There is a new version of the old fake invoice email going around.
Please pay attention and don’t open emails or attachments that claim to be invoices or bills or “pay so I don’t sue you” invoices.
They appear as your internet icon like below (my default browser is Chrome)
Category Archives: Worms
Preventing Cryptolocker and Ransomware in 4 steps
Links and article updated 6/26/2024
I have sent emails, tweets, posted links and articles on Facebook and so much more, all to warn you about the different crypto locker schemes out there. Apparently I failed to write a specific article on how to prevent it.
Hey you Linux and Apple people, you need to be alert for this too!
Here are the Four major things to do in order to prevent crypto locker with two additional options.
Fake and Phishing emails this one “from” FeDex
While I am upset with FedEx, I am even more upset with FeDex!
Just a reminder for you to not open all email you receive. This is a malware attachment. The real FedEx knows about these. http://www.fedex.com/us/security/prevent-fraud/email.html and http://www.fedex.com/us/update2.html
Instead of delving into the type of scam this is, Phishing, and instead of talking about the malware inside the zip file, I want to tell you to “just say no” and don’t open such emails.
Building a PC Part 3 – Software: Windows, 3rd party SW, Anti-Virus and Security software.
In this most recent series I have been going over the parts for building a PC, what I use and why.
In this exciting fun filled episode, I want to go over some of the software we use when building a computer. Let’s start with the most important part, the Operating system. I recommend Windows.
I know a bunch of you Linux people just started yelling at your screens. Don’t have a tizzy!
I learned on UNIX based systems back in the 80’s and from 2003 to 2006 I promoted, through free training, and on this blog several flavors of Linux. My issue with Linux was and is the “my version is better than your version” attitude while leaving the end user out of the equation. At one point Red Hat had their version of “automatic updates”. That was a good idea. They stopped doing that. Others instead of making a universal way to update and patch quarreled and squabbled, leaving those that just needed an operating system to run their business or home computers, out. Microsoft has one way to update and patch. Good for them. Continue reading
The actual steps to cleaning malware from your computer
It has been a while since I put out a “technology” article and figure it is way past time to. I have been working on a couple reviews on the Galaxy S-5 phone, the Samsung SM-W750v (Windows phone), on a Jabra headset/Bluetooth, and my Lenovo IdeaPad Yoga. But as for the tech tips and how to’s I just have no excuse for not writing on them.
In this article I want to go over how I cleanup malware, spyware, crapware, worms, viruses, Trojans, rootkits and other infections. Partly because I have had a wave of them come in (customers get infected) and because you probably go new devices for Christmas and or got bored over the Holiday’s and surfed around and got infected. Continue reading