Latest Blog Posts & News
Wednesday, April 2nd, 2014 at 4:15 pm
Malware is something of which all computer users have a vague notion. This is simply a blanket term for malicious software and there are several common types of malware that are infecting computer systems around the world.
A virus is a type of malware that most computer users have heard about and probably have had end up on their computer. This is a bit of code that replicates and attaches to file, programs or your hard drive. You can get a virus from a corrupted email link, from clicking on a pop-up ad or from downloading software from the Internet. Viruses can slow down the speed of your computer, corrupt files, steal space from your hard drive or harm programs installed on your computer.
A worm is another type of malware and like a virus it can replicate itself, but it doesn’t have to attach to anything in order to replicate. With a virus, you have to activate and executable file in order to download the virus. So if you open an email, but don’t click on or run the file you won’t get the virus. Worms can spread without an executable file. Worms have been used to crash Web servers and computer networks as well as to gain control of a computer remotely.
Surprisingly, viruses and worms are not the most common type of malware out there. The Trojan horse accounts for nearly 70% of malware. A Trojan is similar to a virus in that this too is a string of malicious code, but a Trojan does not self-replicate. Instead it carries out a specific action, which is determined by the person who wrote the code. It’s called a Trojan horse because it is usually disguised as something useful or fun, such as computer game. You download the game, but what you are really receiving is malware. Some malware creators use Trojan horses as backdoors into a computer system. Once the backdoor is open, they can access your system and steal crucial data, passwords, financial information and more.
Spyware is yet another type of commonly seen malware. This is a type of software that gathers up information about you or a company or a computer network without anyone’s knowledge. A Trojan horse can be a type of spyware. Spyware doesn’t replicate and isn’t set up to destroy or corrupt your files, but instead seeks to gain information about you, such as your browsing history, your credit card numbers and other personal information for identity theft. The recent cyber-attack on Target is an example of how dangerous spyware can be.
In order to prevent malware attacks on your own computer or computer network, it’s best to construct a good defensive plan. For instance, never download something from the Internet unless you trust the source and have run the file through your anti-virus software. If you see one of those ominous pop-ups that claim your computer has a virus or your files have been corrupted, open up your task manager and shut down the pop-up. These are scam ads designed specifically to download viruses or Trojans to your computer and they are not coming from your anti-virus software.
Your email is a hotbed of virus activity as well, so be careful what you click on. Virus emails often come from a source not listed in your contact. Often our spam filter will catch the email, but not always, so if you see an odd-looking sender, chances are it’s someone trying to infect your computer. However, our friends and our contacts sometimes accidentally download a virus and the virus immediately replicates and sends itself to you via email. If a contact sends you a link that seems odd, maybe it has a weird subject line or perhaps no subject or the text of the email is odd and asks you to click on a link, it’s almost always a scam. If you don’t click on the link, you won’t get the virus, so just delete the email.
It’s also wise to install anti-virus software, preferably with a firewall. You only need one anti-virus program for your computer. You won’t be better protected if you have two or three virus programs, just research the software available and select one with top reviews. Be sure to allow the program to make updates, as these updates increase your overall level of security. In general, all updates help increase security, so when Firefox or Explorer asks you to make an update, this will help make you a more secure Internet user.
If your computer is already corrupted, simply contact GeeksAKnockin today and we can set up a time to come out and remove all the malicious software on your computer or network. Not only will we remove the malware, we will perform a comprehensive audit of your computer or network to find areas of vulnerability. This can help you prevent malware infection in the future. We also evaluate your computer to verify that it is performing normally and that security patches have been installed.
Tuesday, November 12th, 2013 at 8:36 pm
We wanted to make you aware of some more email scams we’re seeing, and pass along the information so you can keep yourself protected.
One is involving “.TIFF or .TIF” files. This is a picture format that is often used by graphic artists and the publishing industry. There is a specific vulnerability that is circulating by using these files, that when an infected file is opened it allows the attacker to gain remote access to the computer. At the time of this email, Microsoft does not have a patch for this. It affects specific versions of Windows and Office, but our recommendations are to avoid opening these files in general, as with any file, unless you are expecting it from the sender.
