Category: Security

Email scam uses data from breached websites to craft authentic looking email – How to check if your email address was exposed

Filed under: Passwords,Scams,Security - Nov 29 2018

Updated October 2024 to include new scare tactics:

An email scam that we initially wrote about in 2018 has been quickly spreading with different variants that claims to have hacked the recipient’s email account and includes a password used by the recipient. One variant further claims to have caught the recipient looking at pornographic websites, and demanding “ransom” in the form of Bitcoin cryptocurrency payment to prevent the release of webcam photos being sent to all the recipient’s contacts. Examples of the “sexstortion” emails are shown below.

Above: This new variation of a “sexstortion” email seen in 2024 mentions the recipient’s home address and includes a photo obtained from Google Maps street view.
This email from 2018 claims that the sender hacked the recipient’s email account, and even includes a password obtained from a data breach.

If you’re the recipient of such an email you may think “how did someone hack into my email account, and know my password?” The answer: they likely didn’t hack your account.

Here’s how they have information about you: Data breaches from companies such as LinkedIn, Yahoo and countless others have exposed the email addresses, passwords and street addresses of millions of users. Clever scammers have taken widely available information from the data breaches and crafted emails that contain some of that information. If the password used to login to your email isn’t used anywhere else, they likely just forged the email address to make it look like it came from your own account. With the addition of potentially embarrassing information, the “sextortion” scammer asks for Bitcoin cryptocurrentcy to prevent the release of information to everybody in your contact list (which they probably don’t really have).

In summary, just ignore/delete the email and change the password on any websites that match the password in the email. You shouldn’t be using the same password on multiple sites anyways.

To find out if your email address(es) have been exposed in a data breach, you can safely enter your email address in the following websites: Mozilla Monitor and Have I Been Pwned

Also see our top 5 password tips that you need to know.

Print This Article Print This Article

Computer Techs News Feed Stream on Facebook

[fb_widget fb_url=”https://www.facebook.com/computertechs” width=”600″ height=”800″ data_small_header=”false” data_adapt_container_width=”false” data_hide_cover=”false” data_show_facepile=”false” data_show_posts=”true”]

Is it time to replace your Wi-Fi?

Filed under: Security,Tech Support - Feb 19 2018

Updated May 2020:

Wi-Fi enables your computing devices to wirelessly communicate throughout your home. When Wi-Fi was first introduced wireless devices used to just include computers, then later came smartphones, internet video streaming devices and speakers. In recent years the amount of wireless devices in your home may now include “smart home” devices such as wireless security cameras, digital assistants, internet-connected thermostats, light bulbs, garage door openers, sprinkler systems and kitchen appliances – just to name some of the more common devices.

In the past few years security flaws have been found in the Wi-Fi protocol that’s used in all routers and gateways, and patches have been released as firmware updates for only the newest routers manufactured in the past few years. As of May 2020, we only recommend the use of routers certified as “Wi-Fi 5” (802.11ac) or “Wi-Fi 6” (802.11ax).

If your Wi-Fi router or internet gateway (provided by your internet provider) is over a few years old, it’s time to replace it with newer, faster and more secure technology that can accommodate the dozens of wireless devices that connect through it and onto the internet.

A benefit of replacing your Wi-Fi not only fixes current known security vulnerabilities, a new Wi-Fi router can increase the range and reliability of your Wi-Fi.

If you recently set up a new Wi-Fi 5 or 6 router or gateway and you still have slow or unreliable Wi-Fi, it may need to be optimized in your environment.

Optimization includes placing the device in the best location where the Wi-Fi signal isn’t blocked, and using the best channels and/or frequency bands to help reduce interference from neighboring networks. Adding an “extender” or “repeater” may actually degrade Wi-Fi performance in your home. On the other hand the latest “mesh” networking technology can help blanket your home in wireless coverage using 2 or more linked Wi-Fi access points.

To find out if you need to replace your Wi-Fi, contact us to for an evaluation of your current Wi-Fi equipment.

Print This Article Print This Article

Why you need to stop using Internet Explorer

Filed under: Computing Tips,Security - Nov 27 2017

Internet Explorer is the web browser that Microsoft included with the Windows operating system through Windows 8.1. Beginning with Windows 10, Microsoft Edge is the new browser that’s included with the operating system and is continually being optimized with performance, feature and security updates. That leaves Internet Explorer 11 – released in late-2013 – as the last major version of Internet Explorer.

With other browsers being continually updated – such as Edge version 41, Firefox version 57 and Chrome version 62 (as of November 2017) , some websites have stopped supporting the use of Internet Explorer. One of those websites is Yahoo – which includes the popular Yahoo web portal, Yahoo Mail and Yahoo Finance.

An advantage of using a newer browser such as Chrome includes faster web browsing, improved security and upcoming features that will help stop fake warning messages that are often caused by webpage redirects and misleading advertisements.

If you need help switching away from Internet Explorer and transferring your Favorites and settings to a new web browser, please contact us.

Print This Article Print This Article

Top 5 password tips that you need to know

Filed under: Computing Tips,Passwords,Security - Nov 23 2017
  1. Is your email account easy to access by hackers? Click here to learn more and find out.
  2. Learn why your most important password is the one that secures your email
  3. Take a few moments to create a password system that’s secure and memorable. It’s not difficult.
  4. Even though you may have a password system, you still should keep a record of your passwords. Some people put their passwords in a notebook, Rolodex, on their mobile device or online password manager. Which is the best option for you?
    How to safely manage your passwords
  5. Use an additional step to secure your email and other sensitive online accounts:
    Secure your email account with 2-step verification

Print This Article Print This Article

What you need to know about the Summer 2017 Equifax data breach

Filed under: Passwords,Scams,Security - Sep 11 2017

Updated 9/13/17 to include information from Consumer Reports. Updated 10/5/17 with additional resources and clarifications:

Equifax, one of the large credit reporting agencies in the U.S. recently announced a data breach that may affect over 143 145 million Americans. In case you’re not familiar with the population of the United States, there’s currently about 250 million Americans over the age of 18. Initial reports indicate that exposed data may include names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. Note that Equifax DOES NOT have access to passwords to your financial accounts.

The Federal Trade Commission posted a helpful article with suggestions on what you can do to help protect your financial data now that the data breach has come to light. However, contrary to Equifax’s advice that includes entering your personal information to check to see if you’ve been affected by the breach and sign up for their free credit monitoring service (do you feel comfortable about entering your information on a website operated by a company that didn’t keep your information secure in the first place?) – security researcher Brian Krebs recommends placing a credit freeze on your file, and further explains how to do it in this article.

Additional information from the FTC includes:

  • Check your credit reports from Equifax, Experian, and TransUnion — for free — by visiting annualcreditreport.com. Accounts or activity that you don’t recognize could indicate identity theft. Visit IdentityTheft.gov to find out what to do.
  • Monitor your existing credit card and bank accounts closely for charges you don’t recognize.
  • Consider placing a credit freeze on your files. A credit freeze makes it harder for someone to open a new account in your name. Keep in mind that a credit freeze won’t prevent a thief from making charges to your existing accounts.
  • If you decide against a credit freeze, consider placing a fraud alert on your files. A fraud alert warns creditors that you may be an identity theft victim and that they should verify that anyone seeking credit in your name really is you.
  • File your taxes early — as soon as you have the tax information you need, before a scammer can. Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job. Respond right away to letters from the IRS.

Additional resources:

Consumer Reports has updated information on How to Lock Down Your Money After the Equifax Breach.

FTC’s link to websites and phone numbers for the 3 major credit bureaus.

Print This Article Print This Article

Is your email account easy to access by hackers?

Filed under: Computing Tips,Passwords,Security - Sep 04 2017

Believe it or not, your email account is valuable to hackers. Miscreants can break into your email account and use it to send spam to your contacts or fool them into sending them money, and even break into your other accounts containing financial information by simply requesting a password reset. That’s why it’s very important to use a secure email service, and use multiple strong security methods to help prevent unwanted people from accessing your email account.

A secure email service is likely not one provided by your Internet service provider. In the Reno area, Charter and AT&T provide free email accounts as part of their service but they are not very secure because those accounts lack of security features make them easy targets by hackers. See Why you should ditch your Internet provider’s email.

A better option is to use Google’s Gmail because they block most suspicious login activity (such as logging in from another country), and they offer 2-Step Verification which requires providing a code or prompt sent to your phone the first time you access your account from your computer or device.

You also want to make sure that the password that you use to access your email is different from any other password that you use. See Why your most important password is the one that secures your email account.

If you need help with switching to Gmail and securing your account with a strong password and 2-Step Verification, contact Computer Techs today.

More reading: The Value of a Hacked Email Account

Learn how to spot scams that pop-up on your screen – and how to get rid of them

Filed under: Scams,Security - Mar 20 2017

Updated February 2025:

Please Print This Article Print This Article this article for future reference so you know how to close a fake warning web page if it appears to lock-up your computer.

Malicious advertisements or links can redirect your web browser to webpage designed to look like an official warning from Microsoft or Apple. The fake warnings often have the following characteristics:

  • Tell you that there’s a problem with your computer, it’s been blocked, and you need to call the number presented immediately to prevent harm
  • Tell you NOT to turn off your computer
  • The warnings are often accompanied by scary alert sounds or spoken messages.
  • Your mouse and/or keyboard may become non-responsive.
If you look closely at the “security warning” you will notice that it’s just a webpage designed to scare people into calling the number.

How to “unblock” your computer and get rid of the scare message

NEVER call the number presented on the screen – scammers claiming to be Windows, Apple or tech support representatives will try to gain access to your computer to convince you that you have security problems that you need to pay to have fixed.

Try the following steps in order to close the scare/scam window:

  1. Try closing your browser using the keyboard. Here’s a few a few methods to try:
    • Hold down the [Ctrl] key, then press the [W] key. On a Mac, hold down the [Command ⌘] key, then press the [W] key.
    • Press and HOLD the Esc key (located on the upper-left corner of the keyboard)
    • On a Windows PC, press the Alt + F4 key simultaneously.
    • On a Windows PC, simultaneously press and hold the [Ctrl]+[Alt]+[Del] keys on your keyboard, select Task Manager, select your web browser, then “End Task”. On a Mac use [Command]+[Option]+[Esc], select your web browser, then select “Force Quit”.
  2. If unsuccessful, on your Windows computer try to shut down or restart your computer via the Start button icon along the bottom left taskbar: If the fake warning website covers your full screen where you cannot see the Start button icon, use your keyboard and press the Windows key [  or ] located at the bottom left corner of your keyboard, which should bring the Start menu to the foreground. You should then be able to use your mouse to navigate to Power > Shut Down/Restart.
  3. If none of the above methods work, do the opposite of what the scare page says: Turn off your computer by pressing and HOLDING the power button. After HOLDING down the power button for at least 5 seconds, the computer should shut off.
  4. After your computer is off, leave it off for at least a minute. Then briefly press the power button to turn it back on.
  5. If one of the above steps works to close the scare page and regain control of your browser or computer, you should be good to continue using your computer. However, don’t immediately go back to the website or email that redirected you to the scare page before, and don’t restore your previous browser session if prompted.
  6. If the scare page comes back after powering off your computer, it is likely going to sleep rather than completely powering off when holding down the power button for at least 5 seconds. Try powering it off again. If the message still appears, contact us for assistance. Again, never call the number on the screen.

How does the fake pop-up occur?

On a virus-free computer these pop-ups can occur when you mistype a web address, click a search link which redirects you to the malicious website, or a malicious advertisement can redirect you. If your computer already has adware or malware these pop-ups may occur when you visit any website whether or not the site is malicious or not. If you see pop-ups similar to those pictured while logged into your financial websites, contact Computer Techs right away for computer service. We also advise you to have an alternative web browser installed on your computer in case you are unable to use your primary browser.

Browsers now including scareware protection

In late 2024, Microsoft announced the intention to include scareware protection in their Edge browser. Other browsers such as Chrome, Firefox and Safari will likely follow with protections of their own. Read: Stand up to scareware with scareware blocker, now available in Microsoft Edge.

(more…)

Recognize a scam website by double-checking spelling in the address bar

Filed under: Scams,Security - Mar 07 2017

When using your web browser to visit different websites on the internet, always double-check spelling in the address bar. Scammers typically use misspellings of popular websites to get you to divulge your secure personal and login information. Double-checking the website address can also give you an important clue into the authenticity of a pop-up or request to login to a website.

Also read: Address Bar vs Search Bar vs Search Box – which to use?

Anatomy of a support scam website – from the Microsoft Blog

The scam starts like any other. You are redirected to the website by nefarious ads. When the page loads, you get a pop-up message that says your computer has been locked because of virus infection. It asks you to immediately call a technical support number.

Click for larger view.

Figure 1. Dialogue box that pops up when the site originiftsnormalpro.xyz is accessed. Click for larger view.

The website also starts playing an audio message, a tactic to further cause panic, something that we’re seeing more and more in these scams. It says:

Important security alert! Virus intrusions detected on your computer. Your personal data and system files may be at serious risk. All system resources are halted to prevent any damage. Please call customer service immediately to report these threats now.

In usual scam sites, if you click OK or close the pop-up message, a dialogue loop kicks in. The website continues to serve the pop-up messages whatever you do, effectively locking your browser.
In this new site, however, if you click OK, things start to get very interesting.

It loads a page with what appears to be a pop-up message containing the same details, including the technical support hotline. You may think at this point you’re just getting the usual dialogue loop. But, upon closer inspection, it’s not really a pop-up message, but a website element of the scam page.

Click for larger view.

Figure 2. A fake dialogue box that is really a website element. Click for larger view.

If you click OK on the fake dialogue box (or basically anywhere on the page), it goes into full screen and brings in another surprise. At full screen, you get what looks like a browser opened to support.microsoft.com/ru-ru/en. But, alas, just like the pop-up message, the browser is just a website element.

Click for larger view.

Figure 3. A fake browser that is part of the design of the support scam website. Click for larger view.

This is how the scam site is able to spoof support.microsoft.com in the fake address bar. It even has the green HTTPS indicator to further feign authenticity. If you didn’t detect the scam at this point, you may think you were redirected to a Microsoft website and it’s serving you some messages about your PC.
Don’t fall for this. Exiting full screen puts things in perspective.

Click for larger view.

Figure 4. The support scam website outside full screen. Click for larger view.

Busting the scam

Just like all tech support scams, this new iteration is doing its best to make you think there’s something wrong with your PC. The new techniques are meant to improve its chances of you taking the social engineering bait.

The key to stopping the attack is to immediately recognize and break it. If you’re a Microsoft Edge user, there are a couple of ways to do this.

The first clue that something’s amiss is a message from Microsoft Edge. As the offending site goes into full screen, you get a notification from Microsoft Edge. You can exit the full screen at this point by clicking Exit now, and you stop the attack.

Click for larger view.

Figure 5. Alert from Microsoft Edge that the site has gone to full screen. Click for larger view.

The second clue is the change in the interface. Since the page is designed to look like Google Chrome, if you’re a Microsoft Edge user, you may catch the difference. Detecting the change in the interface may be easier said than done, but the opportunity to break the attack is there.

Click for larger view.

Figure 6. You can detect that the fake browser is different from the real one. Click for larger view.

Conclusion: Avoiding tech support scams

As this newly discovered support scam website shows, scammers are always on the lookout for opportunities to improve their tools. They can get really creative, motivated by the possibility of avoiding security solutions and ultimately increasing the chances of you falling for their trap.

Avoid tech support scam websites by being more careful when browsing the Internet. As much as you can, visit trusted websites only. Like most tech support scams, you are redirected to offending sites via malvertising (malicious ads). These ads are usually found in dubious websites, such as those hosting illegal copies of media and software, crack applications, and malware.

Use Microsoft Edge when browsing the Internet. It blocks known support scam sites using Microsoft SmartScreen. Microsoft Edge can also stop pop-up dialogue loops used by these sites. It also calls out when a website goes into full screen, giving you a chance to stop the attack.

Click for larger view.

Figure 7. Microsoft Edge blocks the support scam website using Microsoft SmartScreen. Click for larger view.

Why you need an alternative web browser

Filed under: Computing Tips,Security,Tech Support - Mar 07 2017

Updated March 2017:

A web browser is the program that you use to access internet web sites. For most of this decade the most popular browsers include Internet Explorer, Google Chrome, Mozilla Firefox, Safari and the AOL browser. Some browsers are faster than others, while others have more security precautions built-in. Whichever one you use, it’s a good idea to install and become familiar with at least one alternative web browser now – in case your regular web browser doesn’t work or can’t access some or all web sites.

browser-icons

In 2015 Microsoft released a new browser called “Microsoft Edge” bundled with their Windows 10 operating system. Since the release of Edge, Microsoft has stopped updating features in the once-popular Internet Explorer. Internet Explorer has become less reliable and more prone to security issues in the past few years and we no longer recommend it using it as your primary browser. Currently the most popular and secure browser is Google’s Chrome browser.

In summary you need to have and be familiar with multiple browsers, so when one doesn’t work to access certain web sites, you’ve got a backup alternative browser.

Troubleshooting Tip: If accessing web sites with your regular browser does not work, but it does work with an alternative web browser, it can be assumed that it’s a problem with your browser or web site and not a problem with your internet connection. With an alternative browser you can continue to access web sites until Computer Techs can fix your regular browser.

Like backing up your computer before disaster strikes, we suggest installing an alternative web browser today so that you’ll have it available in case of an emergency.

Print This Article Print This Article

« Previous PageNext Page »