All posts by TechPros

protecting computer malware nashville virus cleanup

Protecting Your Computer from Malware

protecting computer malware nashville virus cleanup

protecting computer malware nashville virus cleanup

Protecting your computer from malware and dealing with an infected computer can be one of the most frustrating problems that computer users face. Not only can malware(viruses) keep your computer from running properly, it can also jeopardize the security of your personal information. As a result, it is important for computer users to know how their computers can get infected in the first place, as well as how to prevent any malware from infecting their computers.

Click After Reading

One of the most common ways that a computer can become infected is when a computer user accepts a message that appears on their screen before they even read what it says. For example:

  • An Internet advertisement or window pops up and tells you that your computer requires a specific plug-in or that your computer is already infected with malware. By downloading the plug-in or accepting the message without fully understanding what is happening, you may have unknowingly subjected your computer to infection.
  • When updating or installing a computer program, you may be prompted to install additional programs that you do not need or that could monitor your use of the original program. These additional programs could cause significant problems for your computer and could even subject it to infection.

Downloading Infected Software

Another common way that a computer can become infected is when a computer user downloads software programs from the Internet. It is important to make sure that the software you are downloading is coming from a reliable source.

  • Java is a prime example of a program that can cause an infection if it is not downloaded correctly. If you are in an Internet browser and a message appears prompting you to update Java from within the browser, then it is likely an unreliable download. If a new version of Java is ready to be upgraded, then your computer will prompt you from the desktop, not from the browser.

Opening Unexpected Emails

Unexpected emails are yet another way that your computer can contract an infection. Use caution when downloading attachments or opening links from emails as they may contain malware. Strange emails that prompt users to input log-in information are another problem. While you are not necessarily downloading a virus by entering your information, you may be unknowingly giving someone access to your personal information.

Pirating

The unlawful exchange of copyrighted movies, software, or music is not only illegal, but it is also a very easy way to get your computer infected. Many of the files and programs that are available for download on these torrenting sites also include additional files that could contain malware that could lead to an infection in your computer.

Using Antivirus Software and Keeping it Updated

The most effective way to prevent your computer from getting infected is to ensure that it has a reliable Antivirus Software program installed and that it is up to date. Utilising this software keeps your computer running well and it provides protection against any potential malware or other malicious software. Microsoft Security Essentials and Windows Defender are two of the best antivirus software programs on the market today for your PC.

Microsoft Security Essentials covers computers using older Windows operating systems like Windows 7 and Windows Vista. It will provide routine system scanning and cleaning both on and offline. It also provides real-time protection against spyware, viruses, rootkits, and other malicious software.

Windows Defender does much of the same thing that Microsoft Security Essentials does, but it covers newer Windows operating systems such as Windows 8, Windows RT, and Windows 10.

No computer user wants to have to deal with a computer that has been infected with malware, but now that we know more about how computers can get infected, it should be much easier to prevent that from happening. As long as you are cautious and have a good antivirus software program installed, your computer should be protected. If any issues arise with your computer regarding a malware infection, feel free to give us a call at 615-595-6399 or email us at support@tech-pros.com.

bank wire transfer scam

Bank Wire Transfer Scam

bank wire transfer scam

bank wire transfer scam

Being in the technology business has its fair share of benefits and troubles. Over the past couple of months, we have experienced an alarming scam that we wanted our loyal customers to be aware of.

We are calling this scam BANK WIRE TRANSFER SCAM, and here is the information that we’ve gathered on this attack.

Overview: The goal of the Bank Wire Transfer Scam.

The primary purpose of this scam is to attempt a wire transfer via email from the victim’s (your) bank account to the hacker’s bank account. Unfortunately, we have seen the hackers be successful.

Here is how they do it…

newsletter-techpros-bank-wire-scam-email

#1 Suspicious Email

This is an example of an email that appeared to be from a familiar sender but it was a spoofed email that contained the entryway for the hacker to gain access to the victim’s email account.

