Scareware

Scareware – What Is It? Should You Be Concerned?

According to IN Homeland Security, the probability of scareware, a software developed to be the solution to a nonexistent problem, is going to make a huge return. The possibility of these forecasts being true seems rather high.

A security specialist recently got in touch with the Spiceworks IT platform for help on a possible scareware infection. The IT expert reported that after running multiple scans, nothing was suggesting there was an internal problem. It is believed these messages were scareware, utilized to trigger the user to call the number within the message for “assistance.”Scareware

In an effort to avoid falling for incorrect information or alarms meant to scare you, contact Tech Sentries if you receive any messages on your computer about a malware infection. If you call the phone number noted in the malware alert, there is an excellent chance you’re calling the hackers. This can be a significant problem, as you might be offering payment information or remote access to an individual who is most certainly not looking out for your best interest. As I stated, it is best to call your security software application business directly.

This results in another question. What about phones and tablets? Do you have security software on them? If so, you may need to use it if you’re a part of the most recent Pokémon Go trend. Reports made by Huffington Post stated the app “Guide and Cheats for Pokémon Go” included scareware, which potentially includes ransomware. So, to be clear, not only could you possibly get messages for concerns that are nonexistent, you might likewise be infected with ransomware ! Your best option for this particular case—avoid this app completely.

Call us today (843-282-2222) or contact us at www.techsentires.com and see how we can keep you safe, all while you sleep or work. Never worry about scareware or being held hostage by ransomware.

ransomware sidekick

Ransomware Has a New Sidekick

ransomware sidekick

Ransomware is nasty no matter how you slice it. And now it has a sidekick called ranscam. In this article, we want you to know what it is and how to keep from becoming a victim of it.

The very term “ranscam” sounds like what it is—ransomware that gets wormed in to your computer system and creates a ransom demand that it sends to you. It does not cause your files to be encrypted but it does actually delete them! In the ransom demand, you will be told what they want you to do to retrieve your files, but you can rest assured it involves collecting money from you.

ransomware ranscam

Many cyber security experts believe this particular strain of ransomware will not last very long since its reputation is very negative. Other ransomware is far more sophisticated such as that in the series called Crypto. The only reason these viruses exist is for their creators to turn a very quick profit. This poses the question of how you can tell if your computer has been affected by either ransomware or the ranscam virus.

Read on….

If you are wanting to know if you have either ransomware or ranscam, unfortunately, you can’t really know. And if you pay the ransom demand, there’s no guarantee that your files will be recovered. Remember—it’s a criminal asking for the money so you’re not paying a normal person. They could care less about your personal pictures, movies and other files. They only want your money. Even if you pay what they demand, they really don’t care about your stuff so you probably will never see your files again.

If you think you’ve been victimized by ransomware, you need to understand and follow the following steps:

  • Don’t pay any ransom money! All you’re doing is funding these hackers to continue on to their next criminal act.
  • Restore your system by using your back-up files. Do NOT pay anything!
  • Let the FBI know. The FBI needs to know about these hackers in order to bring justice through legal proceedings.
  • Report all cyber-criminal activity you see to IC3, which is a federal agency. It is here so you can file any complaints.
  • ALWAYS notify your security company!! They MUST know if they’ve missed a huge security threat or they won’t be able to protect against it in the future.
  • Keep in mind you are helping to protect others by reporting any breech of security.
  • Educate yourself! Simply doing one webinar or meeting is not enough. You must keep up with some continuing education on the matter and really know what you’re dealing with.

Tech Sentries has the latest and greatest cyber security technology on the market today!

Call us today (843-282-2222) or contact us at www.techsentires.com and see how we can keep you safe, all while you sleep or work. Never worry about being infected with crazy ransomware again!

computer encryption Myrtle Beach

Computer Encryption and How it Works

computer encryption Myrtle BeachKeeping others from being able to see the content on your computer is your right. No justification is needed—only appropriate action. In today’s political climate, computer security is one of the most common questions we are asked here at Tech Sentries. These questions often deal with protecting your data, keeping the government out of your affairs, and even encryption. If you don’t know what encryption means, much less how it’s used, this article is for you!

So Just What Does Computer Encryption Mean?

Basically, encryption involves scrambling text into a unique code using mathematics. Special encryption software uses algorithms to generate these codes from your text. Unless you are a person who knows how to unlock this code, it will look like unrecognizable nonsense.

The key to unlock encryption is referred to as a cipher. They have been used in many ways for the last 2000 years. Due to their complexity, it can take many years for any person or computer to successfully decode or unlock the cipher.

The truth is we all use computer encryption everyday but might not be aware of it. Did you know that each time you log into your bank account, join a Wi-Fi network or shop on an HTTPS site you are using encryption? These types of transactions use encryption called “in transit,” which deals with information transferred over the internet. If a file or disk gets encrypted on a computer, it’s referred to as “in place or at rest” encryption.

To put it simply, think of encryption as bits. The standard encryption key uses 256 bits, which literally has billions of possible cipher combos. The math is downright overwhelming! The two most common encryption types are symmetrical and asymmetrical. This simply means that with symmetrical, the same key is used to both lock and unlock the encrypted files. The opposite is true of asymmetrical—one key locks it and another unlocks it. The latter is the more commonly used method.

How Does Computer Encryption Work?

Certain software is used that creates ciphers which are highly complicated. This is what will scramble the data in your folders and files. Often, the encryption is so complicated that it can only be read once unless properly decrypted or “unlocked.” While a supercomputer or superhuman might be able to decode the encryption, it would likely take many years. Instead, encryption software can be installed like other programs and you will need a strong password to protect the files it encrypts. The password is your cipher to unlock everything so it is crucial to choose wisely when creating this password. Here are some tips:

  1. Don’t use words from the dictionary
  2. Try creating a phrase rather than just a word
  3. The more characters, the stronger the password
  4. If possible, use combinations of upper and lowercase letters, numbers and special characters such as (#$%&!).

You might have a file with one or more lines of text in it that could be dangerous. If you enter that line into your encryption software, it would take the line of text and convert it to a long combination of letters, numbers and characters that would make no sense to anyone unless decoded. It may end up looking far longer than your original line of text, which makes it even harder for a hacker to get to it.

Should I Encrypt My Data?

For the most part, we strongly encourage everyone to encrypt their data. Even more so if you use tablets and/or laptops. Encryption goes a long way in protecting you from spying eyes of thieves, hackers, and even government. It also prevents malware and other viruses from getting into your data. The simple fact that it takes your carefully chosen password to unlock your files makes encryption worth it—everyone who values their privacy and security should use it!

There are a few options depending on what device you’re using.

Each of these options works in much the same way. Enable or install the encryption program, set a drive or folder, give it a secure password and encrypt. Just do not forget that password!

What About Backdoors?

The term “backdoors” has come up when certain officials aren’t happy with security companies not providing them a “backdoor” way to access encrypted files. Government seems to always want to put more surveillance in place and they don’t take too kindly to companies refusing to provide them with a hidden key that would allow them access to the data they want whenever they choose. Fortunately, no backdoor access is currently being enforced and we have no reason to believe that these security companies are building any backdoor access to their encrypted data files.

The bottom line is encrypting your files is legal, free and easy to do. If you run a business or just have personal files you don’t ever want anyone gaining access to, computer encryption is the safest thing to do!

For more information about computer encryption and computer security, call Tech Sentries today! (843) 282-2222.

ransomware Myrtle Beach

Cerber Ransomware Kicks Into High Gear During Post-Holiday Shopping

ransomware Myrtle BeachAfter a relatively calm period, the researchers at Microsoft are warning that the ransomware known as Cerber has resurfaced stronger than ever. The target audience? Holiday and post-holiday shoppers. It also targets the data files of enterprise businesses.

Most of us are a little more aware of the need for cyber security during the holidays, but the need is equally important after the holidays! The Malware Protection Center at Microsoft has reported that the cyber attackers have amped up their game during this post-holiday season. One reason is the number of online shoppers looking for great deals after Christmas.

