Beware of Click Bait!

This morning, I was doing one of my morning rituals which includes reading through the recent posts on Facebook, and found that a friend of mine who lives on the east coast, liked a story. I worked with him many years ago. He was the manager of a major project which I worked on for many years. This was the largest project in my career, and I know that this system is still “alive” today because I have served a local customer twice who is dispatched by this system. Since I respect my friend, and he doesn’t casually like everything, the things that he does like tends to get my attention. The first thing I did was to like the story too.

The story told of a mother beating her son on national television because he was participating in the recent riots in Baltimore. My friend liked it, so it must be legit. I clicked on the link to the story, which went to a blogsite which I had never seen or heard of before. The content of the page had only a brief retelling of the title of the story, plus several advertisements, but there was no link to the salacious original video that grabbed my attention. Since I didn’t see what I expected, I thought this was a problem with the tight security settings of my daily browser (Firefox, with several add-ons), so I copied the URL from my “high security” browser and pasted it into my “low security” browser which works with everything (Internet Explorer), and fetched the page. The same page was displayed, but this time with many popup advertisements (pop-over and pop-under) which were really concerning to me. There was no salacious video or a link to it. I shut this down fast.

Still being interested in the salacious story, I went to YouTube and searched for the general words of the title of the story, and found several direct links to the video – without additional advertisement or commentary.

In this case, I fell prey to “Click Bait”. I saw a story that interested me, thought it was legit, and clicked on it. It wasn’t legit. I will be doing a total system scan of my computer to check for any residual nastiness.

If you think you’ve fallen prey to “Click Bait”, the best thing to do is to scan your machine for anything malicious. If you need help, give us a call!

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

Myth – Mac’s Don’t Get Viruses

Source: Internet meme Myth - Mac's don't get viruses
Source: Internet meme

More than once I’ve heard the myth – Mac’s don’t get virues.

Unfortunately that’s just not true. Mac’s can get viruses just as easily as any other kind of machine. It used to be that malware was written specifically for PCs and the Microsoft Operating System, because there were just so darn many of them out there. But if our experience at Geek For Hire, Inc. is any guide, plenty of our customers with Apples are getting all kinds of malware. This post contains affiliate links which means if you click and buy, we may make a commission at no cost to you. See our full policy for more details.

(By the way, “malware” is the catch-all phrase for any software you haven’t deliberately chosen to load onto your computer. Remember from high school Latin that “mal” means “bad”. “Malware” includes viruses, spyware, rootkits, and more.)

We use ESET to protect our Mac’s and PCs.

In fact, way back in 2012, Apple itself recognized the flaw. In April, 2012, more than a half million Macs were infected by the Flashback Trojan bug. Shortly after that, PC Magazine reported that Apple “removed from its website the claim that its Mac operating system is not susceptible to PC viruses.”, and changed its tagline to “It’s built to be safe”.

Today, even more malware is being written specifically for the Mac OS. And Apple does not seem to be on top of getting fixes out to their users.  In an article by Digital Trends, they stated:

“Apple has also been criticized for being slow to deal with threats and shut vulnerabilities down. Rootpipe was discovered in October 2014, but the fix only came out this month (April 2015), and it only patches Yosemite, not older editions of OS X. To make matters worse, the patch doesn’t actually fix the problem properly. Apple’s big rival may have a bad reputation, but it has taken decisive action to tackle that perception.”

Don’t believe the Myth – Mac’s DO get viruses!

It’s best to protect yourself with a good anti-virus program for Macs. We’ve been using and recommending ESET for many years. And we like that they offer a discount for multiple devices and multiple year subscriptions.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

INFORMATION ABOUT GEEK FOR HIRE, INC.

Chris Eddy of Geek For Hire, Inc. has provided computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area and remote service throughout North America.

Here’s a link to our Covid19 Policy.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

Outsmarting The Hackers

Hackers are getting smarter and are finding it easier to log into your email, bank and social media accounts.  For that reason, it is so important to regularly change your passwords on all of your accounts.  If you think any of your accounts may have been hacked, change your password recovery email as well.

Some people have a hard time remembering their passwords.  I’ve found that it is a good idea to use a couple of different words which are significant to you, but change it up a bit.   Use numbers, symbols, and capital letters to make the password harder to guess, but easy for you to remember.  As an example, using the word ““PASSWORD””, I’ll show you how easy it is to change a common word into a secure password for you:

  • P@55w0rd! –  Capitalize the first letter, change the ““a”” to  the @ symbol, change the two S’s to 5’s, change the “o” to a zero, and add an exclamation on the end.
  • P@55W0rd! – – Capitalize the first letter, change the “a” to  the @ symbol, change the two S’s to 5’s, Capitalize the “W”, change the “o” to a zero, and add an exclamation on the end.
  • !P@55w0rd! – – Start with an exclamation point, Capitalize the first letter, change the “a” to  the @ symbol, change the two S’s to 5’s, change the “o” to a zero, and add an exclamation on the end.

When you use this system, you can change it monthly by adding the date.  For example, add “April”, or “04” to the end.

It’s also better to use more than one word.  Sometimes when Chris is setting up a new password he will use the title of a nearby book.  For example, Mark Reisner’s “Cadillac Desert” is on my desk right now.  Using Chris’ system, my new password could be:

  • CadillacDesert – with the first letter of each word capitalized and no spaces.
  • Cadillac Desert – with the first letter of each word capitalized and one space between the two words.
  • Cadillac_Desert – with the first letter of each word capitalized and the underscore symbol between the two words.
  • C@dill@cDesert – with the first letter of each word capitalized and the “a” turned into the @ symbol.

You get the idea!  Play around with some possible passwords for you.  Once you have a few that work and that you can easily remember, it will be easy to change it up on a regular basis and to keep your online life that much more secure!

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

 

Your Next Computer Might Be a Phone

Do you find yourself using your phone or tablet more and more instead of the computer on your desk? You’re not alone! If you know anything about me, you know that I like to take frequent road trips. It doesn’t matter if I’m in Denver or Manhattan; as long as I have my iPhone with me, I can continue to make appointments for Chris, follow up with our awesome clients, or internet research. With my new tablet, I can do still more, like updating spreadsheets and even write our blog. Our son recently purchased the new iPhone 6 which reviewers are calling a phablet – a phone AND a tablet. He has no need for a “real” computer and can do any necessary technology on his new phone.

Wired Magazine has come to the same conclusion in this article, although they do think it may take another few years.

“But thanks to increased processing power, better battery life, vastly improved networking speeds, and larger screen sizes on mobile devices, the shift away from the desktop is accelerating.

“Will we always need a desktop? No, not all of us will,” says consumer trends industry expert and Kantar Worldwide’s chief researcher, Carolina Milanesi. “Some of us already don’t.” “

The article concludes with this thought:

“But paired with a monitor and a Bluetooth keyboard at work, or streaming over Wi-Fi to a TV set at home, in a few years, there’s no real reason why, for the vast majority of us, a smartphone couldn’t handle all our daily computing needs.”

There are a few downsides to not having a “real” computer. A full sized keyboard that actually plugs in is one that comes to mind. Geek For Hire has seen so many issues with wireless keyboards & mice, from connection problems to bad batteries, I have a hard time recommending their use.

Another downside is no CD/DVD player. For someone who gets all of their music and entertainment online, that’s not a killer issue. I still buy CD’s, so that is an issue for me!

Finally, please remember that your SmartPhone is a computer. It doesn’t matter what the size is or what you’re using it for. Just like your PC or Mac, please install an anti-virus and keep the anti-virus up-to-date.  Just because you have an iPhone made by Apple doesn’t mean you’re immune to malware and viruses.  Ransomware is one of the biggest new threats facing your technology of every size as this little girl from Tennessee found out.

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

Car-Hacking…

I read an interesting report released by Senator Markey last month.  His office was concerned that appropriate measures were not being taken to secure cars and trucks on American highways.  With most modern cars having built in WiFi, Bluetooth and other technology, they wondered what happened to the collected data, and how vulnerable the cars were to outside influence.  Turns out they were right to be concerned.

Here are their key findings:

  1. “Nearly 100% of cars on the market include wireless technologies that could pose vulnerabilities to hacking or privacy intrusions.
  2. Most automobile manufacturers were unaware of or unable to report on past hacking incidents.
  3. Security measures to prevent remote access to vehicle electronics are inconsistent and haphazard across all automobile manufacturers, and many manufacturers did not seem to understand the questions posed by Senator Markey.
  4. Only two automobile manufacturers were able to describe any capabilities to diagnose or meaningfully respond to an infiltration in real-time, and most say they rely on technologies that cannot be used for this purpose at all.
  5. Automobile manufacturers collect large amounts of data on driving history and vehicle performance.
  6. A majority of automakers offer technologies that collect and wirelessly transmit driving history data to data centers, including third-party data centers, and most do not describe effective means to secure the data.
  7. Manufacturers use personal vehicle data in various ways, often vaguely to “improve the customer experience” and usually involving third parties, and retention policies – how long they store information about drivers – vary considerably among manufacturers.
  8. Customers are often not explicitly made aware of data collection and, when they are, they often cannot opt-out without disabling valuable features, such as navigation.”

Most striking to me was this sentence:

“The diversity of responses received by Senator Markey shows that each manufacturer is handling the introduction of new technology in very different ways, and for the most part these actions are insufficient to ensure security and privacy for vehicle consumers.”

While it’s unlikely that a particular car will be targeted for hacking, the privacy issue is concerning to me. Read your manual or check with your dealer to see if there is a way to turn off data collection. It may be as simple as turning off your GPS feature, but check with your dealer to be sure.  If you have an older car without GPS, OnStar, Bluetooth, etc., you likely do not have to worry about this.

Here is the Press Release from Senator Markey’s office along with a link to the original report: http://www.markey.senate.gov/news/press-releases/markey-report-reveals-automobile-security-and-privacy-vulnerabilities

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

 

Gone Phishing

No matter how tightly your computer is locked down, phishing continues to be an issue. Your anti-virus and/or email program will identify some of the culprits, but, because the phishers are always evolving, they can’t identify all of them. That’s why it’s important for you to be able to identify phishing attacks yourself!

What is “Phishing”?:

Phishing is defined very well by this Wikipedia article:

“Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.”

Phone Calls:

  • Your “bank” calls you to tell you about some unusual activity on your account and asks you to confirm your birthday.
  • “Microsoft” calls you to tell you that your machine is out of date or has a virus and asks if they can access your machine to “fix” it.

Emails:

  • Your bank sends you an email stating that someone has tried to access your online account. They’d like you to click on a link to prove that you’re you.
  • The IRS sends you an email saying you have a refund coming.
  • Yellow Pages needs to update your ad, when you’re not advertising with them.
  • You get an email from yourself. (This is common. I get a lot of emails *from myself* asking if I want to purchase a product!
  • Your insurance company asks you to click on a link for a new free service.
  • Here’s an example of a phishing email I got the other day. It’s from a person I don’t know who wants me to open a Google document. The email program I use, Thunderbird, shows me where the link included in the document will take me. Notice that it is NOT a Google website! (Google docs always start with https://docs.google.com/…and.then.the.document.file.name ) Even if you don’t use Thunderbird, you can still hover your mouse over the link and most email programs will show you the full link.20150206 example of phishing email

Listen to your spider-sense!

Even if everything looks okay, but you get a tingling sensation that it might not be, pay close attention. If you get *any* indication that the email is not from who it says it’s from, do some investigation. Is it supposedly from a friend? Call or text them and ask if they sent it? Is it from your bank? Call the number you have for your bank and ask!

Recent Phishing Scams:

IRS Warns of Phishing Tax Scams, Fake Emails

Anthem Warns Customers About “Phishing” Email Scam

Phishing Scam Spoofs BBB questionnaire; Businesses Warned Not to Click

Email Scam Alert from UC-Santa Cruz

What to Look For:

Every email & text that you receive should receive the once-over by you. Are you expecting that text / email / phone call? Are there misspellings? Are the links directed to where they say they are going? Is the grammar correct? Every unexpected phone call from an “authority” should be treated with suspicion until you’ve determined their authenticity.

Be Safe out there Folks!

Make sure your anti-virus is always up to date and be careful of what information you provide to third parties. (If you do happen to inadvertently download a malware program, run your anti-virus right away.)

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

 

Save