For more detailed information from Microsoft you can read their release here: http://technet.microsoft.com/en-us/security/advisory/2896666 (This is a safe link we are providing)
The other email scam we are seeing is a general phishing scam, but the sender has been spoofed to look like the email has been sent from within the company or by a company you know. This can be particularly deceptive as employee may think you’ve sent out an update and click on these links which are likely infected with a virus or malware.
Here’s a screen shot of an email that GeeksAKnockin’ received just to show you how real it can look. We actually did not send this email internally but it looks as if we did. Again, if at any time you are unsure or have any question about an email with an attachment be sure to ask the sending party if they really did send it.
Tuesday, October 15th, 2013 at 3:46 pm
We wanted to make you aware of a virus that is making the rounds and can have devastating effects on the data on your computer.
The name of the virus is called Cryptolocker, and one of the ways we are seeing it deployed is through emails called phishing scams. These emails may look like they are from reputable sources such as FedEx, Intuit/ADP Payroll, IRS tax notices and have subjects or information designed to trick a user into clicking a link or attachment. For example, they might say ‘Your payroll failed to process, please see the attached report for important information’.
If you suspect any email, especially those with links to click in the body of the email or an attachment, to be suspicious we highly recommend you do not open these. If you get a notice such as these and are concerned they may be valid (for example, you just shipped something with FedEx and you get a ‘your shipment was lost’ type of notice), we always recommend going directly to the vendor’s website to check status directly.
The issue we are seeing with Cryptolocker is that it “locks” up all the user files and documents on the computer, and essentially holding them “hostage”, claiming it needs a set amount of money from you to pay the ransom (there are conflicting reports about if this actually works to unlock the files or not) for your files back. We are successfully able to remove the virus itself from your computer, but the files ARE GONE. There is no way to recover them unless you have a good backup.
We recommend that you do not open any emails that you are not expecting, especially those that contain attachments from companies that would not normally send them. When in doubt, contact the sender or the company directly.
If you would like to review your current backup/disaster recovery configuration, let us know and we will contact you to discuss. We recommend review of this information at least annually.
Here are a few examples of phishing emails. None of the following are legitimate emails, each has an attachment that likely contains a virus. Some of them look very real, even the name of the sender looks real, or they use logo’s from real companies.
If you click on each image it will enlarge it for viewing.
Lastly, here is the pay now screen some are seeing when they do have this virus:
We hope you remain unaffected by this virus, however, if you encounter this virus on your computer, unplug the network cable from the computer as soon as you can. This will not prevent infection, but may prevent spreading it across your network to other computers. Do not turn off the computer or attempt removal of the virus yourself – tampering with this virus can result in permanent loss of data. Then call us for help.
Wednesday, August 28th, 2013 at 4:47 pm
You are in the middle of printing invitations to an upcoming birthday party and suddenly the printer stops working. You check the paper tray, pull open the ink drawer and replace ink, yet are unable to get it fixed. You decide to give the tech support number a call for some help.
You go online and use your favorite search engine and type in “hp printer support number” (or whatever printer you may have), and suddenly are faced with a ton of choices! Which one is correct? One of them? All of them?
What you see on a simple search for a support number is actually quite deceptive. This is not because of the actual printer manufacturer themselves, but unscrupulous practices from companies that are not often even in the United States.
Here’s a couple screen shots taken from both Google and Bing with the search term “hp printer support number”. Both are the first results that would come up for a consumer. On the Bing search I count SEVEN different phone numbers, which I’ve circled in red. On the Google search there are TWELVE, also circled in red.
NONE of these numbers are for the official company HP. Every single one leads you to a company other than HP, some that are not even based in the United States.
Bing Search HP Support
Google Search HP Support
What happens when you call one of these companies then? Some may immediately want a credit card to bill you for tech support, others may want to install a remote application to access your computer to provide their support. From here, they will suggest they run tools and make sure your computer is up to date, or suggest that possibly you have a virus or errors on the computer that’s causing your printer to not work.
The next thing you know, they are running their “tools” and you watch the flashing screen and red text exclaiming you have viruses and errors. It may look something like this:
Then they will suddenly demand payment for them to clean up the computer, or fix your initial problem – remember what that was? Oh yes, the printer! You can see how they suck you into this terrible scam.
Even if you don’t pay, and decide to hang up the phone right then, they’ve now put their software on your computer, which often disables your antivirus, and continues to cause problems until it is removed. Or they’ve baited you into one of their “contracts” paying either yearly or monthly, and nearly impossible to get out of, or you find they do nothing to help in the long run.
Going back to the original problem, that printer that suddenly decided to stop printing, what is a consumer to do? We have a few ideas for you:
- If you are sure your printer is under warranty, you can try to contact the manufacturer directly. Instead of searching for a support phone number through a search engine, go directly to their website instead and find their support information that way. Some may even have FAQ resources to read through, so that you can attempt to fix the problem on your own, at no cost to you.
- Call a known and familiar company like GeeksAKnockin’!
We’d also like to point out this same advice goes for any sort of support you might be looking for online. If you look for support numbers by doing a search most of the time the numbers listed are fake. Most companies tend to bury their support numbers on their websites to make the consumer search a bit for them, but these fake companies have taken full advantage of this hassle and used search engines to get their numbers in the open, hoping the consumer won’t try to go any further and just call them. Best advice is to always go to the website of the company you are trying to locate, or refer to your manual or paperwork to find contact information.
In a future blog we’ll provide a list of working links to some of the major tech companies for your use. Please let us know of any specific ones you’d like us to include and we’ll do our best to help you with that!
Tuesday, August 13th, 2013 at 9:41 pm
We are letting you know of a current scam that is affecting a lot of our customers recently. You may get a call from someone or a company claiming to be Microsoft, telling you they need to gain remote access to your computer to either fix it or review some problems. After they’ve gained access they will run programs that will make it look like your computer is infected or has serious errors that need to be fixed and often will start demanding money or for you to input a credit card.
One of our own tech’s had a call like this a few months ago, and pretended to walk through some of the requests with the scammer, just to understand how they work. They will sound very convincing and often for someone who may not be technical this can sound extremely upsetting.
Please know that Microsoft will NEVER call you directly to fix your computer. Do not allow anyone claiming to be from Microsoft or other agency access to your computer, especially if they call you randomly.
Here’s more information from Microsoft about these phone scams: http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx
We’ll be starting a series of blog posts with more information on how to protect yourself and what to look for.
Friday, March 29th, 2013 at 11:54 pm
|In this study we will be identifying the basic anatomy of the ubiquitous yet oft misunderstood critters known as Internet browsers. Continue reading
Friday, January 11th, 2013 at 12:47 am
By now, many users have an opinion on Windows 8. Some love it, some hate it, some are indifferent but nevertheless confused with its use. Or, perhaps you’re considering a new computer but are unsure if Windows 8 will be a good fit. In any event, this latest manifestation of the so-far-familiar Windows operating system seems to be stirring up quite a storm. Most of the strife though, as we’ve just hinted, is in response to the drastic changes in the user interface. Once past these, it’s a pretty neat operating system that enjoys marked improvements in performance over its predecessors. Below are links to a couple articles that contain many important and useful tips and tricks for working with Windows 8.
Thursday, November 1st, 2012 at 12:01 am
Computers and technology can be confusing. Even more so if one does not understand the terminology. Continue reading
Thursday, October 11th, 2012 at 9:41 pm
Fake websites are becoming more and more prevalent these days. Continue reading
Thursday, September 27th, 2012 at 6:46 pm
We use our cell phones for just about everything these days. Now, with the help of some new apps, you can use your phone as a document scanner. Continue reading