Defense Against Crime

26/06/2017

Amazon E-Mail Scam


Today I opened my Hotmail account and I saw all these cancellation notices from

ComputerScam

Beware the mail in your in-box

Amazon. Now while I am an Amazon user, the items that it said I cancelled, I never ordered. One of these things I did notice was all of the telltale sign that this was fake.

1) I never ordered these books from Amazon. I usually get them on my Kindle.

2) I’m pretty sure Amazon never sends updates (I’ve never gotten one, and I do order from Amazon monthly)

2) If I log unto my Amazon Account these items do not appear.

3) When I hover over then links that take you to a Choctaw.php script on http://androidprocessor.com/wp-content/uploads.    Amazon E-mails go to Amazon.com and NO WHERE ELSE.

WARNING. If you decide to check this out ..don’t blame us for the consequences of what may happen to your computer.

Now I don’t get confirmation E-mails from Amazon, but there are spoof e-mails that are designed to get you to think that you have received legitimate e-mail from Amazon. The e-mail will usually take you to a fake site that only wants to get your personal information, like username and password, social security number, banking info, or other valuable information.

Since the planet just experienced a Malware/Ransomeware attack, let me remind my read you that these types of e-mails is how your computer gets hacked or hi-jacked.  The nice thing was that My Hotmail account had put these in my junk e-mail bin anyways.

Recently computer experts noticed that PHP and Pearl scripts are an ideal platform for evil and malicious web sites. For those of you who are not computer programmers and tech-junkies, PHP is an easy to learn computer (web) Programming language. Almost all Web servers run the PHP engine, so there are large numbers of potential “victims” (though the numbers are not anything near to the number of Windows-using potential malware victims). The most successful malicious PHP scripts permit their users (the criminals) to control and manipulate Web servers for their own benefit and, most commonly, profit.

If you want to know how evil programed use php to commit their crimes, there are many articles on the web for you to read, so we are not going to discuss it here.

HOW NOT TO BE A VICTIM.

  1. Just remember NOT to TRUST ANY E-mail with a link in it. Always over your mouse over it and look at the bottom left of your computer screen to see where it will take you. If it look suspicious, DON’T Click it.
  2. Have your anti-virus and malware software up to date.
  3. Make sure to back up your computer every week.
  4. If you get an e-mail from a company you do deal with, it’s safer to just log into that company’s site and communicate there.
  5. If you do receive an Spoof E-mail from Amazon. Report it. Go to https://www.amazon.com/gp/help/customer/display.html?nodeId=15835501  To get the instructions.

 

PepperEyes.com Self-Defense Products is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.

15/05/2017

Ransomware Attack!


If you have not watched the news, or just haven’t paid attention, there is a worldwide ransom-ware attack that began last week and may continue this week. The New York Times has an active map showing where all the attacks have been happening. You can google it or see this link  (https://www.nytimes.com/interactive/2017/05/12/world/europe/wannacry-ransomware-map.html?_r=0)

If you want to keep up to date on the latest on this event, just watch the news or do an internet search on the topic.

If you want to know more about Ransom-ware we have written about this before. You can open these previous posts.

Victims of ransomware usually receive an e-mail or some other type of electronic message that asks them to download or run software. Some of these e-mails may appear as if they were coming from someone you know, or can even come from a software hack (like a cracked version of some game or popular software).  When you run the software and it appears that NOTHING is happening, .. something is.WannaCrypt

The software will encrypt your hard drive, or encrypt part of your hard drive so that your computer is still operable and you can continue to use it, but you cannot access all your personal files. This includes all personal documents, images, music files.

If you are the victim of a ransomware attack you’ll open your computer and instead of your normal files you’ll see a pop-up appear that says, ‘Surprise, we’ve taken control of your computer and if you want access to your files you need to pay us.'”

 Here are some things you can do to prevent being a victim.

