Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried--cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give Professional Computer Associates a call at 845-876-6561 today.

Tip of the Week: How To Enable Flash In Google Chr...
Comparing Cost and Control Between In-House Archit...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Managed IT Services Malware Hosted Solutions Disaster Recovery Google Microsoft VoIP Business Software Business Continuity Mobile Devices Outsourced IT Productivity Email Windows 10 Data Internet Smartphones Efficiency communications IT Support Computer Hardware Innovation Cybercrime Ransomware Office Android Data Backup Server Alert IT Services Browser Telephone Systems Windows Computers Small Business Saving Money Business Management User Tips Mobile Device Management Quick Tips Social Engineering Chrome Upgrade BDR BYOD Microsoft Office Hacking Collaboration Holiday Office Tips Smartphone Social Media Miscellaneous Managed IT Passwords Workplace Tips Cybersecurity App Cloud Computing How To Save Money Firewall Data Recovery Virtualization Mobility Law Enforcement Work/Life Balance Network Avoiding Downtime Recovery Health Information Technology Facebook Productivity Private Cloud Operating System Office 365 Bring Your Own Device Budget Two-factor Authentication Managed Service Provider Password Communication Proactive IT Money Flexibility Wi-Fi HaaS Bandwidth Data Breach Redundancy Managed IT Services Remote Monitoring Gadgets Gmail Data Management Black Market Windows 10 Artificial Intelligence Internet of Things Google Drive User Error Marketing Value SaaS Phishing Spam Router Risk Management Automation Compliance Employer-Employee Relationship Safety Public Cloud Content Filtering Remote Computing Applications Meetings Charger Data Storage Wireless Technology Wireless Workers Apple Business Intelligence Solid State Drive Identity Theft Hiring/Firing Computing Infrastructure Computer Care Credit Cards Physical Security Mobile Computing Settings Samsung IT Management Patch Management OneNote Business Owner Word Keyboard Cleaning Entertainment Downtime Scam History Unsupported Software Save Time Wearable Technology Best Practice Shadow IT Data storage Government Worker Automobile End of Support Data Security Internet Exlporer Apps Spam Blocking VPN Battery The Internet of Things DDoS Mobile Device Vulnerability Google Docs Vendor Management Cast NarrowBand Audiobook Wireless Charging Distributed Denial of Service Telecommuting WiFi Excel Audit Start Menu Reputation Website Files Politics Hard Drives Fiber-Optic Remote Work Hybrid Cloud Networking Tip of the week Big Data Video Games Computer Fan Users Mobile Customer Electronic Medical Records Voice over Internet Protocol Colocation Unified Threat Management Chromecast Knowledge Cables Mouse PDF IBM Windows Server 2008 Books Scalability FENG Virtual Reality eWaste Professional Services Multi-Factor Security Data Warehousing HIPAA Network Congestion Unified Communications Supercomputer Windows 7 Emergency Emails Uninterrupted Power Supply Instant Messaging Employer Employee Relationship Worker Commute Lithium-ion battery Environment Tools Trending hacker Running Cable Theft Search Streaming Media Fraud Current Events Regulations Computer Accessories Cortana Lifestyle IT Plan IT Consultant How to Amazon SharePoint Bluetooth Document Management Encryption Botnet Google Apps Data Protection Loyalty Going Green Experience Leadership Techology Tech Support Amazon Web Services Servers Robot Transportation Netflix People Relocation Root Cause Analysis Notifications Travel Infrastructure Comparison Fax Server Software Tips Laptop Music Online Shopping Flash Benefits Mobile Office IaaS Password Manager Specifications IT solutions Assessment Touchpad USB webinar Evernote Sync Outlook Smart Technology Rootkit Data loss YouTube Software as a Service Millennials Internet exploMicrosoft Television HBO Troubleshooting Conferencing Legal Telephony Humor Windows 10s iPhone Training Screen Mirroring Content Antivirus Update Workforce Advertising Public Computer Frequently Asked Questions Hosted Solution IT Support Sports Education Skype Monitor Two Factor Authentication Thank You Congratulations Webinar Administration IT solutions CrashOverride Business Mangement Recycling

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!