If the blue “Click Document” button was clicked, it took the user to a screen that appeared to be a Google login screen (but it was not.) When the email address and password was entered, the hacker captured the information.

newsletter-techpros-bank-wire-scam-activity1

#2 Hacker Adapting

The next step for the hacker is to take several minutes or hours to learn about the victim. To do this, they search emails, read emails and understand who the bank is, whom the victim communicated with from their team, and how they worded emails.

newsletter-techpros-bank-wire-scam-filters

#3 Create Filters & Send Email

After the hacker knows how the victim operates and communicates with their bank, they setup filters to discard (or trash) all emails that may thwart their plans. Then, they send an email to the victim’s bank contact requesting the wire transfer. The bank would typically respond via email to confirm the request (although the victim would not get this email since the filter was put in place.)

Tips on how to prevent a breach (or attack)…

  • Call your bank and make sure you have voice authorization required for bank wires.
  • Do not type in your email username and address into a screen that you are unfamiliar with.
  • Hover over the button or link to detect the actual URL that it is directing too. If it looks fishy, do not click it.
  • If the email appears strange and it is from a user or email address of a person that you know, call them and confirm they sent it.
  • See if your email provider offers 2-Step authentication to prevent unauthorized access.
  • Check your email filters if you suspect unauthorized access.
  • Check your email security settings to make sure you are the only person logging into your email account.
  • Tell your friends and family! Education is the most important tool. Share this newsletter and make sure they sign up for our newsletter here: Click to signup!
  • Call us, we are always here to help!

Call us for assistance with safeguarding tips!
(615) 656-3307
-or-
Click here to contact us!

Online Tracking

Deter your security concerns with cookie control

cookiecontrol

Most computer users have some general knowledge as to what cookies are, and we don’t mean the kind your grandma makes. We are talking about the online tracking every time you visit websites. Learning a little more about a cookie can help you control your privacy easily.  Basically, a cookie is a note passed back and forth from web servers to web browsers. When you visit a website, the browser will send a cookie that has information about your visit to the server.  It can also contain information about you, such as the voluntary information you enter onto their website.

Cookies are used to monitor website activity. Most servers use them to either track which websites receive the most attention or record personal information that a user inputs onto their site so that they can create customization for them.  Cookies are only visible to the site that creates them, which means others cannot see your information. A server does not have access to your computer if you accept a cookie from them, nor are they a means to carry a virus. Some cookies are automatically erased once you leave the website. These are called session or transient cookies.

Regular cookies may be innocent, however there are some cookies out there that are not. The ones that pose a threat to your privacy are called Malicious Cookies, also known as Tracking Cookies. They monitor your online search habits for a period of time to provide advertisers information about weather you are their target audience. Most antivirus software can prevent malicious cookies.

Your computer allows you the tools to control cookies for your own privacy reasons. Under your settings, you can enable them or control how long they may be used. Some may consider simply blocking all cookies, however surfing may be a tad more difficult.  Sites you frequently visit will not remember you or your preferences. Most cookies are harmless and even convenient, and if you keep your antivirus software current, you should rarely worry about the bad ones.

Create Strong Passwords

Protect your online activity and information

password

Everyone prefers top-notch security for their homes and vehicles, but what about their online accounts? It is unfortunate to say that most people prefer a convenient password instead of a strong one. Quality always works best, which means you need a strong password. A password is basically the lock to your online door, so you want it to be extremely difficult to break into, especially since cyber crimes are becoming more common than burglaries. So, what makes a password strong or weak?

Qualities of a strong password:

  • It is over 7 characters
  • It does not have your name, username, or brand
  • It does not have a complete word or phrase
  • It is not the same as your other passwords
  • It has at least one capital letter (A, B, C, etc.)
  • It has at least one lower case letter (a, b, c, etc.)
  • It has at least one number (1, 2, 3, etc.)
  • It has at least one symbol (!, @, $, etc.)

Even if your password has all these qualities, it could still be weak. Use acronyms of words instead of using full words or deliberately misspell the word. In order to remember your password more easily, try and choose something related to your personal life. If you write it down in case you forget it, don’t label it.  It is also important to keep it hidden in a private place.

Avoid passwords that have these:

  • It has the same letter used over and over (ex. Aaaaaa}
  • It has letters or numbers in sequential order (ex. 123abc)
  • It has the word “password” in it
  • It has the phrase “iloveyou” in it
  • It is exactly the same or similar to other passwords you have

It was reported recently that “123456” was the number one most used password among the users that were hacked on October 4th. Almost 2 million Adobe users had that password. If you recognize that your favorite password has any qualities like this, consider changing it. For more information about Adobe’s recent breach and why it is important to create strong passwords, click here- http://www.businessinsider.com/the-worst-passwords-to-use-2013-12

Traveling with Technology

Stay savvy, stay safe

travelsavvy

When you are traveling this summer, consider a few safety precautions for your electronics to be a necessity. There are the basic rules for safe traveling with technology, and then there are a few that you may not have been aware of. These precautions are not strenuous, and they can save loads of potential trouble in the future.

 The basics:

Before leaving, make sure you have all the correct cords and accessories you need then store them in luggage that will protect them from water and denting.  Travelers should always remember not to leave them in places where they can be stolen. Make sure your electronics are locked up in your hotel room or car if you are away from them. Also, your devices are more likely to get knocked around or dropped while your traveling, so put a protective case on them. One more basic precaution that you should follow no matter what is back up your data. Make sure you have any important information stored somewhere else just in case your technology does get damaged, lost, or stolen.

Now that we have covered the basics, here are a few extra habits that travelers need to know:

First, familiarize yourself with your mobile’s roaming and data charges, especially if you are going to be away for a long period of time. There are ways to minimize costs, such as setting a limit to your data usage or turning it off. You can contact your mobile provider for further information.

If you need a laptop during your travels, it is best to bring one with no PII (personally identifiable information) on it. There are places that rent out laptops specifically for this reason, but if you prefer to bring your own, you can encrypt it. However, if you are traveling out of the U.S, research the policies of bringing encrypted information into a country. Some areas heavily regulate or restrict encrypted laptops.

Setting a strong password is a great rule for any device as well as ensuring any anti-virus software is up to date. There is also software you can download to track devices that have been stolen or lost. ­

Beware of Free Public Wi-Fi

Protect yourself when delving into the free Wi-Fi networks

beware-free-wifi-2

Public Wi-Fi exists in most of our stores, libraries, coffee shops, airports, and public transportation areas that we visit daily. Since the general public has access to this convenience from day to day, then so do criminals. If you decide to use public Wi-Fi, keep your guard up at all times. The main rule to beware of free public Wi-Fi networks is to never make financial transactions, use credit cards, or shop at all. Online shoppers in public networks are easy targets for hackers.

Kevin Clark, an expert in cybercrime has said, “Public Wi-Fi is inherently unsecure. Anyone using it ought to do so with the premise that everything you do is visible to a third-party stranger with access to that hot spot…the chances of you being hacked far exceeds the chances of your home being burglarized. This is a big business.”

If you have the option, choose the Wi-Fi that is at least protected by a password. The most dangerous Wi-Fi is the open to all, no password needed, networks. However, they are so attractive for their convenience. Awareness is the key to preventing attacks and theft on your computer.

To become more aware of such crimes,

Cyber Attacks Are More Common Than You May Think

Cyber Attacks Are More Common Than You May Think

Target is not the only one

Cyber Attacks Are More Common Than You May Think

Cyber Attacks Are More Common Than You May Think

During the latest shopping season, over 70 million customers’ information had been stolen when Target’s online security was invaded. This identity theft included names, mailing addresses, phone numbers, email addresses and credit card information. Over the years, retailers have taken measures to make cyber crimes more difficult, but some still manage to slip through the cracks by using malware, also known as a RAM scraper. Criminals use this to catch encrypted data when it travels through a live memory feed in a computer. This information just goes to show that cyber attacks are more common than you may think, but rarely publicized.

Most retailers attempt to keep breaches in cyber security secret because they are afraid it will hurt their business. Neiman Marcus, J.C Penney, and Nissan have also been victims of hackers while others try their best to remain unknown.

Shawn Henry, F.B.I.’s top former cyber police officer has stated, “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…I’ve seen behind the curtain. I’ve been in all the briefings. I can’t go into the particulars because it’s classified, but the vast majority of companies have been breached.”

To learn more about what cyber experts have to say about situations such as this, visit

Computer Viruses

What do they do and why

virusestoo

Unfortunately, computers can get viruses much in the same way that humans do. Everyone does their best to prevent catching colds by staying healthy and clean. Our electronics need a similar kind of attention to avoid a computer virus. Even though a Mac is less likely to fall victim from a virus than a Windows PC,  they are not bullet proof from them either. Therefore, weather you own a PC or a Mac, learning what a virus does is beneficial to taking care of your investments.

Computers are susceptible to different viruses just the way humans are susceptible to different viruses.

The three most common computer viruses

Trojans
Earning its name from the famous Greek story, it firstly appears as a safe file that you have in your computer. Then it releases code that has the ability to destroy your computer from the inside by deleting data, blocking data, modifying data, copying data, and disrupting the computer’s functions.

Backdoors

This is a form of malware that goes around your computer’s defensive line by unlocking the backdoor and creating a hole in the software. Backdoors can be combined with Trojans, which creates twice the mayhem. Hackers control this malware more closely, which is worse for you. They have all the ability a Trojan has, plus the ability to send and receive files.

Rootkits
This virus has been considered some of the worst to extract. Hence its name, it conceals itself deep into the computer where they can’t be detected easily. Rootkits have the ability to copy, hide, and restart itself even after you have stopped it. This makes them difficult to locate and fight off because they can retaliate over and over.

A virus can appear in the form of anything, which makes it important to keep your antivirus software current. Hackers create these viruses because they can attain information, which can lead to access to all of your personal accounts. Most people do not realize when they have a virus and when they finally find out its too late. If you are concerned that you may have a virus or need to update your software, feel free to give TechPros a call.

5 Online Safety Rules to Follow

 

Avoiding the dark corners of the Internet

beware-free-wifi

The Internet is a melting pot of information, social interaction, entertainment, and countless other resources that we rely on daily. It is literally limitless and constantly growing for both the better and worse. Are you following a few basic guidelines to make sure you don’t stumble into the dark side of the online world where the scammers, hackers, and infiltrators are waiting to take advantage of you? If not, here are 5 online safety rules to follow for good measure.

Important Rule #1
Always have anti-virus software that regularly scans your computer to detect and prevent viruses. This can also minimize damage if a virus actually invades your computer.

Important Rule#2
Don’t fall for scams. This includes but is not limited to: popups, ads that sound too good to be true, strangers offering awards or free gifts, job offers making a fortune working from home, congratulations you’re the millionth customer pitch, random surveys, forms that require credit cards, and many other vague advertisements.

Important Rule#3
Research a company before you give them any personal information. If you plan to buy something from their website, try and learn as much as you can about them before you make the purchase. If you have a gut feeling that this seems a little off kilter, then don’t do it!

Important Rule#4
Don’t download files from untrusted websites. If you see an offer for a free software download, it has the potential to infect your computer.

Important Rule #5
Stay away from suspicious websites at all. Suspicious characteristics include but are not limited to: abundant popups, shady side ads, and uncertain links. Stray away from these because one wrong click could send problems straight to your computer.

Online Safety for Children

Clear and easy household rules to keep your children safe online

safety-first

If you are worried about the safety of your children when they are on the computer, there are many options to help minimize risk of unsafe or suspicious online behavior. Utilizing parental controls and safeguarding programs helps, but educating your child about online dangers will encourage them to develop safe habits. Also, clearly written rules can benefit every family member and provide an established boundary.

Educate your children to increase safe online habits. Make sure they know what personal information is and why they should not give it out. If they use email or online chat rooms, make sure they realize it is dangerous to meet someone they ‘know’ through the internet regardless of how long they have been in touch. Educate them about online scams and make sure they know to inform you of potentially dangerous or threatening emails.

Stay aware of what your children do online as well. Occasionally, visit their favorite websites to check that they are appropriate. It also helps to be aware of who they chat with and why. It will be easier for you to recognize if your child starts demonstrating suspicious, uncomfortable, or unusual behaviors online. Communication goes a long way when it comes to developing healthy online safety for children, especially when honest two way communication is encouraged.