Latest Blog Posts & News
Tuesday, November 12th, 2013 at 8:36 pm
We wanted to make you aware of some more email scams we’re seeing, and pass along the information so you can keep yourself protected.
One is involving “.TIFF or .TIF” files. This is a picture format that is often used by graphic artists and the publishing industry. There is a specific vulnerability that is circulating by using these files, that when an infected file is opened it allows the attacker to gain remote access to the computer. At the time of this email, Microsoft does not have a patch for this. It affects specific versions of Windows and Office, but our recommendations are to avoid opening these files in general, as with any file, unless you are expecting it from the sender.
For more detailed information from Microsoft you can read their release here: http://technet.microsoft.com/en-us/security/advisory/2896666 (This is a safe link we are providing)
The other email scam we are seeing is a general phishing scam, but the sender has been spoofed to look like the email has been sent from within the company or by a company you know. This can be particularly deceptive as employee may think you’ve sent out an update and click on these links which are likely infected with a virus or malware.
Here’s a screen shot of an email that GeeksAKnockin’ received just to show you how real it can look. We actually did not send this email internally but it looks as if we did. Again, if at any time you are unsure or have any question about an email with an attachment be sure to ask the sending party if they really did send it.
Tuesday, October 15th, 2013 at 3:46 pm
We wanted to make you aware of a virus that is making the rounds and can have devastating effects on the data on your computer.
The name of the virus is called Cryptolocker, and one of the ways we are seeing it deployed is through emails called phishing scams. These emails may look like they are from reputable sources such as FedEx, Intuit/ADP Payroll, IRS tax notices and have subjects or information designed to trick a user into clicking a link or attachment. For example, they might say ‘Your payroll failed to process, please see the attached report for important information’.
If you suspect any email, especially those with links to click in the body of the email or an attachment, to be suspicious we highly recommend you do not open these. If you get a notice such as these and are concerned they may be valid (for example, you just shipped something with FedEx and you get a ‘your shipment was lost’ type of notice), we always recommend going directly to the vendor’s website to check status directly.
The issue we are seeing with Cryptolocker is that it “locks” up all the user files and documents on the computer, and essentially holding them “hostage”, claiming it needs a set amount of money from you to pay the ransom (there are conflicting reports about if this actually works to unlock the files or not) for your files back. We are successfully able to remove the virus itself from your computer, but the files ARE GONE. There is no way to recover them unless you have a good backup.
We recommend that you do not open any emails that you are not expecting, especially those that contain attachments from companies that would not normally send them. When in doubt, contact the sender or the company directly.
If you would like to review your current backup/disaster recovery configuration, let us know and we will contact you to discuss. We recommend review of this information at least annually.
Here are a few examples of phishing emails. None of the following are legitimate emails, each has an attachment that likely contains a virus. Some of them look very real, even the name of the sender looks real, or they use logo’s from real companies.
If you click on each image it will enlarge it for viewing.
Lastly, here is the pay now screen some are seeing when they do have this virus:
We hope you remain unaffected by this virus, however, if you encounter this virus on your computer, unplug the network cable from the computer as soon as you can. This will not prevent infection, but may prevent spreading it across your network to other computers. Do not turn off the computer or attempt removal of the virus yourself – tampering with this virus can result in permanent loss of data. Then call us for help.
Wednesday, August 28th, 2013 at 4:47 pm
You are in the middle of printing invitations to an upcoming birthday party and suddenly the printer stops working. You check the paper tray, pull open the ink drawer and replace ink, yet are unable to get it fixed. You decide to give the tech support number a call for some help.
You go online and use your favorite search engine and type in “hp printer support number” (or whatever printer you may have), and suddenly are faced with a ton of choices! Which one is correct? One of them? All of them?
What you see on a simple search for a support number is actually quite deceptive. This is not because of the actual printer manufacturer themselves, but unscrupulous practices from companies that are not often even in the United States.
Here’s a couple screen shots taken from both Google and Bing with the search term “hp printer support number”. Both are the first results that would come up for a consumer. On the Bing search I count SEVEN different phone numbers, which I’ve circled in red. On the Google search there are TWELVE, also circled in red.
NONE of these numbers are for the official company HP. Every single one leads you to a company other than HP, some that are not even based in the United States.
