One of the things we often see when we work on clients’ computers is a covered webcam – usually with a strip of tape, occasionally with a post-it note, band-aid, or, in some more extreme cases, with paint or nail polish. It’s understandable to see a camera lens pointed at you and wonder what it’s doing. After all, how do you know somebody’s not watching it right now? This made the national news last year when FBI director James Comey, following advice he’d seen online, admitted he taped over the camera on his computer. This might very well leave you wondering if this is something we need to worry about or do in our daily lives.
Email scammers are finding new opportunities with to trick unsuspecting victims into downloading malicious software with the recent release of Windows 10. Tech news sites are filled with stories about the new Microsoft operating system release, and many of our clients are excited to get it onto their computers. Some of our clients are reporting fake Microsoft emails from scammers that claim to have the entire Windows 10 upgrade attached.
on 08-28-201508:30 AM - last edited on 07-28-201609:47 AM by rstyle
As summer winds down, students everywhere are looking for school supplies and picking out the perfect backpack. But just having enough pens and notebooks isn’t enough anymore. Students of all ages are finding they need some tech in their backpacks too. Now is a good time to ensure all that technology is ready to go back to school as well.
Agent Alex has been following news about the Cryptowall, Cyptolocker and Crowti malware as part of his service as a member of our Technical Tools Team. He reached out to say that there have been some recent developments to which we should pay attention. Let’s let him tell it.
It can happen in an instant. You click on an attachment from Granny and the next thing you know you are watching your files getting locked up before your eyes. Then an important-looking message pops up on your desktop demanding you pay a substantial fee to a group you’ve never heard of using a online payment method. They make it clear – pay now or you’ll never see the precious photos of your Chihuahuas again.
on 01-31-201410:53 PM - last edited on 05-04-201610:33 PM by Crystal-BBY
Last summer, Agent Derek M wrote a post for this blog on a popular “infected computer” phone scam. It turns out that there’s a new, more costly twist on this con. Because this new twist is dangerous and more costly to remediate, we thought we would reach out and reiterate some of the points Derek made in his post on the subject last June.
Our Agents are finding that clients we serve have become more savvy web users and have generally gotten better at avoiding malware like viruses and spyware in their travels down the Information Superhighway. But many clients still come to us asking why their system has slowed down without their antivirus program detecting any new malware infections.
About three years ago, a message began circulating in cyberspace saying that Geek Squad had discovered a Facebook app called “the Christmas Tree App” and we thought it was “one of the worst viruses ever.” This was a hoax.
Imagine this – you are sitting at home minding your own business when you receive a phone call from an official sounding person telling you that your computer is seriously infected with viruses. They say they will help you out and eliminate the viruses if you will provide a credit card number.
Apple computer users have mostly flown under the “malware radar” for years. For a variety of reasons, the Mac operating system (OS) wasn’t targeted by hackers as much as Windows was, and Mac users were able to browse the Web largely unaffected by infections. But as Apple’s share of the computing market has grown, cyber-criminals have set their sights on the Mac OS.
For gamers, few things are as aggravating as losing a game because your computer lagged at the wrong moment. Getting the most out of your PC gaming system doesn’t mean you have to buy the most expensive hardware available. You can reduce slowdowns and increase your fun with some basic computer optimization.
So you’re sitting there, innocently using your computer, when a window flashes on the screen, bearing the logo of the FBI. You’ve been locked out of your computer for breaking some not-too-specifically-identified copyright law. The solution on the screen? Pay a fine to the “FBI” to “unlock” your computer and use it again.