April 2016
                         
  Digital Forensics           IT Support           CyberSecurity 
Travel Holiday Vacation Traveling Laptop Technology Concept
Articles of Interest



Computer Fraud 
on the Rise
by Patrick Logan
President & Certified 
Computer Examiner

Seltek receives many emails each week from clients asking if a  received call or email is real. Recently, we have noticed an increase in two specific types of computer fraud.  

The first is a call from a fake computer technician to fix a supposed problem on your PC. The caller identifies himself as a Dell, Microsoft or other employee. The caller will then tell you that your system is infected with a virus which has alerted him somehow. He will then pretend to walk you through a couple of steps to fix the issue but naturally the "problem" is not corrected.  Next he will tell you that he needs to access your computer to fix the "problem." Once he has access to your system he will try to convince you to pay hundreds of dollars to fix the faux "problem." In some cases, malware will be planted to infect your computer, giving you no choice but to pay for the computer to be fixed.  The big computer companies, like Dell, HP and Microsoft, will NEVER call you to fix a problem on your computer. Don't let someone you do not know gain access to your computer, even if they tell you it is in your best interest. 
 
The second type of fraud we are seeing is the use of invalid emails to convince users to perform a wire transfer of funds. The criminals send an email using an email address that is close to the original, but could have two letters transposed or have @gmail.com at the end of the email address. One example of this is a fraudulent email from a Title Company to a home buyer requesting the money for the purchase be wired to a specific account. We have also seen fraudulent emails from the "president" or "owner" of a company to the CFO/Office Manager requesting a wire transfer.  Most of the examples of this fraud involve wire transfers. If you get a request for a wire transfer, make sure to call the other party to confirm the request.  Even if the email appears legitimate, it doesn't hurt to verify the request.  

glass_detective_code.jpg

Avoiding Ransomware
by Liz Calder
IT Support Specialist

You may have noticed that  Ransomware has been making headlines recently. It is malicious software that encrypts files until the victim pays for the encryption key.  Hacker News points out that many of the initial infections come from "top trustworthy sites such as  The New York Times , BBC, MSN, AOL" via advertisement servers. 

Victims of Ransomware range from hospital systems to municipalities. Users usually fall  prey when clicking on an infected link. Ransomware is growing because it is lucrative.  The Department of Homeland Security  estimates that a single ransom server generates upwards of $394,000 per month.
 
While Ransomware may seem more complicated than other types of infections, advice for avoiding infection and/or recovering from a virus should sound familiar.
 
Back up your data
  - If losing your data would be a hardship, you need to keep up-to-date backups.

Avoid links
- Be alert for malicious links on web pages and unsolicited- or suspiciously-worded emails.

Protect your computer
 - Keep operating system patches and anti-virus software current;
 - Consider an alternate browser such as Chrome or Firefox;
 - Employ browser protections such as your anti-virus software's internet security and ad-blocking software such as Adblock Plus ;
 - Change your homepage - use a simple homepage, such as Google, and save the news sites for when you actually intend to view headlines; and
 - Be alert - if you see a pop-up advising you that your computer is infected, be suspicious.  Don't click on suspicious links. It may be a trap.  Contact your IT professional for assistance.
 
If you do find yourself victim to a Ransomware attack, contact your IT professional immediately.

Meet the 
Seltek Team
 


Wayne Love
is Seltek's Senior Network
Engineer.  He has been with Seltek since 2012 and formerly served  as Director of Operations.  Prior to joining Seltek, Wayne was Owner and Certified Technician for Computer Medics of Richmond. He  has a B.S. degree in Information Technology from Western Governors University. Wayne says one of the best things about current technology is that his ten-year-old son can play Xbox games with his
cousin in Texas in real time.



Safe Technology Habits While On Vacation 
by Kara Mueller
IT Support Specialist & Certified Computer Examiner
 

Warmer weather means vacation season is right around the corner. While it's refreshing to disconnect from the virtual world, it can also be difficult to let go of work, e-mail and social media. Therefore, it's important to be smart and safeguard your information when using technology on vacation. Whether you're a business professional, retiree or a student out of school for the summer, check out these tips for safely using technology while away from home. 
 
Public Computers
 
Publicly-accessible computers are everywhere. Libraries, Internet cafes, copy shops and even hotel business centers have public computers where you can check e-mail, browse the Internet and print documents. Unfortunately, many of these public computers might put your data at risk. It's almost impossible to know how secure that computer is. Who used it before you? What information is the computer collecting about those who use it? Is there software running that collects keystrokes or screenshots periodically without your knowledge?
 
While some public computers might be safe to use, it is certainly better to be cautious. Do not use a public computer unless absolutely necessary. If you choose to use a public computer, implement the following precautions:

-  Never enter sensitive information (credit card, name, home address, etc). This means do not visit banking sites, Paypal, online shopping, etc.
-  Do not enter login information (username/password) on a public computer. This includes e-mail. 
-  If you do visit a public computer and are required to enter login information, change your password as soon as possible on a secure home computer that you know to be safe.
 
Only use public computers for casual browsing or not at all. Save sensitive work for home.

Social Media
 
There have been reports of burglars using social media to determine when a homeowner is away from home. In September 2010 , for example, over 50 robberies took place in Nashua, New Hampshire. After the thieves were caught, it was determined that they chose homes of travelers who were posting to Facebook while away from home on vacation .  

Here are a few recommendations, including some tips from Nationwide to avoid such scenarios:

-  Wait until you return home to brag about your vacation.

-  Do not post pictures of expensive purchases or cash.

-  Do not post photos of boarding passes which contain personal tracking information.

-  Use your privacy settings to prevent "tagged" photos and posts from automatically appearing on your timeline. Wait to approve them after you return from vacation.  

-  Check your privacy settings on Facebook, Twitter, Foursquare, etc. Are your posts easily accessible to people you don't know?

-  Do not grant "friend" access to people you don't already know and trust.

-  Avoid posting vacation or travel plans, and ensure your children and family members take the same precautions.

-  Avoid revealing hashtags, location check-ins and photos that include geographic location information (geotagging).

 
Public Wi-Fi
 
If you are using your own computer or tablet to connect to an open Wi-Fi hotspot, like at Starbucks or the airport, take the same precautions to protect yourself just as you would when using a public computer. 
 
When using public Wi-Fi, also be mindful of the following:
 
-  Don't access or send sensitive information over the Internet.

-  Be careful to which Wi-Fi hotspot you connect. If you are not sure which hotspot belongs to the building or business you are visiting, ask. 

-  Ensure your virus protection is working and your firewall is activated.

-  Choose secure connections to webpages whenever possible. Look for the padlock icon in your browser window along with the letters "https" at the front of the web address. When you see these, it means the information you enter will be sent securely to the website. Do not log into any websites over Wi-Fi that don't start with "https."

 
Better Safe Than Sorry
 
It is hopeful that you will be able to disconnect from the virtual world while on vacation. However, most of us are unable to fully do that. Therefore, it is smart to be safe when using the Internet in unfamiliar places. Keep these tips in mind when you travel and hopefully you will have a hassle-free, relaxing trip.
 

Seltek | 804-360-4490 x20 | [email protected] | http://www.seltekinc.com
8814 Fargo Road
Suite 201
Richmond, VA 23229