Defense Against Crime

15/05/2017

Ransomware Attack!


If you have not watched the news, or just haven’t paid attention, there is a worldwide ransom-ware attack that began last week and may continue this week. The New York Times has an active map showing where all the attacks have been happening. You can google it or see this link  (https://www.nytimes.com/interactive/2017/05/12/world/europe/wannacry-ransomware-map.html?_r=0)

If you want to keep up to date on the latest on this event, just watch the news or do an internet search on the topic.

If you want to know more about Ransom-ware we have written about this before. You can open these previous posts.

Victims of ransomware usually receive an e-mail or some other type of electronic message that asks them to download or run software. Some of these e-mails may appear as if they were coming from someone you know, or can even come from a software hack (like a cracked version of some game or popular software).  When you run the software and it appears that NOTHING is happening, .. something is.WannaCrypt

The software will encrypt your hard drive, or encrypt part of your hard drive so that your computer is still operable and you can continue to use it, but you cannot access all your personal files. This includes all personal documents, images, music files.

If you are the victim of a ransomware attack you’ll open your computer and instead of your normal files you’ll see a pop-up appear that says, ‘Surprise, we’ve taken control of your computer and if you want access to your files you need to pay us.'”

 Here are some things you can do to prevent being a victim.

  1. Please update your computer security software as soon as releases are available. It’s best to set it to auto update.
  2.  Please run all software and OS patches. Again please set it to auto update.
  3. If you value your files back up your computer on an external drive on regular intervals. You may want invest in a cloud backup service. You can search for and review them.
  4.  Finally, just be very vigilant you need to constantly look out for emails that seem suspicious, and you need to err on the side of not downloading random files. Delete them. We often receive random invoices, and reports that seemingly credible companies send us. Like Bank of America, or UPS. Sometime I get invitations to download a file from a cousin.  If you know the e-mail is fake, delete it.  You can always verify before opening any attachment that your cousin actually did send the files

We are dedicated to providing you with the best and most affordable self-defense products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime. If you want to take personal responsibility for self-protection, home security, business security, purchase our high quality discount self-defense products and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell, Onyx Knight Enterprises

09/01/2017

Free Government Money…Really?


I few years ago, I received a phone call from a person who enthusiastically told me that I has won a FREE Government Grant.  With the FREE Money I could pay off debt, stat a business and on an own. It was a program set up by some government agency.  I’m not going to re-tell the story as I’ve already written about it and you can click the link to read. it.

Well the other day I received this e-mail

emailscam

 

Needless to say that this looked familiar. Ronald Regan said ” The nine most terrifying words in the English language are: ‘I’m from thegovernment and I’m here to help'”. While I think the Federal Government does do a lot of good, there are many people who are often fooled by these scams because they are aware of how much money they government does waste.  But know they Congress does waste lots of money, but usually entities apply for it, and Congress grants it to those entities.  Government grants are not freely given to individuals. They only individual grants I know of are educational grants for students, but these come from money allocated to the Department of Education. Grants are given to organizations and corporations who apply for them.

Is the government giving away free money….NO!

Are there organization that give money to help people..YES.

What is likely the case… They want your money by asking for a FEE for this FREE money, or they want your personal information for identity theft.

WHAT TO DO!

  1. Research the offer or company.. google them
  2. Report them to the FTC if necessary
  3. Make them as SPAM

 

 

PepperEyes Self-Defense, Safety and Security Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products. Survival kits  and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.

 

17/10/2016

Spotting a Potential E-Mail Hack

Filed under: Cyber Crimes,SCAM ALERT — peppereyes @ 1:06 PM
Tags: , ,

capture

scamWith all the talk if Russians or other foreign entities I thought I would like to tell you how
such hacking can take place.

I received this e-mail that is suppose to be from someone I know Jerry Swindell, who stays in the United States.  But note these items.

  1. E-mail from Jerry Swindell has an e-mail from Charles Davidson.  I actually have Jerry’s E-mail and this is not his.  First Read Flag.
  2. 2) Notice that is has the usual virus hook which take the form of ‘Check This Out’, ‘See What I found out about you’, ‘Want to see something funny’  or any similar  lines
  3. The E-mail Link would make you think it’s a story about someone you know ..My friends Richard Channing.  However, there are two letters you need to notice..’ru’. My friends Jerry says in New Jersey. He has two e-mail addresses both ending in .com.

It would be fair to say that there is highly probably that this is a malicious e-mail, and YOU SHOULD NOT CLICK THE LINK…OR ELSE>

Many Cyber Security attacks can be avoided  if you just pay attention.

  1. Delete the E-mail
  2. Add Address to your junk mail filter

 

You have been warned….

 

 

01/09/2016

BACK UP YOUR FILES BEFORE DISASTER STRIKES


Backing up has become more important than ever, thanks to cyber-attacks like ransom-ware or having a natural disaster like a flood or tornado.

If you are a regular reader here you already know how pervasive and frustrating ransom-ware is. If you’re new to our blog, here is a bit of background – Ransom-ware is one of the newest attack method in the malware world. It can be pulled off with great ease as all a hacker has to do is buy some premade ransom-ware kit from malware creators on the dark web. Then he or she distributes the malicious code, usually by way of email attachments, but as we have explained earlier, ransom-ware can also get onto systems via security holes, or vulnerabilities in outdated system software. When the ransom-ware code is executed by say, clicking that infected link in an email, it begins to encrypt all the files on your computer or device. That’s when you’ll get a notice from the ransom-ware creators, letting you know that your files have been encrypted and if you want to retrieve them you’ll need to pay them in untraceable bitcoins ($hundreds to thousands of dollars).

You have two choices, pay to perhaps get your files back, or not pay…and loose EVERYTHING you have on your computer!  The sad truth is that even if you pay you may not get your files back because once they have been encrypted, they can only be un-encrypted with the correlating key – which the hackers have and aren’t about to give to you.

If you have been meticulous in backing up your files, data, pictures and whatever else you have that’s precious to you, then you can stand your ground and walk away.

Make multiple backups

Before we delve into the different backup methods out there, it’s important to note that you should have more than one backup of your files stored in different places to ensure that you are completely covered.

Types of backup

Cloud-based backup – You are probably familiar with cloud storage like Google Drive and s9ihizonvcfhc0wndarsDropBox. The idea here is that your files are stored in the Google or DropBox cloud respectively and you can access them from anywhere that you can log into your account. These services are great for sharing pictures and collaborating on documents and presentations but they aren’t really designed for heavy duty, let alone automatic backup. Instead, look for a cloud based backup that automatically backs up all your files and folders. Some important features to watch out for:

  • Unlimited storage.
  • Folder syncing and sharing.
  • Continuous backup throughout the day automatically.
  • Available for smartphone.
  • Price tag factor – some plans like Carbonite can run at about $60 per license per year and others can run over $120 or more per year depending on the level of service or options you choose

Do your research and find the service and plan that fits your needs best and go with it! Some of the best plans out there are: Crashplan, SOS Online Backup, Backblaze, SugarSync, Spideroak , Carbonite, and iDrive.

iDrive is the PCMag Editor’s choice for 2016: (http://www.pcmag.com/article2/0,2817,2288745,00.asp)

“It has been one of the more ambitious online backup and cloud-based syncing service services in recent years, offering not only some of the most attractive pricing plans, but also a multitude of features in clear desktop, mobile, and Web applications.”

Local backup – Your other option is to back up to an external hard drive or a flash drive. This method is a bit less user-friendly as it cannot be done automatically and since flash drives are so small, they tend to get lost easily. But it’s not a bad idea to have a physical backup of your digital stuff.  You can purchase external drives, you just have to be careful not to leave them connected AFTER you backup.

PLEASE NOTE: Ransom-ware can affect every file on every drive on your computer, and even cloud drives like Dropbox. If you get infected with Ransom-ware, your backups can be affected as well. So please discount them when not using them.

 

When it comes to ransom-ware, follow our mantra “Backup, don’t pay up”.

11/05/2016

The Microsoft Support Phone Scam.Again!


The Microsoft Support Phone Scam

Yesterday at work my cell phone rang.  The call number was (646) 612-3456.  I answered the call, and it was from a lady who was claiming to be from Microsoft Technical Support.  The lady claimed that there was something wrong with my home computer, and that she was going to give me steps to fix it.

Now the lady at a thick foreign accent, and was obviously in a room full of other people making similar calls from the background noise.

I knew this was a scam, and told her that my computer was Commodore 64.  She apologized and hung up.

This is a very old scam, and I get about two of these every year.

Microsoft has a link on their site to help you understand and deal with this computer scam.  I

 

https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx

 

Now here are some fun things you can do

  • Repeat everything they say to you, back to them
  • Pretend to go along, but ask question, like what is a mouse, or where is the ‘E’ key.
  • If they ask of personal information, ask for their personal information, and just pretend to be one of the Simpsons.
  • Tell them you are with the Federal Task Force on Cybercrime, and agents are on their way to arrest them. They are to put their hands up, and prepare to be arrested.
  • Make up something fun to do.

PepperEyes Self-Defense, Safety and Security Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products. Survival kits  and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option

 

Next Page »

Blog at WordPress.com.

%d bloggers like this: