Technical support scams

photo

“Remember, Big brands (Microsoft/Acer/AnswersBy) will never proactively reach out to you to provide unsolicited PC or technical support. Any communication we have with you must be initiated by you.”


Scams has become more advanced with the help of technology. Cybercriminals don't just send fraudulent email messages anymore and instead they call you on the telephone and claim to be from one of the major brands.


“Do not trust unsolicited calls. Do not provide any personal information.”


These criminals might also setup websites with persistent pop-ups displaying fake warning messages and a phone number to call and get the “issue” fixed.



https://c.s-microsoft.com/en-us/CMSImages/techscams.png?version=3F867D38-3440-FF3C-9E14-BC08C8B6CA50


They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following:



  • Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software.

  • Convince you to visit legitimate websites (like www.ammyy.com) to download software that will allow them to take control of your computer remotely and adjust settings to leave your computer vulnerable.

  • Request credit card information so they can bill you for phony services.

  • Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there.


Log in using another service

All about the WannaCry cyber attack

photo
WannaCry, WannaCry attack, WannaCry ransomware, cyberattack, cyber attack, What is WannaCry, How to fight WannaCry WannaCry global cyberattack, technology, technology news



WannaCry is without doubt the biggest ransomware attack the world has ever seen. Though the impact has been thwarted to a certain extent, it is feared that ransomware could be back in a big way.


How to tackle this new menace?


He says the bug is tapping into NSA’s ETERNALBLUE exploit, originally devised to leverage Microsoft Windows SMB vulnerability (addressed in MS17-10) with the creators of WannaCry integrating this critical exploit into its worm module or initial dropper.


The ransomware also observed in making use of NSA’s DOUBLEPULSAR backdoor.


What are the affected products?


All Windows versions before Windows 10 are vulnerable if not patched for MS17-010. Windows XP and Windows Vista users are completely vulnerable as both these operating systems no longer receives updates and security patches. As a special case, Microsoft has pushed updates for older operating systems and promised more. Refer the listed CVEs in IOCs – WANNACRY RANSOMWARE.xlsx


How does it impact you?


Once the initial worm module is introduced to a system it creates two threads — one that scans hosts on the LAN, and another that gets created 128 times and scans hosts on the wider Internet. The LAN-based scanning happens using the port 445 and attempts to exploit the discovered systems using MS17-010/ETERNALBLUE.


The second thread scans the Internet by generating random IP addresses. If connection to port 445 on that random IP address succeeds, the entire /24 range is scanned, and if port 445 is found open, exploit attempts are made. So, if the target network has the vulnerability unpatched, then there is a high chance it will get affected.


Is your computer affected by "WannaCry"? Call Us before its too late!


Log in using another service

Ransomware Attack Pushes Fake Font Update On Google Chrome Users

photo

Heads up, Google Chrome users. There’s a new social engineering attack has you in its sights. Its goal: to trick you into installing malicious software by convincing you that your Chrome installation is missing a vital component.


Image: Proofpoint


This isn’t a new tactic by any means. Cybercriminals often use social engineering attacks to trick users into installing bogus updates for things like the Adobe Flash plug-in, Java, and video codecs. In this particular case, it’s a font that you’re supposed to believe you need to patch.


The attack spawns an alert when you visit a compromised web page. It claims that the “HoeflerText font was not found” in your Google Chrome instance and displays version numbers that make it appear as though Chrome is somehow out-of-date. Fall for the ruse, and a “font installer” begins to download. That file is actually a “dropper,” and researchers have seen it delivering the highly-sophisticated Spora ransomware.




Why Does The Attack Mention Hoefler Text?


It’s to make the attack believable. Hoefler Text is, in fact, a real font. It’s just not one that has a heck of a lot to do with Google Chrome.


Hoefler Text does appear three times in the Chromium source code upon which Google Chrome is based. It’s specified as a font family in third-party code that belongs to the open-source WebKit browser engine. The font itself doesn’t actually ship with Chrome, though. It is, however, one of the default fonts that Apple includes with OS X.




Anti-malware Software Might Not Protect You — But Chrome Will


According to some reports, only a very small number of anti-malware apps are detecting this particular attack right now. Fortunately, the defenses Google has built into Chrome should be enough to keep you safe.




Image: Neosmart




When the download begins, Chrome will display a warning that it’s not a file that “is not commonly downloaded” and notes that it “may be dangerous.” If you follow Google’s advice and click the “discard” button Chrome displays, you won’t have to worry about recovering from a ransomware attack.

Log in using another service

Welcome to AnswersBy

photo

Welcome to AnswersBy!


 


AnswersBy’s vision is to delight customers walking its way who have trouble related to software on their computer. We have been providing support to over 60,000 customers for the past 8 years across the United States of America.


Our support centers are located globally with headquarters in Rochester, New York. With chunk of technicians working out of India, the level of technical support rendered stands second to none. Technicians are predominantly graduates with engineering background in the stream of Computers Science.


Our brand partner Acer has been with us from the start till date. Apart from delivering the best of support to their customers, Acer has been with us to take care of out of warranty computers. Our partnership goes back to the year 2007 when AnswersBy started to bloom to support out of warranty Acer, E-Machine and Gateway computers.


From Desktops to Laptops, we have grown with technology and currently support customers using Tablets and other Smart devices. Technicians supporting customers are screened by experts in the field and are handpicked to serve customers to the maximum extent possible.




- Team AnswersBy

Log in using another service

Top Security Issues that can impede your Computer Performance

photo

The cumulative impact of these emerging threats is quite staggering as billions of dollars are lost each year by various organisations in fixing infected systems. Some attacks rip critical systems to shreds, while others oftentimes incapacitate the overall operations of hospitals, banks, institutions and IT companies.


According to some of the top leading experts of cybercrime industry, there had been a massive soar in high-tech crimes, including cyber-based violence, undercover activities, computer incursions, and major cyber scam. Hence, in order to stay in front of present and developing rage we need to pay heed while paying phone or credit card bills online or running IT network. Sometimes, despite keeping your eyes peeled while surfing online you can bump into such peril issues anytime, so you must seek windows technical support to keep your confidential information or files safe.


Here is an overview of the top security issues, we think is quite possibly you need to wary in the approaching year.


1. Targeted Assaults


The threat landscape is becoming more dominant with rising number of random attacks explicitly designed to rip-off personal data from anyone who is vulnerable enough to fall prey to tricksters.  Targeted attacks have shown significant progression since past two years. Such attacks are undeniably designed to penetrate into a company’s secured zone to steal sensitive data that holds economic worth. These threats can often be far-reaching, highly advanced and precarious in nature. As per the survey conducted by research firms, the fact that has been brought into light is many attacks start with duping employees to unveil information to get easy access to corporate’s confidential resources. Any organization can become a target as they have data that holds value for cybercriminals.


2. Increased Hacktivism


There has been tremendous increase in the incidences of hacktivism over past few years across the globe. For instance, the DDoS attacks by Anonymous group on government websites in Poland to protect against the government’s decision to support ACTA (the Anti-Counterfeiting Trade Agreement), and lately a hacker group known as AnonOpsIndia hacked BSNL website to show remonstration against government’s stand on net neutrality and the way it is managing Digital India. Increasing dependency of public on the Internet makes businesses of all sizes perhaps vulnerable to such type of threats, so ‘hacktivism’ is expected to proliferate in coming years.


3. Mushrooming malware


The growing advancement in technology has indeed offered businesses and individuals with numerous benefits, but has even introduced them to online threats as well. Cloud data that is synced with your system and mobile devices are not as secure as the traditional data storage devices. Technically speaking, when the same device is used for both individual and official purposes, then probability of risk is relatively higher.


4. Cyber Blackmailing


Over past few years, no doubt various cases of ransomware Trojans have been encoded by scammers to squeeze out money from easy targets, either by encrypting data on hard drive or by obstructing access to the system. This type of cybercrime is no longer confined to any specific place, and has now become a worldwide phenomenon, albeit with somewhat different protocol. For instance, Trojans are placed in users system that blocks access and claims to have found out unlicensed software on their PC and ask for a payment. Besides, there had been incidences wherein a camouflaged popup message from law enforcement agencies claims the existence of illegal content on PC and demand to pay a penalty. Such occurrences are easy to propagate and, as with phishing threats, there seem to be no dearth of possible victims.


5.  Misuse of un-patched Java


Unpatched loopholes in Java based application can be easily exploited by cyber criminals.  It is one of the key techniques used by them to install malware on a computer. This mainly happens because of the presence of susceptibilities and the failure of system users or businesses to timely patch their applications. Java susceptibilities at present are closely to 50 percent of online assaults, while Adobe Reader is further equal to approximately 25 percent. Well, coming year won’t be an exception as cyber criminals will continue to misuse Java vulnerabilities. So you need to stay alert and timely consult remote computer support services providers at slightest doubt about conniving activity.


In few words:


With every passing minute, cyber criminals are devising techniques to intrude myriad homes and offices across the country—not by sneakily entering through windows and doors, but by creeping into laptops, PC, and wireless devices through malicious code. You can put these security issues at bay by taking preventive measures beforehand as well as on-time computer support services from a reliable remote service provider.


 


 


Tags: Computer support servicesWindows technical support
Log in using another service