27363681109850116521312867

COMPUBC INFORMATION TECHNOLOGY SERVICES LTD. MANAGED IT SERVICES FOR BUSINESS & RESIDENTIAL. PC & MAC.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews

Can a VPN Protect You From Ransomware?

9/7/2022

0 Comments

 
Ransomware is a pretty serious issue: one hack can either cost you a lot of money or your data—both if you’re unlucky. It’s important to guard against this threat, and we have seen some VPNs claim they can help. But can a VPN really protect you from ransomware?
Picture
VPN Ransomware Protection

The answer is quite simply no, a VPN cannot help you with ransomware attacks, prevent them or solve them. Anybody claiming that they can is trying to sell you something. Untrustworthy VPN providers are guilty of marketing their products as cure-alls for every problem on the internet, and “ransomware” is just another keyword to them. Even a VPN isn’t a cure-all for internet privacy. You also need to change your browsing habits.

The reason why a VPN can’t block ransomware is because they’re very different things. In real-world terms, it’s a little like be like replacing your car’s tires to fix a chip in the windshield. It’s not directly related. To understand a little better how this works—or rather, not—we need to take a closer look at both ransomware and VPNs.
Picture
How Ransomware Works

The way most ransomware works is that it somehow infects your system, usually through a file you download or even a targeted attack. Once on your system, it spreads throughout and encrypts parts of your hard drive, or even all of it. To unlock and decrypt your data, you need to pay money, a ransom, to the attackers; hence “ransomware.”
As you can imagine, ransomware is a nasty thing to fall victim to, and what makes it worse is that there’s no guarantee you’ll actually get your files after paying the ransom. Often enough, attackers will simply make off with the money without giving up the key to the encrypted files. It’s no surprise then, that anti-ransomware software has become a booming business.
Picture
How VPNs Work

Obviously, when business is booming, people will want a piece of it, and in a way it’s logical to think that VPNs could be a way to protect yourself against ransomware. After all, they can protect you online and many providers promise security of some kind or another.

Thing is, though, that VPNs only affect how you appear on the web. When you use a virtual private network, you reroute your connection through a server owned and operated by your VPN provider.  This makes you appear like you’re somewhere else than your actual location, which is great if you’re trying to circumvent regional restrictions.

It does nothing, however, to deter ransomware. A changed location doesn’t mean you’re suddenly undetectable to criminals, especially if you’re the one that downloaded the malicious program in the first place.

However, rerouting your connection isn’t the only thing that VPNs do, they also encrypt your connection in a so-called VPN tunnel. This is great if you want to avoid being spied on by your internet service provider, your government, copyright watchdogs, or anybody else that wants to monitor your connection.

Again, though, this does not apply to ransomware: the software is already on your system, and the VPN software can do nothing against it being there. Neither is it able to prevent you from downloading it or protecting you from hackers breaking into your system.
Picture
Threat Detection Systems

That said, some VPNs bundle added security software with their description, which may help in fighting ransomware. Good examples are ProtonVPN’s NetShield and ExpressVPN’s threat manager. These act much like similar systems offered by many of the best antivirus software in that they block access to suspicious sites, including those which are known to infect you with ransomware.

In these cases, a VPN may be of help in fighting ransomware, but only because of these extra modules; the core technology is still pretty powerless. You’re better off with the protection offered by your antivirus program, which also extends to scanning your computer for dangerous ransomware before it runs—something a VPN can’t do.

​VPNs and Ransomware

VPNs aren’t a defensive armor you can put on and be protected from all of the internet’s ills, no matter how much VPN providers would like to convince you otherwise. They’re a protective measure you can take to prevent being tracked, as well as a tool that can get past blocks.

There are plenty of valid ways to prepare for a ransomware attack, but getting a VPN subscription isn’t one of them. If you encounter a provider that claims otherwise—or even hints that they can—you may want to steer clear of them and their dodgy claims. There are plenty of VPNs that try and gain customers without claiming magical powers, stick with them; our selection of the best VPNs is a good place to start.
0 Comments

How to use confidential mode in Gmail to protect sensitive information

8/30/2022

0 Comments

 
Gmail includes a handy feature that helps protect sensitive information. Jack Wallen shows you how easy it is to use Confidential Mode.
Picture
A few years back Google did add a nice feature to Gmail called Confidential Mode that helps protect sensitive information from authorized access. With Confidential Mode, you can set an expiration date and a password for messages and even revoke access any time you choose. And when a recipient receives a confidential message, they cannot forward, copy, print, or download the message.
Requirements
The only thing you'll need to use Confidential Mode is a Gmail account on either the web-based Gmail client or the mobile app (it works on Android and iOS). I'm going to demonstrate using the web-based client, which works on almost any web browser, but the email client works similarly.
How to send an email in Confidential Mode

1. Open Gmail
Open your web browser, head to Gmail, and log in.
2. Compose an email
​Click Compose to open the Gmail compose window. At the bottom of that window, click the padlock-and-clock icon
Picture
3. Configure the Confidential Mode settings
In the resulting pop-up, click the Expiration drop-down and select one day, one week, one month, three months, or five years.
Picture
If you want to add a passcode, click SMS passcode and click Save, which will return you to the Compose window.

4. Compose and send your email
Compose the email as you would normally and then click Send. This will bring up another pop-up, where you'll be asked to type a phone number for the recipient.
Picture
Click Send and your recipient will receive an email with a link to view its contents. When they click the link, a new web browser page will open where they'll need to click a link to be sent the passcode. Once they have the passcode, they enter it in the browser pop-up and click SUBMIT, and they can then view the message.

No matter what type of email account you send the Confidential Mode message to, the recipient will have to open it in a web browser and the content is displayed in such a way that they cannot do anything with it other than read it.
And that's all there is to using Gmail's Confidential Mode. Consider employing this feature for those missives that include sensitive information, so it doesn't wind up in the wrong hands.
0 Comments

Criminals are hijacking PCs by mailing out fake Microsoft Office USB sticks

8/22/2022

0 Comments

 
Picture
​In brief: Readers of this site will know that one of the golden rules in life is never to use an unsolicited USB stick that arrives in the mail, even when it's inside convincing Microsoft Office packaging and engraved with the Office logo. Criminals have been using the trick to scam unsuspecting victims in the UK who believed they were sent the expensive piece of software by mistake.
The baiting attack is a more elaborate version of the traditional email phishing version in which millions of people receive messages with links to supposedly free software, often one of Microsoft's suite of programs, but they are actually downloading malware onto their device.
While mailing an engraved USB stick inside fake Office Professional Plus packaging to random people might cost a lot more than email phishing, recipients are more likely to be fooled into thinking it's the real deal, convinced they were sent the $439 item by mistake.
​
Sky News reports that the storage device does not contain Microsoft Office, of course. Victims who plug the drive into their machines are met with a warning informing them that their system is infected with a virus, and the only way of removing it is to call the included toll-free number.
Picture
Martin Pitman, a cybersecurity consultant for Atheniem, explains that this is the point where the scam moves into more traditional territory. After making the call, the person on the other end of the line explains to the victim that they need to install a program to rid themselves of the virus. This is a type of remote access program (RAT) that grants the scammer complete control of the computer.
​
"Here the hackers 'sorted' the problem and then passed the victim over to the Office 365 subscription team to help complete the action," Pitman explained.
Microsoft confirmed it is aware of the scam taking place but insisted such instances are rare. The company said it makes every effort to remove any suspected unlicensed or counterfeit products from the market. Microsoft reaffirmed that it never sends out unsolicited packages, and it does not contact people out of the blue for no reason.
Thanks Rob Thubron from Techspot
0 Comments

How USB Drives Can Be a Danger to Your Computer

6/3/2022

0 Comments

 
Picture
Did you find a random USB stick, perhaps at your school or in a parking lot? You may be tempted to plug it into your PC, but you could leave yourself open to attack or, worse still, permanently damage your machine. Here’s why.
USB Sticks Can Spread Malware​

Probably the most common threat posed by a USB drive is malware.
Infection via this method can be intentional and unintentional, depending on the malware in question.
USB drives can also disseminate other security threats like remote access trojans (RATs), which give a potential attacker direct control of the target, keyloggers that monitor keystrokes to steal credentials, and ransomware that demands money in exchange for access to your operating system or data.
Picture
Ransomware is an increasing problem, and USB-based attacks aren’t uncommon.
​In early 2022 the FBI released details about a group called FIN7 who were mailing USB drives to US companies. The group attempted to impersonate the US Department of Health and Human Services by including the USB devices with letters referencing COVID-19 guidelines and sent some infected drives out in Amazon-branded gift boxes with thank you notes and counterfeit gift cards.
In this attack, the USB drives presented themselves to the target computer like keyboards, sending keystrokes that executed PowerShell commands. In addition to installing ransomware like BlackMatter and Ravil, the FBI reported that the group could obtain administrative access to target machines.
​In addition to USB drives being used to deliver a payload, dreams can just as quickly become infected by being placed into compromised computers. These newly infected USB devices are then used as vectors to infect more machines, like your own. This is how it’s possible to pick up malware from public machines, like those you might find in a public library.
Picture
“USB Killers” Can Fry Your Computer
While malicious software delivered by USB poses a real threat to your computer and data, there is a potentially even greater significant out there in the form of “USB killers” that can physically damage your computer. These devices created quite the splash in the mid-2010s, with the most famous being the USBKill which is (at the time of writing) on its fourth iteration.
​This device (and others like it) discharges power into whatever it is plugged into, causing permanent damage. Unlike a software attack, a “USB killer” is designed to damage the target device at a hardware level. Data recovery from drives may be possible, but components like the USB controller and motherboard will probably not survive the attack. USBKill claims that 95% of devices are vulnerable to such an attack.
These devices don’t only affect your computer via USB drives. Still, they can also deliver a powerful shock to other ports, including smartphones that use proprietary ports (like Apple’s Lightning connector), smart TVs and monitors (even over DisplayPort), and network devices. While early versions of the USBKill “pentesting device” repurposed the power supplied by the target computer, newer versions contain internal batteries that can be used even against devices that aren’t powered on.
The USBKill V4 is a branded security tool used by private companies, defense firms, and law enforcement worldwide. We found similar unbranded devices for less than $9 on AliExpress, which look like standard flash drives. These are the thumb drives you are far more likely to encounter in the wild, with no real tell-tale signs of the damage they can cause.
Picture
How to Deal With Potentially Dangerous USB Devices
The simplest way of keeping your devices safe from harm is to scrutinize every device you connect. If you don’t know where a drive came from, don’t touch it. Stick to brand-new drives that you own and purchased yourself, and keep them exclusive to devices that you trust. This means not using them with public computers that could be compromised
While USB killers could cost you hundreds or thousands of dollars in hardware damage, you’re probably not likely to encounter one unless someone targets explicitly you.
Malware can ruin your whole day or week, and some ransomware will take your money and then destroy your data and operating system anyway. Some malware is designed to encrypt your data to make it unrecoverable, and the best defense against any type of data loss is to always have a solid backup solution. Ideally, you should have at least one local and one remote backup.
If sharing drives are unavoidable, make sure other parties are aware of the dangers and take steps to protect themselves (and you, by extension). Running anti-malware software is a good start, mainly if you’re using Windows.
Take Care
For most people, malware delivered by USB poses little threat because cloud storage has replaced physical devices. “USB killers” are scary-sounding devices, but you probably won’t encounter one. However, by taking simple precautions like not putting random USB drives into your computer, you can eliminate almost all risks.
However, it would be naive to assume that attacks of this nature do occur. Sometimes they target individuals by name, delivered in the post. Other times they’re state-sanctioned cyberattacks that damage infrastructure on a massive scale. Stick to a few general security rules and be safe online and offline.
Picture
On a personal note
"Your problem is our problem." don't be the weakest link; think before clicking, opening, inserting, and executing.
Once you introduce any type of risk into a network, it will become a greater risk to us all.

0 Comments
<<Previous
Forward>>

    Archives

    January 2023
    December 2022
    November 2022
    September 2022
    August 2022
    June 2022
    October 2021
    August 2021
    July 2021
    May 2021
    April 2021
    March 2021
    January 2021
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    May 2020
    March 2020
    November 2019
    August 2019
    July 2019
    June 2019
    May 2019
    March 2019
    November 2018
    July 2018
    June 2018
    May 2018
    April 2018
    February 2018
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017

Picture
Avner Coopman
Owner
2951 Britannia cres
Port Coquitlam BC, V3B 4V5

Phone 778-776-6222

Hours of operation
Mon - Fri 9:00 AM - 7 PM
Sat 11:00 AM - 5:00 PM
Sunday & Holydays - Closed
​
Your privacy is important to us you deserve our full attention
Please schedule an appointment
© Copyright CompuBC, All Rights Reserved.
Business Number 778569517BC0001
Click for the BBB Business Review of this Computer Business Services in Port Coquitlam BC
Picture
Some icons made by Freepik, xnimrodx, Smashicons, itim2101, photo3idea_studio, and prettycons from Flat Icons.
  • CompuBC Services
    • Residential
    • Business
    • Managed IT Services
    • Canadian Based File Sharing & Syncing
    • Cloud Computing
    • Business continuity & disaster recovery
    • Data Recovery
    • Network Infrastructure & VoIP
    • Office IT Relocation
  • Service Request
  • Service Cost
    • Managed Services & Business Service Cost >
      • Office 365 Business plans
      • Exchange Online
    • Residential Service Cost >
      • Office 365 Residential plans
    • Data Recovery Service Cost
  • Remote Support
  • Self Service area
  • Social & Blog
    • Facebook posts
    • Blog
  • Terms and Conditions
  • About Us
  • Reviews