Top security researchers are now aware of a couple of new campaigns and spam that pinpoints all the consumer transaction during the post-holiday season. Cerber ransomware is constantly changing, causing user files to be encrypted while holding them for ransom. Just in the last several weeks the authors of Cerber ransomware are now attacking critical applications of major business files.

The newest version of this ransomware has been programmed to target the database files of Microsoft Acess, Oracle and MySQL. It’s not unusual for these files to be shut down as they are encrypted by malware.

As with so many other viruses, attackers are going straight for your inbox and flooding them with malicious links and downloadable attachments. As soon as you click on the link, the virus moves in, installing the ransomware. What’s worse is that it creates what looks like zip files that are password protected. The body of the email often contains the password, making this another huge red flag for malware. It usually states that order and delivery details are in the email.

Vulnerabilities found in previous Adobe Flash websites can also be used to exploit Cerber. If a person happens to be on this site, they will unknowingly download the malware to their computer. What’s more, any information on the version of Cerber ransomware has been scrubbed, which makes it even harder to track.

Unfortunately, an even wider net has been cast by Cerber and it’s now targeting dozens more types of files. Executing .exe, .cmd, and .msi files is now happening for the first time with Cerber ransomware.

Cyber criminals have to constantly be changing and updating their versions of ransomware in order to go undetected by antivirus software programs. Ramping up the malware complexities tells us how determined these criminals are to destroy and attack your personal files. Don’t become a victim—never click on unfamiliar links in your email! Use common sense and close out any ads or emails with suspicious links.

For more information on cyber criminals and how to stay safe from ransomware, call Tech Sentries today! (843) 282-2222.

CYBERATTACK – BEYOND THE HEADLINES!

When there’s an attack – cyber or otherwise – there are headlines. Satellite and cable news channels come alive, stirring everyone’s imagination. How did it happen? Who dunnit? What should we do now?

ciber crimeHow long a cyberattack remains a headline depends on the next major story that breaks. That’s just the nature of things. An attack happens, followed by headlines and hoopla, then most everyone moves on.

Unless, the attack happens to you.

No One Is Exempt

Former U.S. President Ronald Reagan once said that “Recession is when your neighbor loses his job. Depression is when you lost yours.” We might paraphrase that as “A cyberattack is when you neighbor’s computer is hacked. A disaster is when yours is.” It’s a disaster we all want to avoid.

Every computer device, personal or business, is at risk. What, or whom, is attacked is up to the attacker. We may not even know the reason. One thing we know is that the questions the new commentators are asking are no longer important to us when we have been attacked.

We want to know how this happened and what we can do to prevent it from happening again. And, oh yes, how much damage has been done, and do I still have any money in my bank account? The attack is not a headline that slips silently into oblivion. It can be a disaster felt in FEMA-like magnitude as one wonders what has happened to personally identifiably information (PII) and personal health information (PHI) or, in the case of businesses, intellectual property (IP).

Triage and Recovery

According to a recent report from Deloitte, recovery from a typical cyberattack could take years. All the initial stir in the wake of an attack is simply triage. The efforts to stop attacks in progress, assess damages, and implement remedial action may take days or weeks. But, time is not the only issue. The Deloitte study reveals those early triage activities address less than 10 percent of the actual total impact. The therapy (impact management) and recover process may take years.

Think of it like having a heart attack. The EMTs (Notice that the “T” stands for “technicians”) arrive on the scene quickly to check vital signs and stabilize the injured. Then it’s off to the Emergency Room and, sometimes, Intensive Care. Then…well, you know the rest. Recovery is usually a long road with a low speed limit, with a big medical bill at the end. During the cyberattack recovery process, infrastructure must be repaired, relationships may need to be addressed, and systems may need to be redesigned – all with a big bill at the end.

An Ounce of Prevention

There’s an old adage that parents used to tell their children to teach them to brush their teeth. “They’re just your teeth. Ignore them and they’ll go away.”