  1. Please update your computer security software as soon as releases are available. It’s best to set it to auto update.
  2.  Please run all software and OS patches. Again please set it to auto update.
  3. If you value your files back up your computer on an external drive on regular intervals. You may want invest in a cloud backup service. You can search for and review them.
  4.  Finally, just be very vigilant you need to constantly look out for emails that seem suspicious, and you need to err on the side of not downloading random files. Delete them. We often receive random invoices, and reports that seemingly credible companies send us. Like Bank of America, or UPS. Sometime I get invitations to download a file from a cousin.  If you know the e-mail is fake, delete it.  You can always verify before opening any attachment that your cousin actually did send the files

We are dedicated to providing you with the best and most affordable self-defense products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime. If you want to take personal responsibility for self-protection, home security, business security, purchase our high quality discount self-defense products and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell, Onyx Knight Enterprises

01/09/2016

BACK UP YOUR FILES BEFORE DISASTER STRIKES


Backing up has become more important than ever, thanks to cyber-attacks like ransom-ware or having a natural disaster like a flood or tornado.

If you are a regular reader here you already know how pervasive and frustrating ransom-ware is. If you’re new to our blog, here is a bit of background – Ransom-ware is one of the newest attack method in the malware world. It can be pulled off with great ease as all a hacker has to do is buy some premade ransom-ware kit from malware creators on the dark web. Then he or she distributes the malicious code, usually by way of email attachments, but as we have explained earlier, ransom-ware can also get onto systems via security holes, or vulnerabilities in outdated system software. When the ransom-ware code is executed by say, clicking that infected link in an email, it begins to encrypt all the files on your computer or device. That’s when you’ll get a notice from the ransom-ware creators, letting you know that your files have been encrypted and if you want to retrieve them you’ll need to pay them in untraceable bitcoins ($hundreds to thousands of dollars).

You have two choices, pay to perhaps get your files back, or not pay…and loose EVERYTHING you have on your computer!  The sad truth is that even if you pay you may not get your files back because once they have been encrypted, they can only be un-encrypted with the correlating key – which the hackers have and aren’t about to give to you.

If you have been meticulous in backing up your files, data, pictures and whatever else you have that’s precious to you, then you can stand your ground and walk away.

Make multiple backups

Before we delve into the different backup methods out there, it’s important to note that you should have more than one backup of your files stored in different places to ensure that you are completely covered.

Types of backup

Cloud-based backup – You are probably familiar with cloud storage like Google Drive and s9ihizonvcfhc0wndarsDropBox. The idea here is that your files are stored in the Google or DropBox cloud respectively and you can access them from anywhere that you can log into your account. These services are great for sharing pictures and collaborating on documents and presentations but they aren’t really designed for heavy duty, let alone automatic backup. Instead, look for a cloud based backup that automatically backs up all your files and folders. Some important features to watch out for:

  • Unlimited storage.
  • Folder syncing and sharing.
  • Continuous backup throughout the day automatically.
  • Available for smartphone.
  • Price tag factor – some plans like Carbonite can run at about $60 per license per year and others can run over $120 or more per year depending on the level of service or options you choose

Do your research and find the service and plan that fits your needs best and go with it! Some of the best plans out there are: Crashplan, SOS Online Backup, Backblaze, SugarSync, Spideroak , Carbonite, and iDrive.

iDrive is the PCMag Editor’s choice for 2016: (http://www.pcmag.com/article2/0,2817,2288745,00.asp)

“It has been one of the more ambitious online backup and cloud-based syncing service services in recent years, offering not only some of the most attractive pricing plans, but also a multitude of features in clear desktop, mobile, and Web applications.”

Local backup – Your other option is to back up to an external hard drive or a flash drive. This method is a bit less user-friendly as it cannot be done automatically and since flash drives are so small, they tend to get lost easily. But it’s not a bad idea to have a physical backup of your digital stuff.  You can purchase external drives, you just have to be careful not to leave them connected AFTER you backup.

PLEASE NOTE: Ransom-ware can affect every file on every drive on your computer, and even cloud drives like Dropbox. If you get infected with Ransom-ware, your backups can be affected as well. So please discount them when not using them.

 

When it comes to ransom-ware, follow our mantra “Backup, don’t pay up”.

11/05/2016

The Microsoft Support Phone Scam.Again!


The Microsoft Support Phone Scam

Yesterday at work my cell phone rang.  The call number was (646) 612-3456.  I answered the call, and it was from a lady who was claiming to be from Microsoft Technical Support.  The lady claimed that there was something wrong with my home computer, and that she was going to give me steps to fix it.

Now the lady at a thick foreign accent, and was obviously in a room full of other people making similar calls from the background noise.

I knew this was a scam, and told her that my computer was Commodore 64.  She apologized and hung up.

This is a very old scam, and I get about two of these every year.

Microsoft has a link on their site to help you understand and deal with this computer scam.  I

 

https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx

 

Now here are some fun things you can do

  • Repeat everything they say to you, back to them
  • Pretend to go along, but ask question, like what is a mouse, or where is the ‘E’ key.
  • If they ask of personal information, ask for their personal information, and just pretend to be one of the Simpsons.
  • Tell them you are with the Federal Task Force on Cybercrime, and agents are on their way to arrest them. They are to put their hands up, and prepare to be arrested.
  • Make up something fun to do.

PepperEyes Self-Defense, Safety and Security Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products. Survival kits  and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option

 

05/05/2016

I keep getting suspicious e-mail from myself.

Filed under: Cyber Crimes,Cyber Security — peppereyes @ 12:34 PM
Tags: ,

For the past few months I’ve been getting e-mail from my-self with a file attachment.

Avoiding virsus

This is a cleaver technique for some bright hacker to plant a virus, or some malware or even a way to plant ransomware on my computer. If you have been following us on Twitter or Facebook, you may know that ransomware is on the rise across the glove. These clever hacks have increased their target from individuals to organization such as municipalities and hospitals.

Just by chance you haven’t heard of Ransomware.  Ransomware is the most destructive and rapidly growing variation of malware (Computer Virus). Once it penetrates your PC, it will encrypt most of your files (documents, music, images, .. etc)  and demand a ransom to release them. This will all happen silently while you may be using your computer, and then when reboot, you will get your ransom note.  To make matters worse, if you use cloud storage, it may encrypt that file as well.  I your computer happens to be networked, it can run across the entire network.  Scary eh.

Unlike many of the viruses of the past, this one is wicked, and fast growing.  In just the second quarter of 2015 there were 4 million new incidents of Ransomware alone. To make matters worse, the creators of this virus have multiple techniques in it delivery as well as various mutations of the virus to stay ahead of virus detection programs.

This history of this virus is interesting as well.  The first noted case was created in 1989 by the less-than-stable biologist, Dr. Joseph Popp. Popp’s version was distributed through a computer disks that was supposed to contain an AIDS education program. Instead user’s computers were locked and Dr. Popp would ever so generously unlock them for just $198.

Today if you were to get tangled up by some form of Ransomware 2.0 such as the notorious Cryptolocker, it would cost you anything from approximately $600-2000 to unlock your device.  To further obscure their trail the bandits demand payment in untraceable bitcoins.

If you think that not having a PC will reduce your chances of getting infected, think again. Today, computer hackers can infect almost every known Computer Operation System. This includes, PC, Apple, Linux, Android, as well as any computer device from smar phone, to fitness ware.take just about anything ransom, from your PC to your Mac or Linux, your iPhone or android and even your fitness trackers.

It used to be that you could find a cure for most viruses, however the ransomware today use super-strong encryption methods that simply cannot be reversed without the correlating unlocking keys.

Ransomware affects home users, small businesses, mega corporations, governments and don’t forget the perps new favorite target, hospitals networks. The situation has become so perilous that on March 31st the US and Canada issued a joint cyber alert imploring citizens to take the threat seriously and use the Internet with forethought and caution.

Here are some things you can do to reduce your chances of getting attacked by ransomware.

  • Keep away from shady links in the body of emails and attachments and on websites Clicking on malicious links that are designed to appear legit can cause your computer or device to download locking malware among other things
  • Back up your files on a periodic basis. When it comes to beating ransomware the easiest way to defeat it effects is to use backups to rebuild your computer. You need to reformat you device and reinstall everything. It’s either that or pay up, and HOPE you get the key.
  • Keep your Malware software software and Operating System updated. Malware and zero-day exploits including Ransomware just love to meet up with an operating system or other software that’s in need of updating or patching. One of the very most effective methods to keep hackers out it to ensure that your device is always running the most recent version of software and that your OS is always at the most current version.

PepperEyes Self-Defense, Safety and Security Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products. Survival kits  and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.

Next Page »

Blog at WordPress.com.

%d bloggers like this: