Hacked Email? Check your “Rules”

This past week, we received hacked email messages “from” several different customers indicating that their email account has become compromised. I have “from” in quotes because the emails weren’t actually from those people.

Each email was similar, in that they all started with a benign and short email message saying “Checking in” or “Favor to ask!” or “Hey there?”. The request said something like “I wonder if I could ask your help?”. All the messages were received within the past 7 days. This indicates an active and fruitful attack that is going on right now.

HACKED EMAIL – CHECKING IN:

Here’s a screenshot of one of the first hacked email messages we received:

Hacked email example - need a favor

Chris replied with a quick email that said “Yes, I will call you later today”.  Our “Spider-Sense” was tingling about this message – because this is not something that this customer would do via email.  A few minutes later, we received this message:

email hacking example - Apple card for neice

We noticed that the “reply from” address was slightly different from his actual email address. (An “R” was added to the end of his name.) I called the customer a few minutes later, and he said he had not sent either of the messages. We talked for a while, and I recommended that he turn off his computer, and wait until I could arrive later that day.

Super-Geek To The Rescue:

The first thing was to review his MSN account security information, such as the cell phone and alternate email addresses on file which can be used for account recovery, and to change his password.  I enabled a feature to disconnect all already connected email programs which might still be connected. We wanted to make sure the hacker did not still have access to his account, to possibly seize back control.  I looked through his past login history and found that there were several recent attempts from Nigeria using Exchange.  This was a smart and sneaky attack.

Hacked email - unusual activity from Nigeria

I scanned his machine, and found the machine was not infected – but there was something wrong with his MSN email account. His Inbox showed that it had not received any new email messages for the past several days. (He could send email messages just fine.)

I looked through his account configuration within MSN, and found that a Rule (which did not have a name) had been added. It was applied to every new email message.

Hacked email - account rules changed and archive message

  • Mark the message as Read
  • Move the message to the Archive folder
  • Forward a copy of that email message to a different email account. This looked like the customer’s email address but with very subtle differences.

I found that all of the customer’s recent email was indeed in the Archive folder, and moved them back to the Inbox.  I deleted the Rule added by the Hijacker.

HEY THERE?

Here’s another hacked email we received:

Hacked Email Example - slick get back to me asap

 

This was a sneaky one too with multiple Rules added to their email. In this case, their Comcast email account had been modified to have a similar Rule added, which was forwarding a copy of all email messages to a similarly named email address under the Hotmail.com domain that did not belong to the customer.  The password was changed, the account recovery information was reviewed, and the silent email forwarding Rules (there were two) were found and deleted.

FAVOR TO ASK!

For another customer, we received this “Favor to Ask!” message:

Hacked email example - another Favor to Ask

We contacted them with a different email to let them know. They sent an email blast to their contacts announcing that their email address had been compromised, which is good. But they didn’t BCC everyone so we:

  • saw their complete list of contacts, and
  • so did everyone else.

Remember, if you need to send an email message to many contacts, follow good Netiquette and don’t use CC. Using BCC will hide all contacts that you are sending to. (Who remembers “carbon copies”, “blind carbon copies”, and getting their fingers all inky?!)

FAVOR TO ASK?

We also received this similar message from a hacked email:

example - favor to ask - AmazonAgain, the hacker changed the rules within their email account.

GREETINGS

And, last but not least, we received this convoluted request:

Another example requesting a Home Depot card

WHAT TO LOOK FOR IN YOUR EMAIL INBOX:

If you get an email like this, it’s important to let the person know, WITHOUT using the email address that was used to send the original message! The best option is to call or text them. If you don’t have their phone number, see if you have another email for them. You can also contact a family member and ask them to pass on the message. I’ve even resorted to sending the person a message on Facebook.

WHAT TO DO IF YOU’RE DEALING WITH A HACKED EMAIL ACCOUNT:

If you find out that your email has been compromised there are several things you should do right away:

  • Change your password on your email account.
  • Double-check that your “reply to” address is really your address. Look for an extra letter. Is the domain correct? (Comcast? Gmail? Outlook? etc.)
  • Check your email account “Rules” to see if any new emails are forwarded to a different address?
  • Let people know that your email is compromised. Make sure they know you’re fine and don’t need a gift card for Amazon or Apple. If you send one email to a bunch of people, please use BCC.

As always, if you need help, give us a call. In most cases, we can help you remotely.

CONCLUSION: 

Scammers, hackers, hijackers, and spear-phishers are getting more sophisticated in their attacks. Here’s a recent article about a big-time Nigerian email scam. Today is a great day to run your virus scanner, change passwords, set up two-factor authorization, and back up your data!

 

I’ve created a Free Report to protect you from “phishing” scams. Click here to receive it!

Information about Geek For Hire, Inc.

Chris Eddy of Geek For Hire, Inc. has provided computer service to families and small businesses with Macs and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website or give us a call at 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area and remote service throughout North America.

Here’s a link to our Covid19 Policy.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

More Tips Here:

Security Summit Thoughts – Hack-Proof Your Mac or PC

Last week I attended Microsoft’s “Virtual” Security Summit.  I have the word virtual in quotes because I didn’t have to travel anywhere.  My son and I watched the live streaming video in our living room! While I like the buzz of meeting new people, staying at home and learning new things has its advantages as well.  The Summit was primarily targeted towards management of large enterprise firms, I did pick up a few nuggets of information that will help the average person with the security of their machine as well.

First tip for Security:Security

Make sure the user permissions on your account are set to “Standard User” and not “Administrator”. This cuts down on the chance that viruses or other malware can be easily installed on your machine. This also protects a random bad operator from installing a bitcoin mining operation on your machine.  You provide the computer and electricity, they get the benefit.  If anyone has ever installed the SETI program on their machine, it would work similarly to that.  (The “Search for Extra-Terrestrial Intelligence” program gave the opportunity for ordinary computer users like Chris Eddy to allow SETI to use some of their computer operating power.)

Next:

Make your machine harder for the bad guys to get access to. Use a very secure password, set up two-factor authentication wherever you can. Install updates to your Operating System as soon as they are available.

Finally:

Use good security practices. Patti Chrzan, head of Microsoft’s cyber-security fraud division said this:

“90% of all cyber crime starts with a phishing email”

A reminder that the phishing email is an attempt to get access to your personal information, like your birthday or password.  A phishing email might also install a virus, ransomware, or other malware.

Being hyper-alert of every click, and every email you open puts you way ahead of the average person. Even if the email seems legit, never click on a link in an email from a corporation until you have confirmed its legitimacy.  Call the company to confirm that your account has been hacked, or your password was changed, or a large purchase was made.  Never take the word of an email at its face value!

The highlight of my day was when Microsoft retweeted my comment:

security

Just because you have an antivirus installed, does not automatically make you secure. You must have good personal systems in place too.

Past blogs you may find helpful:

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

 

Tagged

Phishing Expedition’s – Keeping Safe During the Holidays

Several of our customers received a disturbing email over the past few days.  Once customer received one that said her email was being discontinued.  Another received one that said his bank account was being closed.  I even got one that said my SIM card was being deactivated so I would effectively be without cell service!  These are all “phishing expedition’s”.

Luckily I know the signs to look for to determine if an email is a phishing expedition or for real.Phishing Expedition

  1. Make sure the email is really from a trusted source.  If the email is from a friend, read it through before you click on any links.  Does the email sound like it was written by your friend?  Are you expecting an attachment or other link from them?  Always check when you receive an email with a link or other attachment before clicking.  Did your friend really send it?
  2. Before I click on a link in an email, I hover my mouse over the link to see where the click will take me.  When I hovered over the “Know More” link on the email I received, it goes to the website t.goddypuddy.IN/withLotsMoreTextFollowing. The “in” at the end of the website is a country code.  In the US, we are used to seeing .com, .biz, .net, or .gov.  In this case the .IN refers to  India.  So I know that the email originated in India. (Note that you can only do this on your computer, so don’t click on any links from your phone or tablet unless you know they are 100% safe!)
  3.  Does the body of the website match the Subject line?  In this case, the Subject is that my mobile number is being deactivated.  But the body of the email is completely unrelated talking about banks and the Supreme Court.
  4. If your friend or colleague says they didn’t send the message, tell them to change their password and run their virus scanner ASAP!

What else can you do to stay safe?

  • Put a note on your calendar to change your email passwords at least once a month.  Here are some tips to creating a strong password.
  • Be extra careful when surfing the web or viewing posts on Social Media. Malware is increasingly being spread that way.

Looking for more info on phishing expedition’s?  Here are some past blogs:

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PC’s for the past fifteen years. His company is highly rated by both the BBB (Better Business Bureau) and by Angie’s List. You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free 2-3 day shipping and the online streaming. I haven’t tried the Kindle lending library yet.  I’ll try that next!   Prime is normally $99/year, but you can try it for 30 day for free by clicking on this link: Try Amazon Prime 30-Day Free Trial (Yes, we’ll get a small commission when you sign up.)

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Tagged

Phishing Expeditions (Stay Safe Online!)

There’s another threat out there. It’s a Phishing Expedition. Several of our clients have already fallen for it.  It comes by way of an email which appears to be from a trusted friend or business associate.  They want you to take a look at a document on DropBox. It looks legit, plus, you’ve gotten documents from this email contact before.

So, you click on the link to look at the DropBox document. Except it’s not from your friend. And in that brief moment, you’ve given access of your entire email contact list to the Phishers.

As soon as you figure out what has happened, it is important to change the passwords for all of your email accounts

"Phishing" by Edwind Richzendy
“Phishing” by Edwind Richzendy

immediately. Here are some ideas for creating a really strong password.  You should also run your virus scanner.

How do you make sure this doesn’t happen to you?

  1. Before opening any attachments, make sure the email is actually from your contact.  Are you expecting a document or other attachment from them? Does the text of the email message and subject “sound” like what your contact would write? If not, give them a call to see if it’s really from them.  (If it’s not, tell them to change their password and run their virus scanner ASAP.)
  2. Put a note on your calendar to change your email passwords at least once a month.
  3. Be extra careful when surfing the web or viewing posts on Social Media. Malware is being spread that way as well.

Looking for more info on phishing?  Here are two past blogs:

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PC’s for the past fifteen years. His company is highly rated by both the BBB (Better Business Bureau) and by Angie’s List. You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free 2-3 day shipping and the online streaming. I haven’t tried the Kindle lending library yet.  I’ll try that next!   Prime is normally $99/year, but you can try it for 30 day for free by clicking on this link: Try Amazon Prime 30-Day Free Trial (Yes, we’ll get a small commission when you sign up.)

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Save

Tagged

Change Your Password!

In the last few days, we’ve had a bunch of calls from customers who have had their email hacked.  They are hearing from friends and clients that their email is sending out spam.  Some of them have been aggravated with us because they feel like their anti-virus should have protected them.  (Security software can’t protect you if someone else already has your password information.)

Here’s the deal.  Several years ago, LinkedIn was hacked.  Login credentials were stolen from approximately 117 million LinkedIn accounts!  Although this happened in 2012, one of the “bad guys” has recently decided to sell the credentials.

LinkedIn

According to this article from Tech Crunch:

Now, according to a new report from Motherboard, a hacker going by the name of “Peace” is trying to sell the emails and passwords of 117 million LinkedIn members on a dark web illegal marketplace for around $2,200, payable in bitcoin.

117 million LinkedIn emails and passwords from a 2012 hack just got posted online

CNN:Money adds their two cents:

Companies typically protect customer passwords by encrypting them. But at the time of the 2012 data breach, LinkedIn hadn’t added a pivotal layer of security that makes the jumbled text harder to decode.

Put on the defensive, LinkedIn is now scrambling to try to stop people from sharing the stolen goods online — often an impractical task. The company is also invalidating all customer passwords that haven’t been updated since they were stolen.

LinkedIn said it’s reaching out to individual members affected by the breach. This particular hack affects a quarter of the company’s 433 million members.

http://money.cnn.com/2016/05/19/technology/linkedin-hack/

Since many people use the same password on their other online accounts, the hackers can potentially access other accounts as well.

Our advice?  Change your passwords for LinkedIn and other social media sites today.  If you use the same passwords for other online sites, change the passwords for your email and banking accounts too.  (If you didn’t have a LinkedIn account prior to 2013, you should be safe.  This time.)

Changing your passwords on a regular basis is always a good idea!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PC’s for the past fourteen years. His company is highly rated by both the BBB (Better Business Bureau) and by Angie’s List. You can find more on our website.  Geek For Hire, Inc. provides onsite service (Tier 3) to the Denver / Boulder / Front Range area and remote service throughout North America.

Join Amazon Prime – Watch Thousands of Movies & TV Shows Anytime – Start Free Trial Now

 

 

 

Are You Thinking of Using a Password Manager?

I am of two minds when it comes to an online password manager.  On the one hand, I think it would be a great way to keep multiple passwords secure.  On the other hand, I worry about hackers gaining control of my data.

That being said, if your keyboard (or monitor) looks like this, it’s time to find another solution!

Is this your password manager?!

Luckily, there are several online password managers to choose from:

  • 1Password
  • Dashlane
  • LastPass
  • KeePassX
  • mSecure
  • Sticky Password

Most of these have the same or similar features.

  • Manage passwords over multiple devices
  • Generates ultra strong passwords
  • Stores banking and other sensitive information
  • Most are free but do have an annual or monthly fee for certain upgrades
  • Some utilize the iPhone fingerprint to confirm your identity

Even with a secure password manager, you still need to be careful of “spoofing”, where a fraudulent web page is displayed to trick you into providing your super-secure password key as described in this article:

Which password manager do you use?  What are its best features?  What don’t you like? Let us know in the comments below!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PC’s for the past fourteen years. His company is highly rated by both the BBB (Better Business Bureau) and by Angie’s List. You can find more at http://www.GeekForHireInc.com  Geek For Hire, Inc. provides onsite service (Tier 3) to the Denver / Boulder / Front Range area and remote service throughout North America.

 

Protect Yourself from Phishing Attacks!

How to protect yourself from phishing attacks? Many of you know that I take frequent road trips. That’s why my vehicles have the EZ-Pass device on them. EZ-Pass automatically collects tolls on highways and bridges on the East Coast. (FYI, FasTrak is used on the West Coast. Here in Colorado, we use ExpressToll.) When this article crossed my news feed, I was particularly interested.

“Phishing Scam Alert: There is a phishing email* being sent to drivers across the nation claiming they owe money for unpaid E-ZPass tolls.  This is not an email from The Toll Roads, the Transportation Corridor Agencies, E-ZPass or E-ZPass tolling agencies. E-ZPass is used to collect tolls electronically on the East Coast; FasTrak is used to collect tolls electronically on the West Coast.

ezpass logo - protect yourself from phishing attacksIn fact, during the fourth quarter of 2015, phishing attacks saw a huge increase. As expected, financial institutions took the biggest hit, although any company is vulnerable.

Wikipedia has a good definition:

“Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.”

How to protect yourself from phishing attacks:

Remember that most phishing attacks come via email, so it is very important to remain vigilant about what links you click in the emails you receive. Even when an email looks legitimate, with accurate looking logos and links, if you have any doubt, don’t click!

Social Media is becoming another prime target and a place to protect yourself from phishing attacks. In fact, according to Ian Trump of LogicNow:

“One in five phishing attempts is made through social media. Some of these will be unsophisticated attempts to snare anyone who might miss-click, but others will be more targeted and try to fool people with specific information, attempting to drive the user to a fake website where they will enter their username and password. A compromised social media account has the potential to wreak further havoc, especially given the habit for people to use the same password over and over again for both work and personal accounts.” More info in this article.

Whenever you receive an email saying you owe an organization money, or they need to confirm your information or anything that makes you wonder if it’s for real, be especially careful. Never click the link on the email. Instead, head to the website you’ve used before to check out the authenticity of the message. If you find that it is a phishing attempt, notify the company too.

Have you been hacked? How do you protect yourself from phishing attacks? How do you handle it? Let us know in the comments below!

I’ve created a Free Report on how to protect yourself from phishing attacks. Click here to receive it!

Watch Out For Phone, Text, Email, and other Scams:

  • Remember to stay well clear of shortened links unless you know without a doubt where that link will take you. That includes most bit.ly and owl.ly links. Here’s a recent article about short links.
  • Right now there are a lot of scams out there. Read our article about Covid19 scams.

Information about Geek For Hire, Inc.

Chris Eddy of Geek For Hire, Inc. has provided computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area and remote service throughout North America.

Here’s a link to our Covid19 Policy.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

 

The Biggest Lie in the Computer Industry?

What’s the biggest lie in the Computer Industry?  It’s the myth that Apple’s don’t get viruses.

Geek For Hire has been out there fixing computers since 2001 and we’ve seen just about everything. When someone tells me they have a Mac, or are switching from a PC to a Mac because Mac’s don’t get viruses, I have to respectfully disagree.

As early as 2012, Apple changed their stance about viruses on their machines. According to the Huffington Post, in June of that year, they changed their verbiage from:

“Safeguard your data. By doing nothing.”

To:

“Safety. Built right in.”

In the last few months, we’ve been seeing more and more viruses on Mac machines. Everything from lots of adware and pop-ups, to “a lady’s voice keeps telling me to run my virus scanner”, to what’s commonly being called “scare-ware”.

What’s out there?

  • Malware is the general term used for any malevolent or bad software that can get loaded onto your computer.
  • Spyware is software installed on your tech device without your knowledge or consent. It collects information about you and relays it to an external person or organization.
  • Adware is frequently called pop-ups. This is where you get lots and lots of pop-ups with advertisements. Lots of people just live with this type of infection not realizing that it’s often accompanied by other more malicious malware.
  • Virus is the most common term used by “real” people for all of these types of infections.
  • Scareware is similar to Adware in that it generates a pop-up. In this case though, the pop-up tells you that your machine has an infection and you need to visit a particular website RIGHT NOW to get the virus removed.

How to keep your computer safe? Be careful what you click on! Don’t open attachments in emails. Don’t click on ads on the websites you visit. Above all, make sure you select an anti-virus program that continually upgrades their software and pushes those changes to your computer. We recommend ESET’s NOD32 anti-virus protection for Mac’s and PC’s.

Did you think Apple machines were impervious to viruses and other malware? What steps do you take to keep your machine safe? Let us know in the comments below!

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.

How To Spot An eMail Scam

The scammers are getting better and better. The text of the email looks legit; the email address looks legit; the graphics are professional. How can you tell when your phone company is contacting you vs. when a scammer is impersonating your phone company?

A client received this email last week and gave us a call.

 

CenturyLink email scam

Everything looked good on the email that she forwarded to me. I hovered over all of the links to see what website they actually pointed to. I looked at the logos, and they actually looked like the real ones. A quick search shows that both “Digital Vault” and “@Ease” are real CenturyLink services. Even the deadline, almost three months in the future, seemed like a legitimate phone company corporation deadline.

The only trouble was that our client had no recollection of signing up for a CenturyLink cloud based storage or “Digital Vault”.

She said that she was going to call CenturyLink about this and I urged her to call a number that she already had, rather than any phone numbers included in the email.  When she called CenturyLink, they told her it was a scam and asked that she forward the email to them.

So that’s my advice this week – If you receive an email from a company you have a business relationship with, AND, you’re not expecting an email from then, give them a call on a number you already have saved for them.

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PC’s for the past fourteen years. His company is highly rated by both the BBB (Better Business Bureau) and by Angie’s List. You can find more on our website.  Geek For Hire, Inc. provides onsite service (Tier 3) to the Denver / Boulder / Front Range area and remote service throughout North America.

Beware of Click Bait!

This morning, I was doing one of my morning rituals which includes reading through the recent posts on Facebook, and found that a friend of mine who lives on the east coast, liked a story. I worked with him many years ago. He was the manager of a major project which I worked on for many years. This was the largest project in my career, and I know that this system is still “alive” today because I have served a local customer twice who is dispatched by this system. Since I respect my friend, and he doesn’t casually like everything, the things that he does like tends to get my attention. The first thing I did was to like the story too.

The story told of a mother beating her son on national television because he was participating in the recent riots in Baltimore. My friend liked it, so it must be legit. I clicked on the link to the story, which went to a blogsite which I had never seen or heard of before. The content of the page had only a brief retelling of the title of the story, plus several advertisements, but there was no link to the salacious original video that grabbed my attention. Since I didn’t see what I expected, I thought this was a problem with the tight security settings of my daily browser (Firefox, with several add-ons), so I copied the URL from my “high security” browser and pasted it into my “low security” browser which works with everything (Internet Explorer), and fetched the page. The same page was displayed, but this time with many popup advertisements (pop-over and pop-under) which were really concerning to me. There was no salacious video or a link to it. I shut this down fast.

Still being interested in the salacious story, I went to YouTube and searched for the general words of the title of the story, and found several direct links to the video – without additional advertisement or commentary.

In this case, I fell prey to “Click Bait”. I saw a story that interested me, thought it was legit, and clicked on it. It wasn’t legit. I will be doing a total system scan of my computer to check for any residual nastiness.

If you think you’ve fallen prey to “Click Bait”, the best thing to do is to scan your machine for anything malicious. If you need help, give us a call!

Information about Geek For Hire, Inc.

I’ve created a Free Report on what to look for to protect yourself from “phishing” scams. Click here to receive it!

Chris Eddy of Geek For Hire, Inc. has been providing computer service to families and small businesses with Mac’s and PCs for the past eighteen years. Angie’s List and the BBB rate Geek For Hire very highly.  You can find more on our website, or give us a call 303-618-0154. Geek For Hire, Inc. provides onsite service (Tier 3 support) to the Denver / Boulder / Front Range area as well as remote service throughout North America.

We’ve been using Amazon Prime for the past few years.  We like the free and fast shipping.  With Prime, we have access to online streaming too. Prime is usually $119/year, but you can get a free 30-day trial by clicking on this link: Try Amazon Prime 30-Day Free Trial. As an Amazon Associate, we earn from qualifying purchases.