Cyberattacks are not like your teeth. They will not go away if you ignore them. Being aware is only the beginning. You must also be prepared.

With technology advancing at an historically unparalleled pace, no individual can keep up with the increasingly stealthy attacks of the nefarious minions who may seek nothing more than to disrupt some anonymous person’s life or business.

The only reasonable remedy that can provably prevent penetrations and intrusions is by using Managed Security Service Providers (MSSP). We are the guys in the white hats. As your partners in the battle against cybercrime, we defend and protect your systems and your information with round-the-clock, automated monitoring. We spot existing and potential threats and stop them before they cause extensive damage and expense.

Contact Tech Sentries today to learn more.  You can reach us at 843-282-2222!

Petya-Mischa Ransomware

Authors of Petya-Mischa Ransomware Leak Decryption Keys From Competitors

The people behind the ransomware Petya-Mischa have leaked decryption keys from their competitors. You might be wondering why. So are many of us!

Petya-Mischa has now released a “service” for their ransomware called RaaS. Oddly enough, it was released only a matter of hours before the decryption keys were leaked to the ransomware called Chimera. Some might question whether this is really about rivalry between competitors and an attempt at drawing more awareness to RaaS.Petya-Mischa Ransomware

If you aren’t aware, RaaS was created as a service to allow hackers anywhere to have access to specific ransomwares. They then have the option to act as a “distributor” for that ransomware, thus making money by getting a percentage of the ransoms that come in. These ransoms are paid by bitcoin. According to many of the top security forums, this will release of Petya-Mischa RaaS will lead to a huge increase in attacks of ransomware.

To protect yourself, we highly recommend employing a strong anti-virus service that can keep you secure through application whitelisting. They should also be up-to-date in training dealing with cyber security. Tech Sentries provides all these services and features and we stay on top of all the latest threats so you don’t have to.

Call us today and let us keep you safe online! 843-282-2222.

Scam Alert Myrtle Beach

Protecting Yourself From Email Scams During The Holidays

Fraud Alert Myrtle Beach

 

During the holidays, it’s extra important to be aware of email scams as you’re sending and receiving your holiday gifts and packages. One of the more common scams during this season are the fake delivery notices that you have a package waiting. Consumers are once again reporting this scam at an alarming rate so we wanted to help you be aware of what it is and what it looks like

What Does This Email Scam Look Like?

The scam works like this: An email is sent by the scammers with the subject line reading something like “Delivery Failure From USPS.” There will be a link to click on to find out why your package wasn’t able to be delivered. As soon as you click on that link, you’ve opened up your computer for the virus. Some of the lingo used might look something like this:

USPS.com

You have a package that your postman was unable to deliver.

Please print the label provided to you through this link and take it to your nearest post office to retrieve your package.

NEVER CLICK ON THE LINK!

Clicking on links associated with these email scams can open up a host of issues. The biggest risk is downloading a virus to your hard drive. This allows your sensitive information to become exposed and easily stolen. Scammers would have access to your passwords, credit card info and other financial data.

Often, malicious ransomware and malware infect your computer without you ever even knowing it. Once you attempt to sign into various accounts online, the email scammers will use a mirroring program to record your actions and they will use that to steal every bit of personal information they can get their hands on.

It isn’t just the post office dealing with these scams—UPS and FedEx also have fallen prey to hackers and scammers. The scary part is the scammers will use official looking logos and websites to make themselves look legit. You will receive notices that look completely official from the shipping companies, making it hard to know when you are dealing with an email scam.

Protecting Yourself

Stay aware! If you get emails that you don’t think you should be getting from either the post office or a major shipping company, do not click links within that email! Even though you may be waiting on a package, it’s better to deal with the company directly, rather than risking a virus by clicking on a link.

Be on the lookout for any phone calls claiming to be employees of any of these agencies. If you are called and asked for sensitive information, never provide that info until you know for sure who you are dealing with!

Look for obvious errors in grammar and spelling on any emails or other communication. It’s usually a dead give-away that you’re dealing with an email scammer.

Never answer texts you aren’t sure about. This, too, can open you up for email scams.

You can never be too careful when it comes to your personal information this holiday season! It’s ok to be suspicious of any text, email or phone call that you aren’t sure about. If you are expecting a package, always deal directly with the shipping company!

For more information on how to protect yourself from email scammers during the holidays, call us today at Tech Sentries! Our number is 843-282-2222.

Remember “Think Before You Click!”

Which Generation Is More Likely To Fall Victim To Online Scammers?

Scammers Myrtle BeachDid you know that elderly people aren’t necessarily the most likely to be scammed online? Well, the Better Business Bureau issued a report stating that its Millennials and Generation X’ers who are the most likely to be a victim of scammers. The reason? The elderly population are far more likely to actually report the incident of a scam before financial loss occurs. In fact, over 90% of them will report it sooner than the younger generation. Even though Millennials and Generation X’ers are far more tech savvy, they are far slower to report being scammed, making them much more likely to lose money as a result.

Oddly enough, many of these younger people never reported the scam activity because they never actually believed they were really a victim. Even though they may feel they are immune to malware attacks and other scammers, none of us are immune to it. Staying aware and being informed is your best defense, no matter how old you are! Knowledge is power when it comes to protecting yourself against online scams. If you fail to report being scammed in a timely manner, your chances of suffering a financial loss will increase dramatically! The elderly population seem to know this.

One other important factor worth noting is that the individual’s online activity can play into becoming a victim of scams. This is because of online shopping and other retail websites visited by younger people. Individuals under the age of 45 tend to shop online much more than the older generation, thereby making them more susceptible to online scammers and malware.

The bottom line for a take-away lesson here is to always be aware of the fact that you are as much at risk for being scammed as anyone else. If you are solicited to spend money, sign up for various websites and their services, or even asked to click on a link you receive in your email, STOP and THINK before you click anything! Make sure that you are spending only in secure websites with secure methods of payments. If you have any questions about what you are seeing, call the BBB and ask them to verify the site or company before you spend any money or click any links that could cost you dearly!

While it is possible to recover a financial loss, it’s very difficult if it is not reported immediately! To get the absolute best protection, call Tech Sentries today! We can apply the best application whitelisting technology which will block unsafe or unwanted programs from ever opening. Let us show you how easy it is to be protected so you can keep your mind on the things that matter most to you!

Jackware—What Is It?

Myrtle Beach JackWareHave you ever heard of jackware? In this day and age, we hear a lot about ransomware, spyware, adware and all kinds of other “wares,” but probably not jackware. However, it’s still malicious software that gets in and controls many devices whose main function is NOT digital communication. Your car is a perfect example of just such a device. Your car may have some communication abilities, but think of it like this: we’re looking at cars as simply a means to get from one spot to another.

Jackware is essentially a more specialized ransomware, which like its name suggests, gets in your software, encrypts your files and demands a ransom in order for you to unlock and get your files back. With jackware, it seeks to lock up your car’s ability to run until the ransom is paid.

The following is important to note!

 Jackware has not actually been defined as an active threat just yet. It’s still a bit theoretical in nature, although we here at Tech Sentries are a bit doubtful of jackware being stopped. There are people constantly coming up with new ways to hack into our everyday lives and create chaos through our computers, software, telephones, and now even our cars if something isn’t done. Brand new cars are essentially fancy computers on wheels and so they are very vulnerable to jackware after they have left their manufacturing facility to be shipped across the world.

All last year, we heard about the Fiat Chrysler Jeep problem where the design process wasn’t stellar and many of the systems were wide open for hackers. So, we now know that in order to stop this problem, protection must happen during the design process. Car companies need to ensure consumers that everything they do with the car’s onboard computer is safe. For instance, many people now can control systems in their homes, such as alarms, lights, etc., all from their vehicles. If jackware really does become a huge reality, then your car is one more portal from which hackers can work their evil. Many smart cars now come with Wi-Fi capabilities and this could be a big problem if it’s not completely secure.

 So How Do We Stop Jackware?

 This is the million dollar question. Unfortunately, the world has not done a good job at all of deterring cyber crime. Hackers just get better and smarter at what they do, so the risk of becoming a victim is huge. In order to stop jackware, it would have to involve changing policies within major manufacturers, as well as staying ahead of the technical curve. Gone are the days when clicking on a link in an email was the only way to get hacked by ransomware. Millions of dollars have been paid to cyber criminals by desperate people trying to get their files recovered. Companies need to be employing the best anti-malware security they can find. We also need to actually prosecute the criminals behind the ransomware!

The question remains if ransomware will actually spawn a branch called jackware. It absolutely seems certain that this will happen at some point. One of our biggest concerns is that of self-driving cars. Any vehicle that is equipped with onboard computers is at risk for jackware.

The best way to stay safe and protect yourself from ransomware attacks—including the possibility of jackware—is to have the best protection available today. Tech Sentries stays on top of all the latest threats so you don’t have to.

Call 843-282-2222 today for a free consultation.

Signs You’ve Been Infected by Malware

Chances are, you have found yourself in this predicament before:

You turn your computer on, wait for what seems like an eternity for it to boot up. When it finally does, your programs are slow to start, your internet is sluggish and your cursor is delayed several seconds behind the mouse. If this has happened to you, your first thought might be to reboot because you have too many things running at once. The more likely scenario is that you’re infected with a malware virus. While they can sometimes be fairly obvious to spot, malware can also hide really well. You’ll have to do a little searching to see how sick your computer is and how best to treat it so it can be totally cured.

How Do You Know If you’re infected by malware?

Well, the first sign of being infected is for your computer to wig out. It may act really strangely and sometimes it’s obvious, but other times it’s not. It helps to understand the symptoms that can happen so you’ll know what to look for. Here are some other symptoms and problems:

Ransomware

People who author ransomware actually want it to be crystal clear that they have infected your computer. They make a lot of money doing it and if you’ve been infected, you’ll most likely see pop-up windows with messages about your files now being encrypted. They will also usually demand a ransom by a certain deadline in order to restore your files.

Your Browser Constantly Redirects Someplace Else

Perhaps you do a search in Google for something. You choose a link to click on, only to be redirected to a different page. You’ll most likely hit the back button and choose another link to click on, only to have the same thing happen. This is a classic infection of malware.

Different Home Page

You set a custom home page but it won’t come up. Instead of the page you’ve set, a totally different page appears when you open your browser. Also, you may notice a row of toolbars under your browser that you don’t recognize. It may be impossible to get rid of these icons. This can be another classic malware infection.

Constant Pop-Ups

By constant, we mean constant! If you close one only to have one more come up, or you’re getting pop-up ads when you’re not even online, you’ve likely been infected.

Signs of Malware That Are Less Obvious

Computer is running too slow. This could be everything from too many programs active, to being low on space or memory. It could also be malware.

Icons you don’t recognize. It’s possible to get these icons from several sources, such as someone downloading a program or game without your knowledge, or even when you download software and a PUP (potentially unwanted program) comes along with it.

Crashing Constantly. Again, there can be many causes for crashing, but if it happens all the time or only with certain programs being opened, it’s likely you’re infected with malware. A professional can diagnose this.

Your browser freezes. If your browser becomes unresponsive, it could be nothing more than a slow or bogged down internet. Your internet provider can help you check your download speeds. If everything looks good, malware is a definite possibility.

A few other signs can include:

* Multiple bounced emails
* Battery dying too fast
* Bills that are larger than normal

Finally, it’s possible to get malware infections with absolutely no sign at all! The best way to avoid malware altogether is to have Tech Sentries keep you protected. We test constantly for computer viruses and can stop them before they create major issues. Tech Sentries can keep you safe in the background automatically so you can go about your business with confidence. If you have been infected, we will help you rectify and restore your computer to its original state.

Remember, the hackers are always inventing new ways to infect your computer. Tech Sentries stays on top of it so you don’t have to!

Call us today at 843-282-2222.

1 2 3 4