.

Nepal Earthquake Facebook Scam

 

 

 

 

Tweets with links to ‘charitable websites’ soliciting donations.  

The links are really spam links or links that lead to your PC or other device being infected with malware.

SaveNepal Scam

 

 

 

 

 

Emails requesting donations to the Nepal Earthquake Fund.  

These are really phishing emails, which lead to your PC or device being infected with malware.

Phishing Email Example

 

 

 

 

Be Wary of Anything You Receive About

the Nepal Earthquake.FBI Fraud Alert

 

The FBI Issued The Following Guidelines Before Making a Donation of Any Kind:
  • Do not respond to any unsolicited (spam) incoming emails, including by clicking links contained within those messages, because they may contain computer viruses.
  • Be cautious of individuals representing themselves as victims, or officials asking for donations via email or social networking sites.
  • Beware of organizations with copycat names similar to, but not exactly the same, as those of reputable charities.
  • Rather than following a purported link to a website, verify the existence and legitimacy of non-profit organizations by using Internet-based resources.
  • Be cautious of any emails that claim to show pictures of the disaster area in attached files, because those files may contain viruses.  Only open attachments from known senders.
  • To ensure that contributions are received and used for intended purposes, make donations directly to known organizations rather than relying on others to make the donation on your behalf.
  • Do not be pressured into making contributions; reputable charities do not use coercive tactics.
  • Do not give your personal or financial information to anyone who solicits contributions.  Providing such information may compromise your identity and make you vulnerable to identity theft.
  • Avoid cash donations if possible.  Pay by debit or credit card, or write a check directly to the charity.  Do not make checks payable to individuals.
  • Legitimate charities do not normally solicit donations via money transfer services.
  • Most legitimate charities maintain websites ending in “.org” rather than “.com”.

 

If you would like to donate the the Nepal earthquake victims:

        1.  Go to the website of the charity of your choice and make a donation.  

              Type the address in your browser.  

             DO NOT CLICK on any links in emails, texts, or tweets you might get.

        2.  Check out the Canadian Red Cross or American Red Cross.  

              They can tell you how you can donate to the Nepal Region Earthquake Fund.  

              **Note:  the Government of Canada will match eligible donations made to Nepal Region Earthquake Fund made through the Canadian Red Cross.

 

You can’t stop CyberCriminals from targeting you.
But you can be prepared for their arrival, and have full shields up.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

 

Filed Under: ALERTS, Featured

ALERT: Nepal Earthquake Scam

May 1, 2015 by The T By D Team Leave a Comment

ALERT:  

Nepal Earthquake Scam

CyberCriminals will use anything and everything to try to lure people into becoming victims. 

Nepal Earthquake

The devastating earthquake that took place in Nepal is no exception.
More than 5,000 people dead and counting.
 
And you can also count on CyberCriminals to exploit the human suffering.

 

CyberCriminals are using the Nepal disaster to lure people into clicking on links, both on Facebook and Twitter.  

They are also sending phishing emails trying to solicit “charitable giving” for the earthquake.

Some Examples:

1.  Facebook pages dedicated to Nepal earthquake victim relief.  

These pages actually contain links to scam websites.

Nepal Earthquake Facebook Scam

 

 

 

 

2.  Tweets going out with links they state are for “charitable websites soliciting donations”.

In reality, these links result in your computer being infected with malware.

3.  Phishing emails asking for donations to the Nepal Earthquake Fund.

Phishing Email Example

 

 

 

4.  Fake charity website donation pages to trick people into sending them money, thinking they are making charitable donations that will help the people of Nepal.  

One example of a fake donation page is:  www.savenepagl.org.  This is a copy of the website www.actionaid.org.uk, which is a legitimate charity organization currently accepting donations to help the people of Nepal.  (Note:  I have purposely not provided the link to the fake donation page.  I have provided the link for the legitimate charity organization)

SaveNepal Scam

 

 

 

 

 

 Previous disasters have been exploited like this, but CyberCriminals are pulling out all the stops on this one.  
Be very cautious of anything about the Nepal Earthquake in the following weeks.
Please warn your employees, coworkers, friends and family about these scams.

 

If you wish to make a donation for victims of the Nepal Earthquake:

        1.  Go to the website of the charity of your choice and make a donation.  

              Type the address in your browser.  

             DO NOT CLICK on any links in emails, texts, or tweets you might get.

        2.  You can also check out the Canadian Red Cross or American Red Cross.  

              They can tell you different ways you can donate to the Nepal Region Earthquake Fund.  

              **Note:  the Government of Canada will match eligible donations made to Nepal Region Earthquake

              Fund made through the Canadian Red Cross.

 

You can’t stop CyberCriminals from targeting you.
But you can be prepared for their arrival, and have full shields up.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 15
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in