April 27, 2013
Many of the computer problems a user encounters can be repaired by a remote technician. This has several advantages over more conventional methods of computer repair. You do not have to make a trip to the computer store to drop it off and another to pick it up. Additionally, frequently the repairs are completed in a few hours, not days. On line computer repair is safe. All communications between your computer and the technician is encrypted.
On line computer repair works like this. You open your favorite web browser and browse to the website of a service provider for example, http://www.PCWebDoc.com/ . Call them to get a PIN number, enter the number into the website, click connect and follow the prompts. Once connected they remotely control your computer and correct whatever issues you are having. You do not have to stay on the phone. You don’t even have to stay home.
June 11, 2012
October 6, 2010
Malware such as KOOBFACE hasn’t gone away quietly. In fact it’s the largest social networking threat of this year.
KOOBFACE spreads through social networking sites like Facebook, Twitter and MySpace. It steals your profile information and even puts a face to the information. Here’s how it works. You get a status update from a friend, directing you to watch a video. But when you click on it, there’s an error message saying you need to update your Adobe Flash Player.
For more information check out Trend Micro’s 8 Things You Probably Didn’t Know About KOOBFACE. While the article is a little old, the basic information is still the same.
Toll Free: 866-828-6684
September 29, 2010
There is scam going around that will try to gather your user name and password. Players will receive an in-game chat/whisper from an unknown player offering free gifts that can be redeemed by registering at the website listed in the chat. Other players have reported getting the message via WoW’s in-game mail system. Be cautious, as the messages appear to be from a Blizzard employee, even making threats to suspend the players account if he/she doesn’t register at the website listed in the message. Blizzard says on its website it doesn’t use Avatars to make announcements, and official Blizzard reps will never ask for account information via email, website or in-game.
September 21, 2010
Just a reminder to all you Facebook junkies to go to our website at PCWebDoc.com and click “Like”1
Only relevant information will be posted there and not a lot of junk!
And tell you friends too!! (hint hint)
Tom Guadagno | President
a Servicemark of Merit Technology Group, Inc.
(V) (814) 746-4505 |(866) 828-6684
This email may contain material that is confidential, and proprietary to Merit Technology Group, Inc., for the sole use of the intended recipient. Any review, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please contact the sender and delete all copies.
May 10, 2010
Here are some of the latest threats and viruses as reported by Trend Micro’s Trend Labs.
As always, if you have any concerns about these threats or think you’ve been infected please call us at 866-828-6684.
Ø “Highjack This” users could be hijacked. The new threat actually uses “Hijack This” as the product name and “Trend Micro Inc.” as the copyright holder. If executed it will infect your system with a Trojan. “Highjack This” is a free tool Trend Micro offers to help users evaluate their machines for possible infections. The good news is, if you are using Trend Micro products, you aren’t at risk, because it will protect you from the threat.
Ø Beware of emails about the 2010 FIFA World Cup. Although the actual event is less than 2 months away, cybercriminals are already trying to trick users. The latest threats are coming in the form of emails. Check out some of the images found. The bogus emails contain a PDF attachment which states the recipient allegedly won a lottery, and gives instructions on how to redeem the prize. Bottom line, don’t give out your personal information!
Ø Greeting Cards contain more than well wishes. Some malware is being disguised as greeting cards. When a user clicks on a link to open the greeting, they end up downloading setup.exe, a malicious file. Trend Micro discovered the file to be BKDR_ANYTEMIR.A. The program connects to a malicious side and also creates a copy of itself in legitimate folders. Each copy attempts to receive commands from a remote user. If you get a suspicious looking email message, don’t open it and delete immediately. And never click on links embedded in suspicious emails.
Ø Use caution when visiting suspicious-looking or unknown websites. Trend Labs recently discovered malicious .SWF (Shockwave Flash) file that is capable of triggering a DoS (Denial-of-service) attack. The file displays as a screenshot of a YouTube video (it’s not a real video). Embedded in the video is a worm. Once executed, the user will see a fake dialog box to install Adobe Flash Player with instructions in French. The worm is capable of infecting a users system, initiating a DoS attack that can even disable a website, shut down a network or disrupt service. As always, users are discouraged from visiting suspicious or unknown sites, and clicking on the links and images found there.
TomG | PCWebDoc.com
Toll Free: 866-828-6684
April 29, 2010
A client called us a few days ago and said that someone had stolen their banking/credit card information and they thought it may have been a virus. When I logged on to their computer I could see some signs of minor infections but nothing to steal information like that. I recommended we do an ERVisit and install Trend Micro Internet Security. After cleaning up the computer I still hadn’t found any signs of an infection that would steal banking information.
Upon further discussion with the nervous client they showed us what happened when they went to their banks website. The first page looked exactly right. I compared it to the same page loaded on my computer, a perfect match. When they entered their username and password to log into the site a page was displayed asking to verify their information. Here is where that gut feeling that something isn’t right comes in. The page was asking for everything you would need to open an account or apply for a credit card. Name, address, SS# etc… Look at the address in the address bar and it was still the banks website. Checked the IP address the site goes to and it also belonged to the bank. Here was the trick. I could ping the address from their computer and it replied from the bank. I asked the customer to call the bank and verify that it is truly their site asking for the information. It wasn’t! WOW! How can this be?? Turns out that this virus was smart enough not to interfere with normal tests and traces but it did intercept and send specific information outside of the computers normal communication methods.
Now that we know what is happening the hunt for the invader began. After about an hour or so of micro analyzing everything running we were able to find it and tear it out. The scary part, none of the several antivirus or deep scanning tools showed or found it. This is a first! I am suspecting a new twist on a relatively new virus technology, the rootkit. We have a copy of the virus and are testing and analyzing to learn more and make it easier to detect as well as sent a copy to Trend Micro to get it added to their antivirus software.
The moral of the story: If your internal alarm goes off, don’t do it, even if everything looks right!
TomG | PCWebDoc.com
Toll Free: 866-828-6684