Well, here we go again. We have all seen the FALSE Purolator, UPS, and mail carrier email notifications claiming that there is a shipment awaiting pick up.
As it turns out, DHL is no exception.
Spammers have started sending out emails purportedly by DHL. By spoofing the sender info, the recipient is fooled into believing the email titled DHL Express Notification for shipment for 26 Oct 2011 is legitimate.
However, when the attachment is unzipped, it reveals an executable file, which is a Zbot Trojan variant.
This variant is relatively new to the MalWare arena, and as such is currently only detected by a handful of AntiVirus solutions.
Best advice. Keep an eye out for this nasty email, and delete it immediately!
Traditionally, these emails tend to change slightly as they get into circulation. Therefore, keep an eye on the date associated with the email body. It might change as the emails make their way around cyberspace.
“TSG Computer Services has been invaluable in providing service to the systems we provide. Our broad network of devices is highly reliant on a team of local contractors which we have in place. TSG Computer Services has been, and continues to be one of our top contractors. They consistently demonstrate exceptional knowledge and expertise regardless of the job at hand. They assume full responsibility of the task locally from hire until completion, and their turn-around time continues to exceed expectations.”
- Tom Prucha, VP Operations, Intercam Systems Inc.
This alert was just released. Researchers at AV Labs just identified one of the latest phishing attempts being sent to email recipients. It preys on clients of the Royal Bank of Canada (RBC) or RBC Royal Bank.
“This email from “RBC Online” masquerades as an alert notification message regarding a security update. Upon reading the message body, however, it asks the recipient to validate their account with the bank. Like most unsophisticated phishing attempts, this is a bit of an odd one, too, since validating an account has nothing to do with “security updates” or a “scheduled system maintenance”. Composition-wise, it doesn’t make sense, and it seems that the phishers behind this scam merely used terms and phrases that could get recipients to potentially click their link.”, says Jovi Umawing.
To make things more believable, after the submit button is pressed the victim is sent to a Thank You page in an effort to build the trust factor.
Always question everything you get when it comes to email. If you are ever in doubt as to the emails origin, check the Company’s website. However, don’t use the link that was provided in the email, use google instead. Also, check the URL of the site you are directed to. This is best way to tell upfront if you are being fooled.
Well, long gone are the days of Mac being the untouchable operating system. In the past few months, there has been a rise in the number of Viruses directed at the Mac platform, and this one is no exception.
A variant of the Flashback Trojan for Mac OS X has developed the ability to disrupt XProtect’s auto-update functionality. XProtect is the operating system’s built-in anti-malware application.
The Trojan shuts down the XProtectUpdater daemon, and overwrites both the XProtect Updater and it’s binary path. This essentially prevents the application from receiving updates.
It looks like it’s time for Mac to start strengthening it’s sheild.
Seniors are one of our most overlooked demographics. However, we are finding because technology is changing at such an alarming rate, it is often difficult for seniors to adequate familiarize themselves with it.
With social networking sites seeing more and more seniors become part of their membership database, the potential for this demographic to become a target of cybercriminals is increasing.
The internet over recent years has been an effective tool for cybercriminals who are looking for an easy way to gain access to personal information such as username/password combinations, credit card number or even Social Insurance Numbers. With any demographic, the easiest way to prevent cybertheft is by educating the public.
Below are a few simple rules will dramtically reduce the chances of becoming a victim.
- Make sure you have antivirus and antispyware software installed on your computer, and that it is kept current. The archiles heel of home IT security continues to be “keeping your security software up to date with the latest definition files”.
- Make sure your computer’s firewall is turned on. It is an extremely easy and effective way to ensure that all unauthorized access to your computer is blocked entirely.
- Make sure that if you have a router, the wireless is properly secured. The minimum encyption algorithm you should use is WPA. WPA2 is recommended. Stay away from WEP, as that technology has already been compromised.
- Dont get hooked by phishing schemes Be The Detective. Never take an email for what it says. Scammers utilize the fact that the human brain will fill in the small words which are missing in a sentence, if the sentence makes sense. This is also happens to be the main identifying clue as to the emails origin. When a person reads an email quickly, their brain fills in the letters or small words that are missing in order to make the sentence more comprehensible. This can have disasterous effects if the reader is scimimng through emails at breakneck speed. Slow down, and read the entire email thoroughly. If is has spelling errors, question it’s validity.
- If the offers you see online are “too good to be true, they proably are”. Free isn’t always free. It might be free for the end user monitarily speaking, but you may find that it comes at a high price in tems of your computer security. Often times, “free” programs are found to contain malware and/or spyware applications. At the very least you might be looking at $70 to have your system properly cleaned up by a professional. The other end of the spectum can often include Credit Card Fraud using (you guessed it), your credit card. This is made possible by keylogging malware applications that can be included in free software.
- Never disclose personal information to people on social networking sites, unless you KNOW them. Disclosing information like this can potentially put you and your loved ones at risk.
- Don’t use the same password for multiple sites. Change them up. If keeping track of passwords is a problem, use a password manager. It will manage all the websites and usernames & passwords for each site. All you will need to do is remember one (1) password to get access to the manager. Also, make your passwords long & strong. Letters, Numbers and Special Characters are recommended to be used in every password you create.
Ensuring full compliance with these general guideleines will help to safeguard you aginst cybercriminals. Remember, to a cubercriminal, you are just another potential target.
Since Microsoft invented Windows, it has been operated almost entirely with a mouse. However, studies show that unless we are cruising the internet, our hands are on the keyboard more often than that of the mouse.
Another study conducted by “F1-Key.com” found that using a keyboard to issue commands is over three (3) times faster than using the mouse. They also found that it takes three (3) seconds longer to move the mouse to the desired location and press the button, than to issue a 2-key shortcut.
In Lieu of this information, here is the complete list of Windows shortcuts for your enjoyment.
|Windows Logo Key||Open or close the Start menu|
|Windows logo key + Pause||Display the System Properties dialog box|
|Windows Logo Key + D||Display the desktop|
|Windows Logo Key + M||Minimize all windows|
|Windows Logo Key + Shift + M||Restore minimized windows to the desktop|
|Windows Logo Key + E||Open Computer|
|Windows Logo Key + F||Search for a file or folder|
|Ctrl + Windows Logo Key + F||Search for computers (if you’re on a network)|
|Windows Logo Key + L||Lock your computer or switch users|
|Windows Logo Key + R||Open the Run dialog box|
|Windows Logo Key + T||Cycle through programs on the taskbar|
|Windows Logo Key + number||Start the program pinned to the taskbar in the position indicated by the number. If the program is already running, switch to that program|
|Shift + Windows Logo Key + number||Start a new instance of the program pinned to the taskbar in the position indicated by the number|
|Ctrl + Windows Logo Key + number||Switch to the last active window of the program pinned to the taskbar in the position indicated by the number|
|Alt + Windows Logo Key + number||Open the Jump List for the program pinned to the taskbar in the position indicated by the number|
|Windows Logo Key + Tab||Cycle through programs on the taskbar by using Aero Flip 3-D|
|Ctrl + Windows Logo Key + Tab||Use the arrow keys to cycle through programs on the taskbar by using Aero Flip 3-D|
|Ctrl + Windows Logo Key + B||Switch to the program that displayed a message in the notification area|
|Windows Logo Key + spacebar||Preview the desktop|
|Windows Logo Key + ↑||Maximize the window|
|Windows Logo Key + ←||Maximize the window to the left side of the screen|
|Windows Logo Key + →||Maximize the window to the right side of the screen|
|Windows Logo Key + ↓||Minimize the window|
|Windows Logo Key + Home||Minimize all but the active window|
|Windows Logo Key + Shift + ↑||Stretch the window to the top and bottom of the screen|
|Windows Logo Key + Shift + (← or →)||Move a window from one monitor to another|
|Windows Logo Key + P||Choose a presentation display mode|
|Windows Logo Key + G||Cycle through gadgets|
|Windows Logo Key + U||Open Ease of Access Center|
|Windows Logo Key + X||Open Windows Mobility Center|
For those of us that want to shave a few seconds or even minutes off our daily grind in the office, it might be worth it to learn a few shortcuts.
Steve Jobs’ unfortunate passing was a blow to not only Apple, but the world as a whole. He took Mac and redesigned it from the ground up, giving us what we have today. Thanks Steve!
It’s sad that even the death of such an iconic individual isn’t without scum trying to profit from the news. These individuals are arguably without a moral conscience. Yes, I am referring to scammers – the mutating virii in the petri dish of humanity – the scum of the earth.
As soon as news of Steve Jobs passing went public, scammers put their plan into action. Within a few hours of the news, a Facebook page called “R.I.P. Steve Jobs” went live. It claimed that 50 new IPods were being given away in memory of Steve Jobs. The page quickly gained fans, and had a fan base of more than 90,000 in a few short hours. However, it’s lifespan was just as long. By 8:00 the next morning, it had been shutdown.
Apparently, over 21,000 people had clicked the link. The mothod the scammers used to trap victims was by having them enter their cellphone number into the webpage. However, instead of receiving a prize as stated, they would instead receive a series of costly SMS messages. Not quite what they were promised.
Goes to show you that scammers will stop at nothing to acquire another victim.