Inver Grove Heights Residents – Don’t Fall Victim to Webcam Blackmail. Many users have reported recent scam messages from individuals claiming to have intercepted their username and password. These messages often state they have been watching your screen activity and webcam while you have been unaware.
Typically, attackers threaten to broadcast footage to your contacts, colleagues, or social media channels. Demanding payment in Bitcoin, malicious hackers blackmail their victims to keep confidential information private.
Where Have the Attacks Come From?
In many cases where hackers have claimed to have a victims’ password, this has turned out to be true.
In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their users. LinkedIn, Yahoo, and MySpace all suffered massive and devastating hacks. Some users of these services are still feeling the consequences today.
The details leaked from these sites, and others facing the same issues, are sold online for years after the initial breach. Hackers buy username and password combinations in the hopes of reusing them to access services, steal money, or blackmail their owners.
How to Respond
If you have been contacted by one of these hackers, it is a scary reality that they could have access to your credentials, data, and online services.
The only thing you can do in response to this type of email is to ignore it. This “we recorded you” email is a scam made much more believable because they probably do have one of your real passwords gained from a site hack.
That said, accounts that share the same password should be changed immediately. Security on additional services you use should be updated too.
Self Defense On the Web
When using online services, a unique password for every site is your number one defense. A good password manager makes this practical and straightforward too.
Using a different password for each site you use means that hackers can only gain access to one site at a time. A hack in one place should never compromise your other accounts by revealing the single password you use everywhere.
Often, people think that maintaining many passwords is hard work or even impossible to do. In truth, it’s almost always easier to keep tabs with a password manager than it is to use the system you have in place today.
A high quality and secure password manager such as LastPass, or 1Password, can keep track of all your logins efficiently and securely. They often offer the chance to improve your security by generating random and strong passwords that hackers will have a tougher time cracking.
Password management services offer a host of features that help you log in, remind you to refresh your security, and make your safety a number one priority. After using a manager for just a short time, you can be forgiven for wondering how you managed without it.
If you think you might have been hacked already, or want to prevent it from ever happening, give us a call today at (651) 456-8655 to update your security. You may also visit our contact page HERE.
Children today have grown up surrounded by technology their entire lives. Since before they are old enough to read they can pick up a tablet or smartphone and swipe at apps and games with ease. Modern kids have an intuitive understanding and ability with technology that older generations can barely imagine. The abundance of technology, however, comes with a price.
Easy access to any marketplace can be a double-edged sword. The convenience and ease of use is a boost to those of us needing a quick app, but accidental purchases can cause a lot of headaches. One-click online shopping was once one of the biggest dangers our bank account faced. Now, many of us carry multiple devices, each with their own marketplace and app stores.
With modern tech, mobile applications, whether on iOS or Android devices, are easier than ever to buy and download. So simple in fact, that a child could do it.
Designed to Appeal – Children love to download mobile applications that feature their favorite characters, cartoons and TV shows. Advertisements are aimed specifically for children in ways that will invite them to click a link and instantly download a game.
These games are typically free, meaning they don’t require authentication by default before downloading. A new game can be downloaded, installed, and ready to run seconds from clicking an ad.
Developers commonly use, what is known in the business as, a ‘freemium’ model. This means that the game is free to download and start, but inserts paid ‘upgrades’ designed to make the player part with cash.
Freemium Games – Upgrades to games may unlock more levels, purchase an in-game currency, or outfit a character with special attributes. Competitive online games commonly employ a strategy that gives paying players an unfair advantage over ones who don’t pay. This is often referred to as ‘pay-to-win’ and entices players to spend more to get on the same level.
Many mobile-based games are designed purely to encourage in-app purchasing. Some deliberately design a deceptive or tricky user-interface that makes it easy to miss-click or make purchases by accident.
There are regular stories in the news featuring kids spending thousands on in-app purchases for virtual characters. In some cases, children can use real-world money to buy items thinking they are spending in-game currency.
Apps to Help – Of course, it’s unfair to give all applications a lousy name. Many deserve it, but not all apps are guilty of behaving badly. There are fitness apps, productivity apps, and educational apps that can act as useful tools to help enhance your day. Children can get a lot from high-quality applications in the same way educational software for the computer can be a huge classroom boost.
Getting the most out of your phone or tablet is about keeping your device safe against applications designed merely to take your money.
Secure Your Device – The best step you can take to prevent running up enormous app bills is to disable in-app purchases on your devices. This prevents apps from being able to take funds for digital items. The process to do this is simple, takes less than 2 minutes, and can save you huge amounts.
On iOS: Enter the settings screen, tap on ‘General’. Then tap on ‘Restrictions’ and tap the ‘Enable restrictions’ option. Make sure to turn “In-App Purchases” off.
On Android: Inside the Google Play App: press the phone menu button and go to Settings. Scroll down to “User Controls”, tap on the “Set or Change Pin” option and set a pin that only you will know.
In the “User Controls” menu check the option to “Use Pin for purchases”. Newer phones may label this pin as a password instead.
Safe Apps – With these options enabled, whether using an iOS or Android device, your phone or tablet is safe from app purchases in any hands.
Are registry cleaners a good idea? You have likely been alerted by popups while browsing the web. These, often flashing, advertisements claim your computer has more than a thousand errors requiring urgent attention to fix. Perhaps helpfully, these popups offer a solution to cure your computer with a click of the mouse. Buttons marked “fix now” appear to offer a simple fix to all your computer troubles.
These advertisements are often described as Registry Cleaners, or by a few other names that attempt to convince the user they will somehow clean or improve their home PC. Within the IT industry they are known as “scareware”. They are software designed to convince you that your computer has problems it might not have.
Are they trustworthy?
Almost all popups and advertisements that use banners saying “Fix now for free” are not trustworthy at all. They are little more than a scam attempting to take your credit card details, PC data or both. At best these programs might claim to scan your computer and show a convincing list of plausible sounding computer problems. Using this, they will ask for payment to “fix” these problems to get your PC back in shape again.
At worst these advertisements can be downright malicious. Some may attempt to use fake warnings and scare tactics to trick customers into installing spyware on their own computers. When installed, spyware will attempt to steal information in the background. Attackers may use this technique to steal usernames, passwords, emails, and credit card details. Sometimes the first sign a user has that something is wrong is when a virus scan detects software doing something it shouldn’t be.
Do I need to clean the registry?
The Windows system and various applications installed on your PC do leave files stored on your computer. These files can stay behind or go out of date even after the application that initially made them has been removed. These files can use up a little space on the hard drive and generally cause minor clutter within the system.
Despite the large amount of “scareware” and fraudulent computer cleanup scans out there, legitimate applications designed to clean your system do exist. This can be something we cover and is often done as a single small part of a complete computer tune up. Keeping up with out of date files and freeing up unused space is worthwhile and can be considered “good housekeeping”. The vast speed boosts many online advertisements claim to unlock by simply moving files around are almost always false.
The home computer, however, is commonly upgraded and can be boosted by more conventional means. If the speed of your PC is no longer up to the task, there are ways in which we can unlock far greater gains than simple housekeeping chores.
PC Boosters
Relatively low-cost hardware components such as memory can often be added to boost the speed of even an older PC and unlock a new lease of life. Upgrading the computers RAM can double the working memory available to the operating system. With extra memory, many programs can keep more information available to work with. This upgrade reduces loading times and increases the computers ability to run more programs at once.
Another common speed boosting upgrade involves how we store and load data from the computer. Switching from an older style mechanical hard drive to a modern Solid State Disk (SSD) can bring down the startup and loading time of any PC.
Loading data from the hard drive is very often the slowest part of a computer, the bottleneck in an otherwise very fast system. Because an SSD does not use any mechanical components the time to access the disk is nearly instant when compared to older, mechanical hard disks.
Safe Speed Boosts
These upgrades offer boosts in speed to rival a modern system at only a fraction of the cost originally paid for the computer. Upgrading the RAM, swapping to an SSD, or doing both will provide an instant, dramatic, and safe improvement to the speed of your PC.
Additional Resources:
Why Using a Registry Cleaner Won’t Speed Up Your PC or Fix Crashes (Read more…)
How to Tell if You’ve Gotten Hacked… Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like?
There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both. There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?
Logins not working
One of the first steps a hacker might take would be to change the computers passwords. By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control. With this in mind, we always want to make sure to keep on top of our own login details and how often we change them.
Security Emails or SMS’s from online services
Many services track which device and location you logged into your account from last. If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own.
If you have logged in using a new computer, tablet, or phone; an email that asks “hey, is this you?” need not be cause for alarm. If you haven’t, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.
Bank accounts missing money or strange transactions
Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.
It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account.
You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction.
Alternatively small, hard to notice transactions may appear. These often account for small purchases where attackers have tested the details they have to make sure they work.
Sudden loss of cellular connectivity
Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication. To do this they send a short code to your phone or app when you log in. Two-factor authentication is ideal in most cases and a great boost to security.
Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen. During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in. From your perspective phone service will simply stop working.
Keeping vigilant and maintaining security
These are only some of the modern techniques that hackers can try to use to gain access to your accounts. It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.
Check out our partner links for more helpful information:
If you suspect that you might have been hacked, or would like help to prevent hackers in future, give us a call at (651) 456-8655 or visit our contact page HERE and we’ll improve your security.
Should You Repair, Upgrade, or Replace Your Computer? Like many valuable things we buy, new computers suffer from wear and tear over time. Our computers are particularly vulnerable as we have placed more and more demands on them every year. New machines have gotten faster, quieter, more reliable, and more capable over time. At the same time our own computers have begun to slow and sometimes even stop performing altogether.
There are many ways to address the problem of a PC which isn’t quite performing up to the task anymore. Whether frustratingly slow or no longer working; we are happy to take a look. When you bring your computer to us we will diagnose the condition and find a solution that works for you. Often times the simplest solution works best. A complex problem sometimes only needs a simple repair to get your home computer up and running like new again. Whether a small replacement part, loose wire, or bad connection; we will find and fix the problem to give your familiar, home machine a new lease of life.