Bing Search HP Support
Google Search HP Support
What happens when you call one of these companies then? Some may immediately want a credit card to bill you for tech support, others may want to install a remote application to access your computer to provide their support. From here, they will suggest they run tools and make sure your computer is up to date, or suggest that possibly you have a virus or errors on the computer that’s causing your printer to not work.
The next thing you know, they are running their “tools” and you watch the flashing screen and red text exclaiming you have viruses and errors. It may look something like this:
Then they will suddenly demand payment for them to clean up the computer, or fix your initial problem – remember what that was? Oh yes, the printer! You can see how they suck you into this terrible scam.
Even if you don’t pay, and decide to hang up the phone right then, they’ve now put their software on your computer, which often disables your antivirus, and continues to cause problems until it is removed. Or they’ve baited you into one of their “contracts” paying either yearly or monthly, and nearly impossible to get out of, or you find they do nothing to help in the long run.
Going back to the original problem, that printer that suddenly decided to stop printing, what is a consumer to do? We have a few ideas for you:
- If you are sure your printer is under warranty, you can try to contact the manufacturer directly. Instead of searching for a support phone number through a search engine, go directly to their website instead and find their support information that way. Some may even have FAQ resources to read through, so that you can attempt to fix the problem on your own, at no cost to you.
- Call a known and familiar company like GeeksAKnockin’!
We’d also like to point out this same advice goes for any sort of support you might be looking for online. If you look for support numbers by doing a search most of the time the numbers listed are fake. Most companies tend to bury their support numbers on their websites to make the consumer search a bit for them, but these fake companies have taken full advantage of this hassle and used search engines to get their numbers in the open, hoping the consumer won’t try to go any further and just call them. Best advice is to always go to the website of the company you are trying to locate, or refer to your manual or paperwork to find contact information.
In a future blog we’ll provide a list of working links to some of the major tech companies for your use. Please let us know of any specific ones you’d like us to include and we’ll do our best to help you with that!
Tuesday, August 13th, 2013 at 9:41 pm
We are letting you know of a current scam that is affecting a lot of our customers recently. You may get a call from someone or a company claiming to be Microsoft, telling you they need to gain remote access to your computer to either fix it or review some problems. After they’ve gained access they will run programs that will make it look like your computer is infected or has serious errors that need to be fixed and often will start demanding money or for you to input a credit card.
One of our own tech’s had a call like this a few months ago, and pretended to walk through some of the requests with the scammer, just to understand how they work. They will sound very convincing and often for someone who may not be technical this can sound extremely upsetting.
Please know that Microsoft will NEVER call you directly to fix your computer. Do not allow anyone claiming to be from Microsoft or other agency access to your computer, especially if they call you randomly.
Here’s more information from Microsoft about these phone scams: http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx
We’ll be starting a series of blog posts with more information on how to protect yourself and what to look for.
Friday, March 29th, 2013 at 11:54 pm
|In this study we will be identifying the basic anatomy of the ubiquitous yet oft misunderstood critters known as Internet browsers. Continue reading
Friday, January 11th, 2013 at 12:47 am
By now, many users have an opinion on Windows 8. Some love it, some hate it, some are indifferent but nevertheless confused with its use. Or, perhaps you’re considering a new computer but are unsure if Windows 8 will be a good fit. In any event, this latest manifestation of the so-far-familiar Windows operating system seems to be stirring up quite a storm. Most of the strife though, as we’ve just hinted, is in response to the drastic changes in the user interface. Once past these, it’s a pretty neat operating system that enjoys marked improvements in performance over its predecessors. Below are links to a couple articles that contain many important and useful tips and tricks for working with Windows 8.
Thursday, November 1st, 2012 at 12:01 am
Computers and technology can be confusing. Even more so if one does not understand the terminology. Continue reading
Thursday, October 11th, 2012 at 9:41 pm
Fake websites are becoming more and more prevalent these days. Continue reading
Thursday, September 27th, 2012 at 6:46 pm
We use our cell phones for just about everything these days. Now, with the help of some new apps, you can use your phone as a document scanner. Continue reading
Monday, September 17th, 2012 at 10:50 pm
Google announced today, that beginning November 15th, Google Apps will no longer be supporting Internet Explorer 8 (or earlier versions). If you have Windows XP, you won’t be able to update Internet Explorer to the newest version and will have to use one of the available alternate Internet browsers, such as Mozilla Firefox or Google Chrome. The other option would be to upgrade XP to Windows 7 or replace the machine entirely. Below is a link to a post from the Google Apps team’s blog.