What To Do If Your Facebook Account Is Hacked

October 2nd, 2013

Hacker

Your Facebook profile is an appealing target for cyber criminals. With access to your profile, they immediately have access to all of your friends also. A hacked Facebook account has led to the hacker asking for money from Facebook friends, posting malicious links on friends’ walls and other suspect behavior.

Andy O’Donnell, of About, notes that you’re usually not the first to find out you’ve been hacked. A friend may text you to ask about an odd status update or message. When you try to sign into your account, either you’ll notice that someone else has been posting messages as you, or you’ll be locked out completely. If you believe you’re account has been hacked, follow these steps.

  • Go to facebook.com/hacked, which is the Facebook Account Compromise Reporting page.
  • Click ‘My Account is Compromised.”
  • You’ll be taken to the ‘Identify Your Account’ page where you’ll be asked to enter your email address, phone number, or your name and the name of a Facebook friend.
  • Follow the on-screen instructions.

Once you’ve re-gained access to your account, you’ll want to un-do anything that the hacker did. First, change your password. Take this opportunity to make it stronger by using upper and lowercase letters, numbers and symbols. Check your apps page to delete any suspicious apps the hacker may have added. Be sure to tell all of your friends that your account was hacked so they don’t follow any links the hacker may have sent them.

After you’ve taken care of any issues on Facebook’s site, take some time to think about how your account was compromised. Malware on your computer can result in hacked accounts, so a full-scan of your hard drive may be in order.

If you believe your computer is infected with malware, call Geek Rescue at 918-369-4335. We remove malicious programs like malware, Trojans and viruses from any device and have security options to help protect you from future attacks.  

Apple iMessage Bug Has A Quick Fix

October 2nd, 2013

Apple with worm

It’s not a big surprise that some users are encountering problems after upgrading their iPhones to iOS7. Initially, there were concerns over ways to bypass the fingerprint scanner. Now, more and more users are complaining that they can’t send or receive messages with iMessage.

Matthew Panzarino, of TechCrunch, reports that Apple is working on an update that will fix the issue, but there’s a quick fix that might work for some users.

First, let’s get to the quick fix. According to an Apple support document, turning off iMessage, then using the Reset Network Settings function, then turning iMessage back on allows users to again send messages. This causes your iPhone to re-authenticate iMessage, but some users are already reporting that while this does allow you to send messages, it only works temporarily.

Apple released a statement about the errors some users are encountering and estimated that only a “fraction of a percent” of their users were affected. Whether or not that’s accurate, those that are affected are frustrated. They’re stuck without a fully functioning iPhone until Apple releases an update to fix the problem.

Once that update is released, it’s a good idea to back-up your phone’s data before installing it. When Apple patched their previous security related bug for iOS7, some users reported it crashed their smartphones. So, it’s better to be safe than sorry.

Luckily, if you do lose data from any of your devices, Geek Rescue helps restore it. We also fix broken devices and get rid of malware infections. If it boots up or turns on, we fix it. Call us at 918-369-4335.

These Tips Help Prevent Damage To Your Devices

October 2nd, 2013

Broken smartphone

After a few months of ownership, your new device will start to have some wear and tear. Scratches, or chipped corners are common. Max Knoblauch, of Mashable, writes that some of that wear and tear, as well as more serious damage, is avoidable. Here’s a list of ways to keep your gadgets looking newer for longer.

  • Don’t let laptops overheat

Laptops have fans built in to keep them cool. Those fans don’t work as well if the vents are covered by blankets, carpet, or even your lap. Using your laptop for long periods of time without proper ventilation causes a decrease in your battery life and can impact your computer’s performance. In some cases, laptops have even caught fire when overheated. 

  • Use a case

Most people have a protective case on their smartphones to protect when it’s inevitably dropped or falls on the ground. Fewer people put as much thought into how they transport tablets and laptops. There are bags and cases made specifically for transporting these items, yet many choose instead to throw them in backpacks with a number of other things. That’s how screens get broken and corners dented. 

  • Don’t stress out cords

Your phone charger, especially for Apple products, is surprisingly delicate. When you yank it out of the wall by the cord, or coil it too tightly when packing it, it tends to break. The same goes for headphones. Wrapping them too tightly around your mp3 player will cause them to stop working faster. Wrapping them while they’re still plugged in can even cause damage to your device’s headphone jack. 

  • Clean the right way

Screens get smudges and fingerprints on them. Naturally, you want to clean those off, but you have to be careful. Household cleaners eat away at your screen’s coating. There are products available for cleaning electronic devices. Usually, just using a dry rag will remove dust and smudges. 

  • Remember to create back-ups

This bit of routine maintenance won’t affect the look of your device. Backing-up your important data will keep you safe in case your device suddenly breaks down, however. Creating a back-up doesn’t take much time, but it’s something many continue to put off. Computers and smartphones often die sudden deaths, so having a back-up avoids a potential disaster. 

These simple tips help keep devices safe from day-to-day damage, but they won’t ever be invincible. If you have a broken screen or other damage to your device, bring it to Geek Rescue and we’ll fix it. Come by or call us at 918-369-4335.

Facebook’s Graph Search Is Here, Adjust Your Privacy Settings

October 1st, 2013

Private sign

Facebook officially launched Graph Search to all users, which makes it possible to search for, well, anything that’s ever been posted on Facebook. Every comment, status update, check-in, photo and more can be turned up by a simple search. For those who have had a Facebook account for nearly a decade, you might not want people to easily be able to see what your 20 year old self was saying.

Ashley Feinberg, of Lifehacker, posted a privacy guide that let’s you lock down your old posts so they’re not available to just anyone. This way, you won’t have to go through and individually select privacy for each and every status update and comment you’ve made on Facebook.

  • Click the ‘Privacy Shortcuts’ icon, which looks like a padlock in front of three lines and is located in the top right corner of any Facebook page. 
  • Click the ‘See More Options’ link at the bottom of the drop down menu.
  • Now click ‘Limit Past Posts’, which is found on the far right about half way down.
  • You’ll encounter a warning from Facebook that anyone who isn’t your friend won’t be able to see your old posts. Click ‘Limit Old Posts’.
  • Facebook will again ask you if you’re sure. Click ‘Confirm’.

Just like that you’ve made it impossible for strangers to unearth your old Facebook posts. There’s still the problem of friends coming across something embarrassing you may have posted in your younger days. If you’re worried about that possibility, find the specific post by searching for it yourself, or going to the year on your timeline it occurs, if you remember of course. Then you can adjust the privacy settings for that specific post and make it visible to only you. 

Privacy on any social media platform is important because cyber criminals are able to use personal information against you. What you share on Facebook helps them hack into other online accounts, or target you in a spear phishing scam.

Be careful about what you are sharing online. For help improving the security on your computer, or mobile device, contact Geek Rescue at 918-369-4335.

New Form Of Malware Threatens Multiple Accounts

October 1st, 2013

Malware

Fort Disco sounds like an oddly themed night club, but it’s actually a dangerous form of malware that targets users of WordPress and Joomla. Lucian Constantin, of ComputerWorld, reports that the malware has also been documented attacking POP3 email and FTP servers.

Fort Disco is described as a brute force password guessing form of malware. This means that it infects a machine, then attempts to hack into the user’s accounts by trying random passwords. That’s where the term brute force comes in. There’s no finesse used to break into accounts. Instead, password after password is tried until the malware gains access to the account.

Security experts estimate that Fort Disco has infected more than 25-thousand Windows users and successfully hacked into more than 6-thousand WordPress, Joomla and DataLife Engine accounts.

Once the malware infects a machine, it’s able to communicate with its creator to get instructions on what accounts to attack. Since it is hosted on a user’s machine, email accounts and even FTP credentials are also at risk.

Brute force password attacks against content management systems aren’t rare, but Fort Disco is a unique way to hack those accounts. This malware is easily distributed across a large number of computers, and puts multiple accounts in harms way.

As with all types of malware, there are multiple ways it can infect your computer. To stay safe, be extremely cautious what websites you visit, what you download to your computer and what emails you open. Since Fort Disco has been seen hacking email accounts, it’s likely that a number of spam emails containing the malware are being sent.

If your computer is infected, or if you’d like to improve the security on your machine, contact Geek Rescue at 918-369-4335.

Large Scale Botnet Take Down Highlights Looming Threat

October 1st, 2013

Zombie

A botnet is a way for cyber criminals to use your computer to perform tasks like sending spam emails, spreading malware and other fraudulent uses. Infected computers will be able to communicate and form an entire network of zombie machines, which are all under the control of hackers.

Tom Espiner, of the BBC, reports that security company Symantec recently disabled 500-thousand infected computers that were acting as part of a botnet. The ZeroAccess botnoet, used for advertising and online currency fraud, was previously made up of 1.9-million machines.

The ZeroAccess botnet uses people’s computers to execute click fraud. Online advertisements generate income for websites that host them based on how many users click on them. This botnet used zombie machines to generate false clicks, which made them money.

By disabling 500-thousand of the infected machines, the hackers will lose about a quarter of their income. However, the identity and location of these criminals is unknown so experts warn that they’ll be working to restore their numbers quickly.

Symantec initially stepped in to take down the ZeroAccess botnet when it noticed an updated form of the Trojan program, which ZeroAccess installs on infected machines, being distributed. This malware made it more difficult to disrupt the botnet’s communications. Symantec felt they needed to act now, before updated malware made it impossible to disable any infected computers.

Perhaps the most troubling part of a botnet is that most users won’t know their computer is being used by a third-party. Infected computers will experience a decrease in performance. Your computer will be slower because a portion of its resources are being used as part of the botnet.

It’s also a good idea to check the sent messages folder in your email. If there are messages that you didn’t write being sent from your email address, you’ve got a problem and may be part of a botnet.

If you’re experiencing computer trouble or want to upgrade your cyber security, contact Geek Rescue at 918-369-4335.

How Can Outsourcing Help You Business?

September 30th, 2013

Outsourcing street sign

Running a business involves a seemingly never ending list of tasks that need to be done just to keep the lights on. When you’re inundated with these chores, it’s difficult to find time to create, innovate and improve. That’s why you hire others to do some of these tasks for you.

It’s the same with your IT department. Rather than spend their time on meneal, day-to-day maintenance tasks, consider outsourcing services by using cloud computing and a managed service provider. Patrick Zelten, of Baseline Magazine suggests some things to consider before deciding on outsourcing.

  • Diagnose your needs

Just because it’s possible to use a managed service to save your company time doesn’t mean it’s the right thing to do. Before making any decisions, think about the day-to-day operations of your business. For any service you’d like to outsource, you need to know how critical it is to you operations. How sensitive is the data shared? Are their advantages to handling this service internally? And, be sure to have a goal for what you hope to accomplish by outsourcing. 

  • Know your employees capabilities

Another factor in determining what needs to be outsourced is knowing the expertise of your employees. If a system is easily managed by your current staff without being a time burden, then it likely doesn’t need to be managed by a third-party, regardless of other factors. If, however, it will take dedicated time to learning how the system should be run, and keeping up with updates and new functions constantly, then using a managed service provider would save time and money. 

  • Managed, Co-managed or Cloud

Choosing managed services allows you to retain control. It’s almost like adding additional IT personnel. Applications are divided between you and your managed service provider. The two groups will work closely, which can sometimes lead to problems. 

Co-managing is similar, but rather than completely turning over some of your IT tasks, both your staff and the managed service provider work together on the same applications. This provides flexibility, and the ability to easily scale up or down.

Using a cloud system allows you to get started almost immediately and also allows for quick changes in scale. Your cloud provider will handle the set-up and maintenance, so the services you outsource will be continuously updated. This model is less secure than others, however, so what you choose to put in the cloud should be a careful decision.

Outsourcing the right services and applications takes the strain off your company. For help deciding which model is right for you and what the cloud or managed services will do, contact Geek Rescue at 918-369-4335.

 

Malware Infects Your Router Too

September 30th, 2013

Router

You’ve probably taken some precautions to make sure your computer is protected from malware, viruses and other potential security issues. But have you taken precautions to protect your router?

A recent post on NewsFactor notes that there are router-specific malware threats capable of reconfiguring it. A malware infected router is able to redirect users to malicious sites in order to steal data or infect them with more malware and viruses.

Imagine you are using your computer to check your bank balance. If your router is infected with malware, it could redirect you to a similar looking site that is actually designed to steal your log-in information. Minor differences will alert you that something is wrong, but you have to be looking for them. A slight difference in the way the site looks, or a missing option in the menu are tell-tale signs that this site isn’t legitimate.

Thankfully, most banking websites offer security specifically designed to alert you if you’re not on their official website. However, other websites don’t take the same precautions.

Your browser also has security tools available to help keep you safe in these situations. When the warning pops up that a website’s security certificate isn’t recognized, don’t ignore it. This is a warning that using this site puts your data at risk. If you see that warning, don’t use that website. If needed, contact the business directly by phone and ask them about their website.

To protect yourself, make sure your router is updated continuously. Newer models usually update automatically, but it’s worth checking to make sure. Also, use the password protection options. Not only should your router be password protected, but that password should be changed often and not easy to guess.

To find out how to improve the cyber security at your home or office, contact Geek Rescue at 918-369-4335.

Spend More Intelligently To Improve Cyber Security

September 30th, 2013

Piggy bank

Creating an adequate, effective security infrastructure for your business is difficult. It becomes impossible, however, if you don’t take the time to consider where your weaknesses are.

Patrick Budmar, of ARN, reports that security experts estimate that 80-percent of IT security spending at an average company is focused on only 30-percent of the problem.

Firewalls, intrusion protection systems and endpoint security are noted as receiving the bulk of most security budgets. However, diverting funds to increase prevention and detection of threats is a more efficient practice.

Regardless of the amount of security software in place, there will be breaches and gaps in your security. That’s why experts recommend focusing more attention on monitoring data and constantly checking for abnormalities within your network. Many times, a security breach goes unnoticed for weeks or months at a time. This allows for an exponentially higher amount of damage than if the breach was detected immediately.

An audit of your company’s cyber security exposes the potential flaws. It also shows where more attention or funding is needed, and where funds can be diverted from. This way, you’re able to upgrade security by spending more intelligently, not necessarily by spending more.

Geek Rescue provides security audits and the tools needed to improve security. Call us at 918-369-4335 before an attack to avoid costly damage and data loss.

New Form Of Malware Rapidly Spreading

September 27th, 2013

Malware

Antivirus vendors are reporting that a new piece of malware is being used in infection attempts hundreds of times per day over the past few weeks. It goes by the name Napolar or Solarbot and is used to steal information.

Lucian Constantin, of PC World, writes that this new malware started infecting computers in mid-August, but was put up for sale to cyber criminals weeks before the first infection. For $200, hackers are able to buy the Napolar binary code and launch their own malware attack.

While infections have mostly been reported in South America so far, security experts fear this malware will spread quickly, due to its affordable price tag. It appears Napolar is being spread through compromised Facebook accounts.

Napolar is similar in functionality to a Trojan, which has been around for years. Experts speculate it could actually become more popular, however, because of its ease of use and because it is upgradeable with plug-ins.

The tell-tale signs of the malware are pop-up images of women appearing on screen after downloading an infected photo-file.

With more hackers purchasing Napolar and more Facebook users being infected, it’s only a matter of time before the malware reaches North America.

Be sure to keep your antivirus software updated. If you discover that your computer has been infected by malware, bring it to Geek Rescue. We disinfect any device and help you improve your security to protect against future attacks. Come by or call us at 918-369-4335.