Many computers come to us running slowly, taking a long time to start up, or freezing when trying to load files and programs. Often owners have reached breaking point and become convinced the machine is fit for only the scrap heap. In many cases, the problem can be pinpointed to a bottleneck in the system. A single, seemingly trivial, part can be holding up the entire system. Amazingly, upgrading just that one component can make the whole machine run like new again.
Adding memory can provide extra space for programs to run faster. Adding an updated, faster hard drive can allow files to be retrieved without delay. In both cases, a low-cost single component can provide a cost-effective solution that makes an old machine like new again.
In some cases, computers succumb to more major faults. A critical part, difficult to replace, may stop working altogether. A failure of the motherboard for example, the backbone that all other components connect to can be expensive, if not impossible, to fix. Typically, with the fast-paced and ever-changing nature of computing, a motherboard will only house computer parts that were manufactured around a similar time.
A motherboard is almost certain to be incompatible with components built just a couple of years before or after its own design for example. Occasionally even a motherboard failure can be resolved too. In these cases we strive, whenever possible, to find a replacement board of the same generation that will work alongside existing components. The result is a cost-effective solution that keeps cost down by saving replacement parts.
In cases where a like-for-like replacement motherboard is not available, many parts of the computer may have to be replaced at the same time. Often replacement costs in these cases can get close to, or even exceed the cost of buying a new machine.
We would always give advice where it makes sense financially and practically to consider replacing an old machine. Often, in this respect, a home PC can be considered a little like a car. Sometimes a simple, non-expensive, easy to replace component such as the window wiper can fail. While a crucial part to be used for driving; it would be silly to suggest replacing the vehicle once it has worn out.
A window wiper may be low-cost and simple to replace, but if the engine were to wear down or break the solution may not be quite as simple. Attempting to make a 30-year-old car as fast, safe, and reliable as a brand new model generally doesn’t make any financial or practical sense. Sometimes the best course of action to save money and avoid breakdowns is a more up to date vehicle.
In computing, many of the same rules hold true. The best solution in each case is always tailored personally to fit you and your own computer.
Bring your machine in to us or give us a call us at (651) 456-8655 to discuss your computer issues or visit our Contact page HERE. We’ll keep you informed about your machine and advise on the best course of action to get you up and running as quickly as possible.
Remember how well your computer ran when you first brought it home? It was booting so fast, files were whizzing around at light speed, and no matter how many tabs you had open, nothing was slowing that baby down. It was spotless, inside and out. Then one day you turned it on and everything was so slooooow, taking forever to do anything – and that was only if you could even find your files in all the clutter. All that zip and speed you loved so much was gone! It’s time for a Refreshed Computer…
The good news is you probably DON’T need a new computer, you simply need what we call a “format and reload” to:
Clear the clutter: Over time as you install applications you collect icons, files and options everywhere. They’re not necessary, they’re not used, but they were installed automatically ‘just in case’. It’s a bit like when your overnight guest shows up with a massive suitcase and then claims a shelf in your bathroom. Those applications are making themselves at home in a big way! All that uninvited clutter is slowing your system down and making it hard for you to find the things you need. Simply put, it’s a mess. Our technicians can clean your system back to pristine in no time.
Beat viral overload: Is the virus really gone? Sometimes a virus has multiple layers and can bury itself so deep even your anti-virus doesn’t see it. Despite getting the all-clear from your anti-virus, you might also be seeing the damage from the infection. Perhaps the virus made a mess of your internal file structure, left pieces of code all over the place, or deleted files essential for smooth running. When an infection has been cleared but the system is still running slow, we recommend dropping it into our store asap for a check-up and refresh.
Assess incompatible software: Installing a new piece of software can sometimes produce unexpected results. While your system met the hardware and operating system requirements, maybe it’s simply not playing nice with your other applications. Maybe they’re fighting over the same resources, system files, or clashing with one of your hardware components. Clearly, something isn’t quite right, but you’re not sure what. Our team loves to play detective and get your system back to normal.
Archive older files: Some of your files are definite keepers, long term. Your photos, recipes, accounts etc, they’re all important to keep – but are they important to keep sitting on your desktop? They’re not just slowing your computer down, you’re at risk of losing them in a crash. It’s much safer to archive them to an external drive or cloud storage, simply let us know what you’d like to keep.
What exactly is a computer refresh? It’s like a car tune-up, but more flexible. Rather than tick the boxes saying we’ve changed the oil, cleaned the filters etc, we treat each computer as a unique case. Sometimes we can tune it up in a few minutes, and that’s all it needed. Sometimes it’s worth starting over like day 1.
We can reinstall Windows and migrate your data (photos, docs, emails, bookmarks, etc), putting back only what you WANT to keep. The rest of the clutter that built up over time or piggy-backed on a virus gets flushed away. We can also set up your email and install any devices you need, like printers. It’s doing whatever is necessary to give you a fresh start with your computer, but keeping the essentials.
For more helpful information on how to tune-up your PC for better performance, visit our partner link here: https://www.howtogeek.com/school/pc-maintenance-for-beginners/lesson2/all/
Ready to get back up to speed? Give us a call at (651) 456-8655, or visit our Contact page by clicking HERE.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments