Archive for the ‘Computer Security’ Category

Lenovo laptops infected with malware from the factory

Posted by

Computer security vulnerabilityLenovo recently released a product security advisory about a man-in-the-middle attack vulnerability that exists on some of the Lenovo Notebook laptop models sold by the company between Jan 2014 until Feb 2015.

A program called SuperFish intercepts all internet traffic using a self-signed root certificate that is stored in the local certificate store and provides a security concern. Superfish is an advertising company that develops various advertising-supported software products. The Superfish software has been described as malware or adware by security experts and anti-virus softwares. On February 20, 2015 the United States Department of Homeland Security advised uninstalling Superfish and its associated root certificate because they make computers vulnerable to serious cyber-attacks, including interception of passwords and sensitive data being transmitted through the Internet browser.

Lenovo says “SuperFish was previously included on some consumer notebook products shipped between September 2014 and February 2015 to assist customers with discovering products similar to what they are viewing. However, user feedback was not positive, and we responded quickly and decisively”.

While the the company will no longer be including Superfish in its pre-loaded factory OS image, there are still many laptops that remain infected with the malware. Lenovo laptop owners are urged to take actions to remove the program from their computer.

Lenovo laptop owners can remove the malware from their comupter by downloading a Superfish removal tool from the laptop manufacturers website here:

http://support.lenovo.com/us/en/product_security/superfish_uninstall

Alternatively Lenovo laptop owners can take their laptop to a computer repair store in their neighborhood to have Superfish removed.

Is My Lenovo laptop infected with Superfish?

Chances are yes if you purchased your Lenovo laptop at a big-box store. However if you purchased your Lenovo laptop from South City Computer, we have already removed this malware during the initial set up of your laptop.

Alderman Vaccaro Says “Be Careful of Scams!”

Posted by

Joe Vaccaro PictureJoe Vaccaro is the Alderman of the 23rd Ward in Saint Louis City. He is very involved with the community and frequently passes on tips and information about dangers to people in the community.

Below is an email that we received explaining how peope will try to trick you. Given these are pretty unsophisticated examples that the average person would simply laugh off as a scam. But hackers oftentimes will use more sophisticated techniques like the “You Qualify for a Lower Rate” credit card scam.

Joe Vaccaro
23rd Ward Alderman
cell number 314-718-0131
Ward 23 Website

Yesterday I received a phone call from someone that was told that they needed to go to Walgreen’s and bring $452 in cash to avoid being arrested for failure to appear for grand jury duty. He is not even on the grand jury. This was a scam and I told him not to pay this. I also ran into someone at St Joan of arc’s fish fry that told me they received a call from someone claiming to be with the IRS also asking for money to avoid arrest. DON,T BE TAKEN IN BY THESE SCAMS. If you get a call like this do not react. you can call the police and ask them if this is a scam. 231-1212 is the non emergency number. I talked to the captain of the second district and he told me there is many variations of this scam going around. Please pass this along to to your neighbors especially the elderly who seem to fall victim to this kind of scam.

Joe Vaccaro
6227 hancock
st louis Missouri 63139
United States

Don’t fall for Phishing Scams

Posted by

Bank Phishing WebsitePhishing, pronounced like “fishing”, is where a malicious website is set up in order to trick users into divulging personal information such as log in credentials, credit card, banking, or other private information. These website can look very convincing, mimicking a bank website, or a credit card website, or even a social media website log in. The website is meant to fool the user into divulging private information. Many of the sites will actually take in the information that is typed in the form, and then send the user over to the real login website, so that the user thinks that they just didn’t put in their log in information correctly, and never realize that they just gave away their personal information to a scammer.

Most phishing starts via the email inbox. Compromised email accounts will send out hoax emails that contain links to phishing websites that try to mimic a legitimate website. The messages will vary, such as faux emails about “A Recent Money Transfer”, “Account Overdraft Notice”, “Urgent Message from your Bank”, or something like “Your recent purchase at eBay”. Some of the emails even appear very realistic, and often times contain logos and colors that the actual company uses. The emails almost always contain links that take the user to a phishing website where their personal information is “fished” right out of their unsuspecting victims head. Always be on the look out for suspicious emails that don’t seem legitimate, or possibly don’t make sense.

In order to avoid this scam, always be sure that you are on a legitimate website domain. Check the URL bar for inconsistencies such as misspellings or mangling of the real domain like “bank0famericas.in” or “usbank.com.baddomain.cn” or “faceb00k.ru”. Also always check for domain TLDs to ensure you are on a .com, .org, .net and NOT a .cn, .ru, or .in to name a few of the most commonly seen scams.

Another way to protect yourself from Phishing scams is to always ensure that the website your are logging into is secured via HTTPS. Most phishing websites will not have a valid SSL certificate and this is a dead give away that somebody is trying to do something nasty to you!

Some email links look suspicious however turn out to be legitmate. A great example of such a situation is the Healthcare.gov email notices that come from a third party company known as govdelivery.com. The emails appear to look like the Healthcare.gov logo and color schemes however the links in the emails go to “govdeliver.com”. This company tracks the link clicks from the emails before sending the user over to the healthcare.gov website. It appears very “phishy”, however has been verified as trusted by the US government. So you can see how confusing this area of internet security can sometimes become.

If you think you have been the victim of a recent phishing scam then you should be proactive about securing your accounts. Try to remember what log in information or personal information you divulged. Change your account passwords. Contact your bank if you notice any fraudulent behavior with your bank account. Contact the police or FBI if you think you are a victim of identity theft. Seek the advice of a computer repair expert if you think you may have installed malicious software or programs onto your computer by visiting a phishing website.

It is difficult to know for sure if you are dealing with a real website or a fake website. As with all Internet activity, keep your “street smarts” about you at all times. If it seems fake or out of the ordinary, then it IS!

Tips to avoid getting hacked

Posted by

Tips to avoid getting hackedWhile there is no fool proof way to avoid being hacked, here is a list of tips in order to avoid from getting hacked.

Never use easy to guess passwords. While “puppy” may seem like a fun password, it is an easily guessed password. A dictionary brute force attempt could guess the password “puppy” in under a second. While there is no real good way to know if your password is fool proof, most security experts recommend using a mixed letter, number, and symbol password combination of a length of 8 or more digits. Try to avoid using easy to guess words or dates.

Try to use different passwords for different website user accounts. Having the same password for all of your user accounts makes it easier for a hacker to gain more access and cause more issues for you.

If you think your password has become compromised, change it right away!

Never share your username or password. It seems pretty straight forward, but some people can be deceived into divulging their username and password by a hacker pretending to be a computer support technician, or somebody from the company IT department.

Never write your password down and leave it near your computer. Lots of people hate to remember their password and therefore write the password down on a sticky note, or piece of paper near their computer. This allows anybody who uses the computer to see your password in plain sight.

Always use password secured login on your computer. Even though Windows will let you just log in without a password, it is best to use a password based login on your computer. Don’t make it as easy as logging right in without a password.

Keep your computer free of viruses, spamware and malware. Most malicious programs will try to proxy your Internet connection or use key-logger programs in order to monitor all the network traffic to phish out usernames and passwords. Any computer that has become compromised by malicious virus should not be trusted with any username and passwords.

Never use a public computer to log into your bank account or other private accounts. Public computer are like public toilets, they are dirty and unsanitary and should not be trusted since you cannot be sure what programs have been installed on the computer, and could have malicious software or keyloggers installed waiting for your input.

Make sure nobody is watching you type your username and password. While it seems like it would be really hard for someone to watch your keystrokes in order to gain access to your password, it is absolutely possible.

Do not believe anyone who calls you and requests your username and password to gain access to your computer. A lot of recent tech scams involve a person calling you claiming they are from “Microsoft” and have detected a virus on your computer. They will request your username and password to login to the computer in order to remove the virus. If you haven’t guessed already, the person on the other end does not really work for Microsoft, and is just trying to cause you havoc.

Always check the url of the website you are logging into for authenticity. Fake emails that look authentic will oftentimes contain links that take unsuspecting victims to phishing website. These are websites that look similar if not identical to bank account login pages. If one looks at the URL bar though, they will notice that they are on another domain such as bankofamerica.hackeddomain.com. Always ensure you are actually putting your password into a trusted website.

Never log in over an unsecured connection or network. While it may seem like a good idea to jump on any open wifi network, just know that somebody could be listening to your network traffic as well. There are programs that allow a hacker to monitor all network traffic on an open network in order to search or usernames and passwords.

Try to change your password on a regular basis for best security measures. If you change your password on a regular basis, you are always staying one step ahead of the game of cat and mouse. It is recommened that users change their password at least once a year, and some banking website will force users to make this change as a security policy.

Anthem data breach could be largest in history

Posted by

Anthem hackedAs banks have beefed up their cyber security in the recent months after a JP Morgan Chase announced a data breach, hackers seemed to have turned their sights onto healthcare providers and insurance companies. Last week medical insurance company Anthem publicly apologized to its customers for a data breach that could have leaked over 80 million records that included names, addresses, phone numbers, and social security numbers. The company has described the data breach as a “very sophisticated external cyber-attack”. Anthem is still investigating whether the hackers were able to obtain any sensitive medical records or patient history. The data breach could be one of the largest in history.

The data breach recently came to light after an employee at Anthem notice suspicious activity of their user account. The data breach is currently being investigated by the Federal Bureau of Investigation and a private security firm that Anthem hired to help audit the data breach.

The Anthem data breach echos President Obama’s recent State of the Union address where he pledged to spend more money on cyber-security in the United States. However most security experts agree that most data breaches are the result of basic flaws in computer security, social deception, failure to protect user names and passwords properly, or failure to encrypt sensitive data, and not the result of weak or faulty computer security methods currently in place.

Internet Explorer error ‘Do you want to view only the webpage content that was delivered securely?’

Posted by

Do you want to view only the webpage content that was delivered securely?Are you getting a pop-up in Internet Explorer with the following:

Security Warning

Do you want to view only the webpage content that was delivered securely?
This webpage contains content that will not be delivered using a secure HTTPS connection, which could compromise the security of the entire webpage.

Why is this pop-up showing?
The Security Warning pop-up is telling you that not all the content you are browsing is secured over HTTPS encryption. It is likely that some of the images or scripts may be coming from different website sources and not all are encrypted. It probably does not mean that somebody is doing something malicious to your computer.

Do I have a virus?
Probably not. This Security Warning pop-up probably has nothing to do with having a virus on your computer, and is actually a normal Internet Explorer pop-up message.

Should I be concerned?
Maybe, if you are just checking an email account at yahoo.com or gmail.com, or visiting a website like facebook.com, twitter.com, then there is probably nothing to be concerned about at this time. However, if you are getting this message while using your online banking website or if you are sharing credit card or private information on the website, then you should probably be concerned. It may be a good idea to contact the website owner to notify them of the message so that they can fix this issue.

How should I answer this Security Warning pop-up?
It depends on what you are doing on the website, and if you need totally secure browsing. If you want the pop-up to go away just click “NO” to view the webpage even though some of the content will not be secured.

How do I get rid of this Security Warning pop-up for good?
You can disable this Internet Explorer pop-up alert by:

  1. Go to Tools->Internet Options->Security
  2. Select the Security tab
  3. Click on the Internet zone icon at the top of the tab page
  4. Click the Custom Level button
  5. In the Miscellaneous section change Display mixed content to Enable
  6. Repeat steps 1 – 5 for the Local intranet and Trusted sites zones

10 ways to avoid getting a virus

Posted by

Registry Reviver JunkwareThe Internet can be very tricky at times, much like the streets of a large city, people can easily be fooled if they don’t use their “street-smarts” in every situation they encounter online. People who let their guard down online can easily be fooled into installing unwanted spamware, ransomeware, malware, virus, trojans, or worms. Avoide the following 10 most common ways our customer’s typically have gotten a computer virus on their computer.

1. Have an anti-virus program installed and running. Having anti-virus protection can help to reduce your risk of getting a computer virus. But do not rely too heavily on these programs, as many new viruses are still unknown to the anti-virus programs and there is always a lapse in full protection. Many new viruses have not been documented and released in the most recent virus definitions. Also most anti-virus software only do system scanning and do not do real-time system monitoring, and the ones that do offer real-time system monitoring may not always catch viruses getting installed on the computer.

2. Keep anti-virus software up-to-date with the latest virus definitions. Just having an anti-virus software installed on your computer is not enough to protect you from the latest virus and computer threats. Keep your anti-virus definitions up-to-date with the latest virus definitions. It is recommended to run anti-virus definitions updates on a daily basis to ensure the most effective anti-virus protection.

3. Keep your operating system up-to-date. This means run those pesky Windows Updates whenever your computer prompts you to. Updates oftentimes contain security patches and fixes that have been identified by the software distributor as vulnerabilities. It is best to set your computer to automatically update at a time that you would most likely not be using your computer, such as 3AM. Just remember to leave your computer on and connected to the Internet overnight to install these critical updates.

4. Only open email attachments from trusted sources and in believable situations. Most people get computer viruses by downloading attachments to emails. The attachments can seem legitimate such as a attached document, media file, or picture sent to you from friends or family. However you should be very careful not to download a virus. Sometimes friends, family, or coworkers email accounts can get hacked and will send out malicious software. Always check the file extension that is attached to an email before downloading it onto your computer. If the file extension is a .exe, .bat, .msi, .zip, .msm, .msp, .mst, .idt, .cub, .pcp file this could be a malicious software application. Common pictures file types are .jpg, .png, .gif, .tif, .bmp, and some common document file types are .doc, .docx, .xls, .xlsx, .odt, .txt. If you get an email with a strange file attached to it that doesn’t look like any of these common extensions, it is probably best to first verify with the trusted sender that they indeed sent the file. Also never click on links sent in emails that seem vague like “hey look at this link” or “click here to see my pics”.

5. Never install programs from the Internet that claim to fix a computer issue. While it may seem like a good idea to ask “Google” to fix your computer issue for you. Unfortunately most websites that claim to fix a computer issue by installing a program are not legitimate and are likely just fishing websites to get spam-ware, and other malicious software installed on your computer. Always take your computer to a legitimate computer repair business to fix your computer issue, and never search for a fix using a software program from the Internet.

6. Never illegally download pirated software, music and movies. Most illegal pirating networks, file sharing networks, and file link website will contain malicious software disguised as the newest software, movies or pop music albums. Always purchase software, music, and movies legally to avoid getting a virus from these untrusted file sources.

7. Do not try to install extraneous video and audio codecs. Sometimes you may find a file that has a strange extension. It seems logical to try to find a audio or video codec, or other program that could read this extension, however it is more likely that you would download and install a virus than the actual solution for your file type.

8. Do not install programs that claim to enhance the performance of your computer. There are some programs online that will claim to speed up your computer, or enhance the performance of your computer, or even promise to enhance the graphics capabilities of a computer. These are most likely untrusted websites that try to trick you into installing spam-ware, ransom-ware, malicious programs, and viruses onto your computer.

9. Do not install illegal software on your computer. You may find yourself in situations where a friend, family or other acquaintance has a “hot” copy of a popular software app like Microsoft Office or Adobe Creative Suite for FREE. If it sounds too good to be true…well then it probably is. Do not be fooled, these types of software cost hundreds to thousands of dollars, and the pirated “hot” copies tend to be packaged with malicious software. Always purchase software legally from trusted software distributors. Never install “hot” or “cracked” versions of a licensed software or service.

10. Do not click on pop-ups! Really, DON’T DO IT! Some pop-ups mimic Windows operating system alerts, and can look very convincing at times. Here are a few dead give-aways that you may have an untrusted pop-up:

  • has strange unfamiliar icons
  • the error message has improper English
  • the pop-up box has a message in it promissing to fix your computer issues
  • the pop-up moves around
  • the pop-up says your computer is infected with a virus

Even the most cautious computer user can sometimes be fooled into installing a computer virus. If you think you may have a computer virus on your computer, contact South City Computer for a tech visit today.

How to Be Safe Online This Holiday Season

Posted by

As the holidays rapidly approach and ordering online from the comfort of one’s laptop is the norm for gift giving, one must be wary of scams, downloading malware, and getting their credit card numbers stolen. Looking for gift ideas and deals online can be a great deal of fun. Sites like Pinterest, Etsy, E-bay and even Amazon can give you hours and hours of gift browsing and buying fun. With the power of Google search having price comparisons instantly at your fingertips is easier now than ever. But given how easy it is for anyone to put up a website or online store with too good to be true cheap gifts, sometimes you have to look deeper to make sure you aren’t getting phished for your credit card number!
Credit cards

1. Be careful of phishing websites. A phishing website is a website that entices or fools you into putting in your personal information, your password, or your credit card information. Oftentimes you will encounter a website that has products at amazing too good to be prices, so you go through the entire order process and you never get your order. In fact, you may never see a charge at all from that website. Instead your credit card information was silently harvested to be later sold by criminal cyber gangs to commit fraud at a future date.

2. So stick to name-brand familiar sites like Amazon, Ebay, etc.. that have reputation scores for sellers, verified bank accounts, channels for mediation and resolving complaints, and other buyer protections. Also it may be worth mentioning that big sites all use encryption and are under more scrutiny for PCI-DSS data protections than smaller sites. When you run your credit card with Amazon you know they are fully staffed with experts in data security, there are anti-fraud measures in place, and your order will be handled in an expected manner.

3. Be careful that the connection is secure. If you do choose to buy from a merchant that has their own shopping cart, chances are the purchase is ok. Look to make sure the connection is secured (ie: HTTPS). Also look for a telephone number and an address of the company or person you are buying from. It might not hurt to try to email or call them too first if you have any doubts. But just be vigilant, the site needs to have a secure connection if you are ordering with your credit card.

4. Double check emails that have attachments are coming from who they say they are. Anytime you get an email from anyone that has an attachment it’s good practice to verify the identity of the sender. You can do this by viewing the headers in your email. Look for the originating address. It should match the sender you expect. It’s easy to fake the sender address so it always pays to be extra careful with email attachments.

5. USPS, FedEx, and UPS will not send you emails with attachments. If in doubt, call their published customer service numbers. We have seen an uptick in emails from postal and other delivery services saying the packing slip is attached, or there is a document you need to download and sign in order for them to release the package, etc… Don’t fall for it. See number 4.

6. Don’t fall for customer service calls from online vendors. Not only will scammers and cybercriminals try to steal your information online, they will call you and ask you to verify your account information. Do not give your personal information to someone calling you on the phone, always offer to call them back. You should always be careful even if the caller ID is the same as the company they say they are calling from. It is very easy to spoof/fake caller ID. Don’t trust the caller ID as the number to call back, or if they give you a number to call them back don’t trust that one either.Look the company up, and call them at their published number. If they really did call you there will be a note on your account and a customer service rep will be able to help you.

7. Monitor your bank account more closely for unusual activity or purchases you didn’t make. The sooner you see an error the easier it is to correct it. Take a proactive approach to monitoring your own bank accounts. With online account access and Phone Apps it’s never been easier to keep up in real time with your account balances.

Change a Windows Password using Linux Boot CD and Command Prompt

Posted by

If you are unable to Administer a Windows Users password on a computer you may need to modify the way Windows normally functions in order to bypass this issue.

Using a Linux Boot CD, on the hard drive where the Windows operating system is installed.

cd /Windows/System32/

mv Ultilman.exe Utilman.exe.bak

cp cmd.exe Utilman.exe

So by switching Utilman.exe to be the cmd.exe program, we can get a command prompt when you click on the accessibility button on the log in screen.

Boot the computer into Windows. When you get to the log in screen click on the accessibility button, you will get the Windows command prompt.

In the Windows command prompt run the command:

net user Username password

To change a Windows User’s password using the command line, you must set the password to something, it cannot be left blank. So you could set the password to “password” if you like.

In the case that its Windows 8 and it is a Microsoft account, you cannot reset the password like the previous example, however you can use this command on the command prompt:

net user Administrator /active:yes
net user Administrator password

Then reboot the computer and log in to the new administrator account. Change the Windows User’s account to local, then set/unset the password.

This activates an Administrator account so you can go in and manually administer the users password through windows.

Does your computer have Malware?

Posted by

Windows MalwareWatch out for a new piece of malware and spyware that has been popping up on many computers that are coming into our computer repair shop in St. Louis this past couple months. Malware is short for “malicious software” and is unwanted software that can hijack certain functions of your computer, steal sensitive information, and can put your personal information and data at risk. Malware is usually bundled with tojans, worms, rootkits, spyware, adware, ransomware and viruses. Unfortunately most malware can be very tricky to remove. The new malware we have been seeing has no easy removal method at this time and reeks havoc on the computer’s Windows registry. The Windows registry is the place where Windows stores Operating System and program configurations.

All malware is annoying and potentially harmful to the data and personal information on your computer. You should not continue to use your computer if you believe it has been infected with Malware, and should bring your computer into a local computer repair store like South City Computers for repair as soon as possible.

You should never attempt to download any programs that claim to remove or fix a certain malware program or virus you may have on your computer. Often times these programs just install more malware and viruses on your computer and make matters a lot worse.

You should never interact with malware programs since they are malicious in nature and could cause serious harm to your computer.

Signs that you may have Malware

When you attempt to go to certain “most visited” websites like Google.com, Facebook.com, or check your email the malware will redirect your browser to a malicious website and you can never get to the website you requested. This usually happens regardless of the web browser you attempt to use be it Internet Explorer, Google Chrome, or Firefox.

When you try to uninstall the malware through the Windows uninstaller, the malware will attempt to get you to actually install more malware onto the computer, or takes you to a website to download an “Uninstaller” program.

If you are noticing pop-ups and mysterious program notifications from programs that claim to be “Optimizers”, “Anti-Malware”, “Anti-Virus”, “Registry Cleaner”, or “System Repair” software.

Your computer is running slow, and seems to be doing a lot of processing even when the computer is sitting idle.

Your computer will not longer run Windows Updates.

Your computer is unable to run your Anti-Virus software.

Your computer is unable to run an anti-virus scan.

Your computer is unable to update your Anti-Virus software.

Your computer throws missing .dll errors when you try to launch certain programs.

Your computer will no longer connect to the Internet.

Your computer is prompting you for payment information to “fix” your computer.

Your computer will no longer print or communicate to external devices such as printers.

If your computer is doing any of the strange behaviors listed above, or you think that you may have installed malware on your computer bring it to the computer repair experts at South City Computers in St. Louis today.

// //
//