27363681109850116521312867

COMPUBC INFORMATION TECHNOLOGY SERVICES LTD. MANAGED IT SERVICES FOR BUSINESS & RESIDENTIAL. PC & MAC.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews

How To Tell If Emails ‘From Facebook’ Are Fakes

5/30/2017

0 Comments

 

A relatively harmless fake email disguised as an email from Facebook Support provided a primer on signs to look for in identifying emails of the annoying variety, like this one, as well as more serious ones that lead to malware, phishing, or other cyber-security issues.

Picture
A relatively harmless fake email disguised as an email from Facebook Support provided a primer on signs to look for in identifying emails of the annoying variety, like this one, as well as more serious ones that lead to malware, phishing, or other cyber-security issues.
The email, pictured below, looks like an authentic communication from Facebook Support at first glance, but upon further examination, red flags fly.

  • Sender’s email address: Communications from Facebook would come from a Facebook or fb.com email address, not from: FACEBOOK Inc [christopherbetit@reagan.com]
  • Recipient’s email address: This email came to an email address that is not associated with a Facebook account, bringing to mind emails that attempt to phish users’ banking information, which result in spam emails fashioned to appear as if they come from actual banks, sent to users who have no accounts at those banks.
  • Details at the bottom: These spammers could have done a better job than, “Attention: Department,” not to mention the fact that Facebook’s headquarters are in Menlo Park, Calif., and not nearby Palo Alto.
  • URLs: Email recipients who are suspicious of communications of this sort should always examine the URLs that are linked to. Hovering the mouse cursor over either the “Go to Facebook” or “See All Notifications” buttons did not yield Facebook URLs, but did yield this URL, which has nothing to do with the social network: http://iphotoplay.com/pomerania.html.
As it turned out, this email was neither malware nor a phishing attempt, but an annoying way to drive recipients to a site for Canadian Family Pharmacy offering the traditional drugs of spam emails (and we will not vouch for their authenticity, for obvious reasons): Viagra, Cialis, Levitra, and Propecia.
The moral of the story: Look for signs like those listed above if there is the slightest reason to be suspicious of emails that appear to be from Facebook but seem a little off.
0 Comments

Top 5 Reasons Your Antivirus May Fail to Protect You

5/30/2017

0 Comments

 
Picture
You are probably aware that going online puts you at risk of catching viruses or malware, even if you don’t visit questionable websites. And if you are a careful person, you most likely have a decent antivirus program installed on your computer. Do you believe with all your heart that your computer is safe and your antivirus can protect it against any threat that tries getting through? Think again! 
There are certain conditions or circumstances, which may lead to a major security breach that may result in an infection or data loss. Even if you believe you are well protected, read on to see the top 5 reasons your antivirus may fail to protect your computer.
1. License Expired ​
Picture
Oftentimes, when you buy a new computer, it comes with some antivirus program preinstalled on it. And most of the time it is a 30-day trial that requires you to purchase a license after 30 days, which a clear majority of users fail to do on time. 
Same goes for a regular antivirus license, which is normally good for 1 year and which a lot of users fail to renew before the year ends. 
Both situations lead to your PC remaining without proper protection until you renew your license or buy/install a different antivirus program. The antivirus program you have may still work with the expired license: it may let you run scans and even clean up threats, but it will usually NOT allow you to update virus definitions. This means that malware and viruses released after your license expiration date will not be detected.
Make sure your antivirus license is active and don’t let your PC go even for a day with no AV protection when your license expires: renew or replace beforehand.
2. No Updates Installed
Picture
Some security programs require you to run database updates manually or you may have set up the program to require manual database updating. Either way, your antivirus will not be aware of the latest viruses and will not detect them if you don’t update the virus definitions database. And the sad truth is that not very many users understand the importance of this task. You’ll be surprised at how many users have antivirus programs on their PC’s using outdated virus databases. All those computers are at risk of getting infected anytime.  
Have your antivirus program set up to automatically update its virus database when needed. If that’s not possible, update the database manually every day or think of getting a different antivirus that offers automatic updates.
3. You come across malware not covered by antivirus
Picture
What? Yes, you read it right. There are a lot of users out there who install some other kind of software, such as a disk cleanup program or a PC optimization suite and believe that it is going to protect their computer from viruses and malware. The reason for such a misunderstanding is unclear. It may be because advertisements for that software include the word “protection” and the user automatically thinks it has something to do with viruses, while the software may merely protect PC from glitches, protect data from accidental loss (as in backup software), etc.  When their PC gets infected with malware, the user is genuinely surprised and blames that program, while the program wasn’t even meant as an antivirus.
Please don’t consider this an insult, but do check your antivirus software to make sure it is what you believe it to be. 
5. Your antivirus is not the best
Picture
And the last reason we will mention here is the simple fact that your antivirus may not be the best one out there. Not all security programs are created equal. When you look at various independent comparative tests of antivirus products, you may see detection rates of anywhere from about 70% to 100%. What does that mean? It means that a program with a 70% detection rate misses 30% of threats, as simple as that. Look at comparative tests and see where your antivirus program stands in their charts. 95% detection rate is considered good, 98% is awesome. Basically, the closer the program is to 100%, the better. If the security program you have on your PC is located low on the chart, your PC may be at a higher risk of getting infected. Consider replacing the program with another one from higher up on the chart. 
Learn how to check whether a site is legitimate: read user reviews and see what independent sources say about the site. Have your antivirus scan any unknown link that you are about to click on.
Besides eliminating the five factors we mentioned above, what else can you do to prevent getting infected? The most important thing you can do is learn some safe browsing habits.
0 Comments

The Google Phishing Scam: How to Protect Your Data

5/25/2017

0 Comments

 
A recent Google Phishing scam hit headlines after a number of Gmail users had their accounts compromised by a worryingly sophisticated email scam. Users were tricked into clicking an email that took the user to a real Google account selection screen, and after selecting their account, a “Google Docs” window would appear, requesting permission to read, write and access emails.
By granting “Google Docs” permission, the document was revealed to be published by a random Gmail account, and the holder of the account would now have access to the affected account. What they thought was “Google Docs” was in fact a malicious third-party web app, and scammers now had access to user emails, and could send more scam emails from the victim’s account.
The most worrying aspect of this phishing scam was that the scam worked within the existing Google login system, it bypassed the two-factor authentication and was only noticeable as fake after clicking the link. The scam took advantage of the fact that fake applications named “Google Docs” can be created, and since the scam didn’t require victims to type in their passwords, the usual anti-phishing measures didn’t block it.
The scam exploited Open Authorisation (OAuth). OAuth notifies a resource provider that the resource owner grants third-party access to their information. An example of this would be Facebook (resource provider) being notified that you (resource owner) are allowing a third-party (a Facebook application) to access your information (your friend list). There are a multitude of online services that use OAuth, and it’s impossible to vet all the third-party applications that use it.
Fortunately, the scam was detected and dealt with quickly by Google within an hour. A company statement assured users of the following:
  • Offending accounts had been disabled
  • Fake pages and applications had been removed
  • Updates were being pushed through Safe Browsing, Gmail, Google Cloud Platform, and other counter abuse systems
The scam ultimately affected around 0.1% of Gmail users, which equates to about one million users out of Gmail’s one billion active users.
Phishing scams of this scale are relatively rare, and therefore make headline news. However, phishing attacks are all too common and it’s worth taking preventative measures to ensure that your account isn’t compromised.
How to Protect Yourself from a Phishing Scam
Phishing emails are typically designed to fool the victim into giving away their personal information, or installing malicious software. Luckily, there are a few easy ways to spot a phishing scam:
  1. Bad spelling and grammar is often seen in phishing emails, and a legitimate company with hired copyeditors would never release such an email. Big brands care about their reputations, cyber criminals don’t.
  2. Never click an unknown link. If the email encourages you to click on a link to ‘fix’ a problem or to ‘claim’ a prize, hover your mouse over the link and look at the address. If the link looks unusual, a way to test the legitimacy of the link would be to manually type it into the address bar in a new window—if the URL takes you to a different address from the one you’ve typed, it’s fake
  3. Analyse how the sender addresses you. Legitimate companies like to be as personable as possible and often will address you by your name, not by vague titles like ‘Valued Customer’.
  4. If the language is threatening or urgent, and claims that your account has been suspended, has had unauthorised logins attempts, or will be closed if you don’t act, it’s most likely a scam. Scammers often try to inject a sense of urgency to make you act before thinking.
  5.  Always scrutinise email attachments. While you might be expecting a file from someone, make sure to check the attachment for anything suspicious. It’s very easy to download malware that damages files on your computer, steals your passwords or spies on you without your knowledge.
  6.  Make sure to check the address bar. Even if you’re sure the sender is legitimate, make sure to check the address bar if you click on a link. While a scammer can create a convincing login page to trick you into giving away your password, a quick glance at the address bar should tell you if the website you’re on is genuine.
  7. Double check, if you can. While you may be able to recognise a phishing scam at home, recognising one at work is just as important. Scammers can easily pose as a highly ranked member of an organisation and send fake emails to employees asking for personal information. This kind of personal information can easily be used for fraud, so try to check if the email is genuine by contacting the sender themselves if possible.
  8.  Don’t trust email headers. An email header can be forged with a brand name, and scammers can easily make a fake ‘From’ address similar to a real company.
  9.  If the message asks for personal information, never give it up. No matter how official or genuine an email may look, companies would never ask for personal information via email. Asking for account numbers, passwords, or the answer to a security question would never happen with a trustworthy company.
  10. A lack of information about a sender can be a tell-tale sign of a fraudulent sender. Companies tend are keen to hear from their customers and always leave contact details.
This list is by no means exhaustive—phishing scams have become increasingly convincing, and scammers are always evolving new ways to hit unsuspecting users. Email phishing is the number one delivery vehicle for malware, and in 2015, 85% of organisations were victims of phishing attacks and 30% of phishing emails were opened! Having the intuition to spot scams is an excellent way to protect yourself and others from losing personal information and other sensitive data.
But regardless of how vigilant you might be when inspecting your emails, mistakes do happen and the most convincing scams often fool even the savviest of tech users. Our next post will cover the next steps should your system fall prey to a phishing scam, with tips on how to locate the affected account, and investigate what data has been accessed.
0 Comments

Jaff Ransomware Switches to the WLU Extension and Gets a New Design

5/24/2017

0 Comments

 
0 Comments
<<Previous

    Archives

    January 2023
    December 2022
    November 2022
    September 2022
    August 2022
    June 2022
    October 2021
    August 2021
    July 2021
    May 2021
    April 2021
    March 2021
    January 2021
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    May 2020
    March 2020
    November 2019
    August 2019
    July 2019
    June 2019
    May 2019
    March 2019
    November 2018
    July 2018
    June 2018
    May 2018
    April 2018
    February 2018
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017

Picture
Avner Coopman
Owner
2951 Britannia cres
Port Coquitlam BC, V3B 4V5

Phone 778-776-6222

Hours of operation
Mon - Fri 9:00 AM - 7 PM
Sat 11:00 AM - 5:00 PM
Sunday & Holydays - Closed
​
Your privacy is important to us you deserve our full attention
Please schedule an appointment
© Copyright CompuBC, All Rights Reserved.
Business Number 778569517BC0001
Click for the BBB Business Review of this Computer Business Services in Port Coquitlam BC
Picture
Some icons made by Freepik, xnimrodx, Smashicons, itim2101, photo3idea_studio, and prettycons from Flat Icons.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews