Back to Top

Tech, Web, Cloud & Cabling Services

Category: Internet Security

BigBeagle.com / Internet Security Category

The 18 scariest computer viruses of all time

virus

 

Anna Kournikova (2001)

The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a big pop culture impact: It became a plot point in a 2002 episode of the sitcom Friends.

Sasser (2004)

In April 2004, Microsoft issued a patch for a vulnerability in Windows’ Local Security Authority Subsystem Service (LSASS). Shortly after, a teenager in Germany released the Sasser worm to exploit the vulnerability in unpatched machines. Multiple variants of Sasser took out airline, public transportation, and hospital networks, causing $18 billion in damage.

Skulls.A (2004)

The Skulls.A is a legitimately spooky mobile trojan that affected the Nokia 7610 smartphone and other SymbOS devices. The malware was designed to change all icons on infected phones to Jolly Rogers and disable all phone functions, save for making and receiving calls.

F-Secure says Skulls.A caused little damage, but the trojan is undeniably creepy.

Zeus (2009)

While many malware programs on this list are little more than nuisances, Zeus (AKA Zbot) was a tool used by a complex criminal enterprise.

The trojan uses phishing and keylogging to steal online banking credentials, draining a cumulative $70 million from the accounts of its victims.

Melissa (1999)

Named after a Florida stripper, the Melissa virus was designed to propagate by sending itself to the first 50 contacts in its victims’ e-mail Outlook address book. The attack was so successful that the virus infected 20 percent of the world’s computers, causing an estimated $80 million in damage.

Virus creator David L. Smith (shown) was caught by the FBI, served 20 months in jail, and paid a $5,000 fine.

Sircam (2001)

Like many early malware scripts, Sircam used social engineering to trick people into opening an email attachment.

The worm chooses a random Microsoft Office file on victims’ computers, infects it, and sends it to all the people in the victims’ email contact list. A University of Florida study pegged Sircam cleanup costs at $3 billion.

Stuxnet (2009)

Stuxnet is one of the first known viruses created for cyberwarfare. Created in a joint effort between Israel and the U.S., Stuxnet targeted nuclear enrichment systems in Iran.

Infected computers instructed nuclear centrifuges to physically spin until they broke, all while providing fake feedback that operations were normal.

SQL Slammer/Sapphire (2003)

Taking up just 376 bytes, the SQL Slammer worm packed a lot of destruction into a tiny package. The worm slowed down the Internet, disabled 911 call centers, took down 12,000 Bank of America ATMs, and caused much of South Korea to go offline. It also crashed the network at Ohio’s Davis-Besse nuclear power plant.

Storm Trojan (2007)

Storm Trojan is a particularly sinister piece of email-distributed malware that accounted for 8 percent of all global infections just three days after its January 2007 launch.

The trojan created a massive botnet of between 1 and 10 million computers, and because it was designed to change its packing code every 10 minutes, Storm Trojan proved incredibly resilient.

Code Red (2001)

The Code Red worm, named after the Mountain Dew flavor preferred by its creators, infected up to one-third of all Microsoft ISS web servers upon release.

It even took down whitehouse.gov, replacing its homepage with a “Hacked by Chinese!” message. Estimated damages due to Code Red were in the billions of dollars worldwide.

Nimda (2001)

Released just after the 9/11 attack, many thought the devastating Nimda worm had an Al Qaeda connection (never proven).

It spread via multiple vectors, bringing down banking networks, federal courts and other key computer systems. Cleanup costs for Nimda exceeded $500 million in the first few days alone.

ILOVEYOU (2000)

The ILOVEYOU worm, AKA Love Letter, disguised itself in email inboxes as a text file from an admirer.

But this Love Letter was anything but sweet: In May 2000, it quickly spread to 10 percent of all Internet-connected computers, leading the CIA to shut down its own email servers to prevent its further spread. Estimated damages were $15 billion.

Cryptolocker (2014)

Computers infected with Cryptolocker have important files on their hard drives encrypted and held at ransom. Those who pay approximately $300 in bitcoin to the hackers are given access to the encryption key; those who fail to pay have their data deleted forever.

Netsky (2004)

The Netsky worm, created by the same teen who made Sasser, made its way around the world by way of email attachments. The P variant of Netsky was the most widespread worm in the world even more than two years after its February 2004 launch.

Conficker (2008)

The Conficker worm (AKA Downup, Downadup, Kido), first detected in December 2008, was designed to disable infected computers’ anti-virus programs and block autoupdates that may otherwise remove it from computers.

Conficker quickly spread to numerous important computer networks, including those of the English, French, and German armed forces, causing $9 billion in damage.

Michaelangelo (1992)

The Michelangelo virus itself spread to relatively few computers and caused little real damage. But the concept of a computer virus set to “detonate” on March 6, 1992 caused a media-fueled mass hysteria, with many afraid to operate their PCs even on anniversaries of the date.

Sobig.F (2003)

The Sobig.F trojan infected an estimated 2 million PCs in 2003, grounding Air Canada flights and causing slowdowns across computer networks worldwide. This tricky bug-in-disguise cost $37.1 billion to clean up, making it one of the most expensive malware recovery efforts in history.

MyDoom (2004)

In September 2004, TechRepublic called MyDoom “the worst virus outbreak ever,” and it’s no surprise why. The worm increased the average page load time on the Internet by 50 percent, blocked infected computers’ access to anti-virus sites, and launched a denial-of-service attack on computing giant Microsoft.

The worldwide costs associated with cleanup of MyDoom is estimated to be just shy of $40 billion.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft will let you unlock Windows 10 with your face

Hello
With a quick glance at your Windows 10 laptop, you’ll be able to unlock it — without entering a password.

Microsoft introduced the latest new feature for Windows 10, called Windows Hello. The security tool will let you access your PC through facial recognition, an iris scan or a read of your fingerprint.

But before you get ready for your closeup, you’ll need get some special equipment — most PCs don’t come with biometric scanners installed (though some do). Windows Hello is primarily targeted at businesses and government agencies.

Microsoft opted not to rely on your webcam for facial recognition because the photos it captures are not terribly secure, and they’re easy to spoof. Instead, Microsoft got infrared cameras to do facial recognition for Windows Hello.

Facial recognition is possible on a low-grade camera. Google allows its Android phones to be unlocked with facial recognition, but the company warns that someone with a photo of you — or even someone who looks like you — will be able to unlock your phone too.

With the proper tools, faces, irises and fingerprints are possible to spoof, but it’s not easy — someone’s got to really want to break in to your PC to go through the trouble.

Microsoft opted for more robust security in Windows 10, because it wants to meet strict standards that companies and government agencies impose for secure logins. Microsoft said Windows Hello has a 1 in 100,000 false accept rate, which is very high. It’s a lot safer than a password, which, as we know, can easily be forgotten, lost, stolen or hacked.

Though it’s not necessarily aimed at the average PC buyer, consumers will be able to use the Windows Hello feature too.

Microsoft promised “plenty of exciting new Windows 10 devices to choose from which will support Windows Hello.” And if your PC already has a fingerprint reader, you’ll be able to login with a fingerprint scan.

Passport: Windows 10 will also support another new security feature, codenamed “Passport,” which lets you login to participating websites, apps or networks without a password. Microsoft said the list of sites and apps that support Passport is growing, but it didn’t say how many participate.

Microsoft is trying to position Passport as the end of passwords. Since you never enter a password to enter a website, “there is no shared password stored on their servers for a hacker to potentially compromise,” says Microsoft boldly in its press release.

But that’s not quite true. Passwords will still exist. Even if you can login to your email via Passport from your work PC, you’ll still need a password to login from your iPad. So passwords aren’t going away anytime soon — and they’ll still be stored on email providers’ servers, which means hackers could potentially still grab them in a cyberattack.

The primary way that Passport ensures that you’re you is through Windows Hello. Oddly, however, you can also enter a PIN into Passport, which is significantly less secure than a password.

Still, it’s about time that something replaces passwords, and Hello and Passport are good starts.

Have questions?

Get answers from Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10 & network share access denied – Solution

Network Share access denial is another issue that users are facing with Windows 10.

Recent upgrade to Windows 10 all of a sudden makes network share no longer accessible on Windows machines you may have in your environment.

Here is the tutorial that solves the issue.

Problem

This is what you see when you try to go to any \\something network share:

\\something is not accessible. You might not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. The account is not authorized to log in from this station.

open folder

There’s some changes in the Windows 10 internals which results in the access denial. The new build does not allow anonymous (guest) access to shares by default, as a security measure.It can be resolved by creating a new registry key in the right hive and rebooting.

Solution

Fire up the registry editor (regedit). Navigate to:

Registry editor

Here, you will need to create a new parameter (32-bit DWORD). Right-click:

Parameter

Then, name it AllowInsecureGuestAuth and assign it a value of 1.

DWORD

The hive should look thusly:

Registry Editor

And you’re done. Reboot, and enjoy your network access.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows 10’s features

The new Windows 10 notifications will follow you everywhere

Windows 10 has a new notifications center for your apps — even the ones from your Windows Phone.

When you’re poking around Windows 10, you’ll notice something new: A small taskbar button that, when clicked, reveals a sidebar full of app notifications.

Welcome to the new notifications center, which is basically the Windows 10 version of the Action center in Windows Phone 8.1. The notifications center is part of Microsoft’s dream of “Windows everywhere” — it’s a universal notifications center that will pop up your app notifications across multiple platforms. Because who doesn’t want to be alerted about new Twitter followers on their phone, tablet, and now PC?

The new notifications center consists of two parts: The notifications area at the top, and the “quick actions” bar at the bottom. In the notifications area you’ll see notifications from various apps, including Twitter, Facebook, and your email account, as well as notifications from phone apps (e.g. alarms) if applicable.


Mouse over notifications and click the ‘X’ to dismiss them.

You can dismiss notifications three different ways: You can mouse over the app name (e.g. Twitter) and click the ‘X’ next to it to dismiss all notifications from that app. You can also mouse over each individual notification and click the ‘X’ next to it to dismiss that specific notification. Or you can click Clear All in the upper right corner of the notifications center to dismiss all notifications from all apps. Because this is a “Windows everywhere” feature, notifications you dismiss in the notifications center will also be dismissed on your other Windows devices, such as your phone.

In the quick actions bar, you’ll see four quick-access buttons as well as an Expand link. Click Expand to see all quick actions. Actions include things like a Tablet Mode toggle button, a link to the Display settings, a link to all settings, and toggle buttons for Location and Wi-Fi. Tap a quick action button to toggle a setting (tablet mode, location, Wi-Fi) on or off, or to go directly to the settings menu so you can configure your display, connection, or VPN.

x4
Pick your quick access quick actions from the Settings menu.

To choose which quick actions appear above the break, go to Settings > Notifications & actions > Choose your quick actions. Here, you’ll see four small buttons that you can click on to swap out actions. If you’d prefer to have your Wi-Fi toggle on hand whenever you open the notifications bar, you can switch it for the Display button. Of course, you’ll always be able to see all of the quick actions by clicking Expand in the notifications bar.

x5
In the Settings menu, you can also choose which apps’ notifications to display.

Here, you can also pick and choose which app notifications you’ll see in the notifications bar. If you want to turn all notifications off, you can simply click the toggle next to Show App Notifications. You’ll no longer see pop-up banner notifications, nor will you see app notifications when you open the notifications center.

If you’d prefer to just turn off notifications for specific apps, you can do that, too — find the app in the list and click its toggle to Off. Next to each app in the list you’ll see a link to Advanced notifications settings for that app. Go into Advanced to turn off specific notifications for that app — either banner notifications (pop-ups in the lower right corner of your screen) or notifications in the notifications center.

Want to turn your clock off? You can do that, too.

In the Notifications & Actions section, you can also clean up your taskbar by clicking “Select which icons to appear in the taskbar” (you can turn on and off things like the Network icon and the Volume icon), or by clicking “Turn system icons on or off.” In “Turn system icons on or off,” you can turn off the clock, input indicator or action center — in other words, you can turn off all system tray icons and have a completely icon-less system tray, if you so choose.

Have questions?

Want to get Windows 10?

Contact Our Expert IT business team
Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Hello World: Windows 10 Available on July 29

billionphotos-1856284

From today, Windows users will be able to reserve their upgrade to the new operating system, which has seen its icons revamped by Microsoft.

Microsoft’s next operating system will be available for PCs and tablets from 29th July – with existing Windows users able to reserve their upgrade from today.

Windows 10 will be available both on new PCs and as a free upgrade for those running Windows 7 and 8.1. Owners of these operating systems will see a Windows icon in their taskbar that will allow them to “reserve” their upgrade. The 3GB file can be downloaded from 29th July.

The free upgrade will be available until July next year and those choosing to switch to Windows 10 can cancel their reservations at “at any time”, according to Microsoft.

While Windows 7 Enterprise, Windows 8/8.1 Enterprise and Windows RT/RT 8.1 releases can’t be upgraded in this way, Microsoft has said that “Active Software Assurance customers in volume licensing” will be able to “upgrade to Windows 10 enterprise offerings outside of this offer”. Microsoft are yet to clarify when users of Enterprise versions of Windows will be able to move to Windows 10 Enterprise.

Microsoft is betting Windows 10 will win over users with its ability to run on a variety of platforms, allowing users to use the same cloud services and software as they swap between fixed and mobile computers.

“We designed Windows 10 to run our broadest device family ever, including Windows PCs, Windows tablets, Windows phones, Windows for the Internet of Things, Microsoft Surface Hub, Xbox One and Microsoft HoloLens-all working together to empower you to do great things,” said Terry Myerson, VP of Microsoft’s operating systems group in a blog post.

Features such as Continuum mode will detect when mobile Windows 10 devices are docked with a mouse, keyboard and monitor and reorient the UI to suit – for example switching from tap-friendly tiles to smaller icons suited to a mouse pointer – whileUniversal Apps will tailor their interface to the device they are being used on.

Myerson is keen to stress that “Windows 10 brings back the Start menu” familiar to Windows 7 users, following the backlash against Windows 8’s fullscreen Start menu.

Microsoft is also hoping users will take to Cortana, the built-in virtual assistant that users can talk to in order to set appointments, search for information and answer rudimentary queries, and which should become more capable as it learns more about you.

Windows 10 will include the free anti-malware software Windows Defender, which will have free updates for the lifetime of the OS, as well as its new faster and more capable Edge web browser.

While the operating system will launch on PCs and tablets in July, it is expected tolaunch on phones, small tablets, Xbox, and Hololens at unspecified later dates.

Microsoft said it had refined the OS using feedback from more than four million Windows Insiders testing early builds of the OS.

The firm revealed a new, or at least slightly tweaked, look for Windows 10, in its latest Build 10130, which has just been made available via the Windows Insider programme.

The update overhauls the rather plain icons present in earlier builds and replaces them with what Microsoft describes as “more modern and lightweight” alternatives. The revamp means that app icons will also be more consistent between desktop and mobile in apps such as Word and Excel.

While the new icons may not look vastly different, Microsoft said extensive work had gone into the redesign.

“Between the legacy aero-style icons and new app icons, several thousand icons were designed and redesigned. We explored Swiss graphic design, Dutch product design, and modern architecture (among other design fields and styles) to inform and inspire the design process. The icon evolution will continue as we push more consistency and better functionality,” according to a blog post.

Other improvements in the latest build include the ability to customise the Start menu, a new look for Jump Lists on the Taskbar, new swipe shortcuts for Tablet mode, the addition of a Favorites pane and other features to the Edge browser, Taskbar settings for Virtual Desktops, a Cortana keyboard shortcut, Print to PDF feature and fullscreen playback for the Movies & TV app.

Have questions?

Our small business team is here to help.
Call us at: 856-745-9990

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

End of Support for Microsoft Windows Server 2003

end windows server 2003

 

A large number of businesses still run Microsoft MSFT -1.71% Windows Server 2003 and it’s unlikely they all will upgrade before Microsoft Corp. ends support on July 14, 2015, say analysts. Companies that don’t upgrade increase their cyber security risks because the company will no longer issue security updates and these systems will be more vulnerable to hackers.

Businesses worldwide run an estimated 23.8 million physical and virtual instances of Windows Server 2003, according to data released by Microsoft in July 2014. Analysts say the technology is more prevalent in industries such as health care, utilities and government. Yet it’s also still used in about 7% of retail point of sale systems, according to a report Thursday by Trend Micro Inc.4704.TO -1.11%

“Microsoft does not plan to extend support for Windows Server 2003 and encourages customers who currently run Windows Server 2003 and have not yet begun migration planning to do so immediately,” said Vivecka Budden, a Microsoft spokesperson, in an email.

South Jersey Techies offers various migration options to include Windows Server 2012 R2, Microsoft Azure, hosting partners and Office 365.

“It is going to be difficult to get this done in time,” said David Mayer, practice director of Microsoft Solutions at Insight Enterprises Inc.NSIT -1.12%, a provider of IT hardware, software and services.

Many of these same industries were impacted by the end of service for the Windows XP operating system on April 8.  Microsoft broadcasts these sorts of moves years in advance, so it shouldn’t come as a surprise to anyone. But, the product was stable and for many companies there simply wasn’t incentive to update.

“In general, everyone has been slow to migrate, especially those with servers that are running applications,” said Rob Helm, vice president of research at Directions on Microsoft consulting firm.

The problem in industries such as health care and utilities is that companies run legacy apps written by vendors who still require Windows Server 2003. For example, there are smaller vendors in health care that have not kept up with development and application modernization, said a health-care CIO who asked not to be identified. A hospital may have an inventory of 100 to 500 different applications and many applications will still require Windows Server 2003, he added.

Electric utilities, for example, widely use Windows Server 2003. There hasn’t been much movement to upgrade those systems, said Patrick C. Miller, founder of the nonprofit Energy Sector Security Consortium and a managing partner at The Anfield Group, a security consulting firm. Instead, utilities are working to better secure and isolate those systems.

“I’m concerned about directory services such as application authentication and user permissions,” said Mr. Miller. “If you compromise an Active Directory server, you get access to everything.”

For now, analysts are recommending that companies work out their risk of exposure and make plans to first migrate those applications that will be most difficult. Companies should make plans to harden servers that can’t be updated. That might entail putting those systems on an isolated network, where they’d be less prone to outside attack, said Mr. Helm.

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.

 

Chrome is marking all HTTP sites as ‘not secure’

Google sends a nudge toward the unencrypted web

Starting in July, Google Chrome marked all HTTP sites as “not secure,” according to a blog post published today by Chrome security product manager Emily Schechter. Chrome currently displays a neutral information icon, but starting with version 68, the browser is warning users with an extra notification in the address bar. Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign.

Google has been nudging users away from unencrypted sites for years, but this is the most forceful nudge yet. Google search began down-ranking unencrypted sites in 2015, and the following year, the Chrome team instituted a similar warning for unencrypted password fields.

The Chrome team said the announcement was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and a strong majority of Chrome traffic is already encrypted. “Based on the awesome rate that sites have been migrating to HTTPS and the strong trajectory through this year,” Schechter said, “we think that in July the balance was tipped enough so that we can mark all HTTP sites.”

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one in the middle can tamper with the traffic or spy on what you’re doing. Without that encryption, someone with access to your router or ISP could intercept information sent to websites or inject malware into otherwise legitimate pages.

HTTPS has also become much easier to implement through automated services like Let’s Encrypt, giving sites even less of an excuse not to adopt it. As part of the same post, Google pointed to its own Lighthouse tool, which includes tools for migrating a website to HTTPS.

 

Scams that Target Small Businesses and How to Spot Them

Consumers are not the only ones vulnerable to scams.  If you own a small business or are part of a nonprofit organization, you could be open to several different types of cons without even realizing it.

The Federal Trade Commission (FTC) has put together a list of some of the more common scams and posted them on the website along with plenty of resources to help you spot con artists and keep them from taking advantage of you and your business.

“Your best protection? Learn the signs of scams that target businesses,” the FTC says. “Then tell your employees and colleagues what to look for so they can avoid scams.”

From the FTC website:

Fake Invoices

Scammers create phony invoices that look like they’re for products or services your business uses — maybe office or cleaning supplies or domain name registrations. Scammers hope the person who pays your bills will assume the invoices are for things the company actually ordered. Scammers know that when the invoice is for something critical, like keeping your website up and running, you may pay first and ask questions later. Except it’s all fake and if you pay, your money may be gone.

Unordered Office Supplies and Other Products

Someone calls to confirm an existing order of office supplies or other merchandise, verify an address, or offer a free catalog or sample. If you say yes, then comes the surprise — unordered merchandise arrives at your doorstep, followed by high-pressure demands to pay for it. If you don’t pay, the scammer may even play back a tape of the earlier call as “proof” that the order was placed. Keep in mind that if you receive merchandise you didn’t order, you have a legal right to keep it for free.

Directory Listing and Advertising Scams

Con artists try to fool you into paying for nonexistent advertising or a listing in a nonexistent directory. They often pretend to be from the Yellow Pages. They may ask you to provide contact information for a “free” listing or say the call is simply to confirm your information for an existing order. Later, you’ll get a big bill, and the scammers may use details or even a recording of the earlier call to pressure you to pay.

Utility Company Imposter Scams

Scammers pretend to call from a gas, electric, or water company saying your service is about to be interrupted. They want to scare you into believing a late bill must be paid immediately, often with a wire transfer or a reloadable card or gift card. Their timing is often carefully planned to create the greatest urgency — like just before the dinner rush in a restaurant.

Government Agency Imposter Scams

Scammers impersonate government agents, threatening to suspend business licenses, impose fines, or even take legal action if you don’t pay taxes, renew government licenses or registrations, or other fees. Some businesses have been scared into buying workplace compliance posters that are available for free from the U.S. Department of Labor. Others have been tricked into paying to receive nonexistent business grants from fake government programs. Businesses have received letters, often claiming to be from the U.S. Patent and Trademark Office, warning that they’ll lose their trademarks if they don’t pay a fee immediately, or saying that they owe money for additional registration services.

Tech Support Scams

Tech support scams start with a call or an alarming pop-up message pretending to be from a well-known company, telling you there is a problem with your computer security. Their goal is to get your money, access to your computer, or both. They may ask you to pay them to fix a problem you don’t really have, or enroll your business in a nonexistent or useless computer maintenance program. They may even access sensitive data like passwords, customer records, or credit card information.

Social Engineering, Phishing and Ransomware

Cyber scammers can trick employees into giving up confidential or sensitive information, such as passwords or bank information. It often starts with a phishing email, social media contact, or a call that seems to come from a trusted source, such as a supervisor or other senior employee, but creates urgency or fear. Scammers tell employees to wire money or provide access to sensitive company information. Other emails may look like routine password update requests or other automated messages but are actually attempts to steal your information. Scammers also can use malware to lock organizations’ files and hold them for ransom.

Business Promotion and Coaching Scams

Some scammers sell bogus business coaching and internet promotion services. Using fake testimonials, videos, seminar presentations, and telemarketing calls, the scammers falsely promise amazing results and exclusive market research for people who pay their fees. They also may lure you in with low initial costs, only to ask for thousands of dollars later. In reality, the scammers leave budding entrepreneurs without the help they sought and with thousands of dollars of debt.

Changing Online Reviews

Some scammers claim they can replace negative reviews of your product or service, or boost your scores on ratings sites. However, posting fake reviews is illegal. FTC guidelines say endorsements — including reviews — must reflect the honest opinions and experiences of the endorser.

Credit Card Processing and Equipment Leasing Scams

Scammers know that small businesses are looking for ways to reduce costs. Some deceptively promise lower rates for processing credit card transactions, or better deals on equipment leasing. These scammers resort to fine print, half-truths, and flat-out lies to get a business owner’s signature on a contract. Some unscrupulous sales agents ask business owners to sign documents that still have key terms left blank. Don’t do it. Others have been known to change terms after the fact. If a sales person refuses to give you copies of all documents right then and there — or tries to put you off with a promise to send them later — that could be a sign that you’re dealing with a scammer.

Fake Check Scams

Fake check scams happen when a scammer overpays with a check and asks you to wire the extra money to a third party. Scammers always have a good story to explain the overpayment — they’re stuck out of the country, they need you to cover taxes or fees, you’ll need to buy supplies, or something else. By the time the bank discovers you’ve deposited a bad check, the scammer already has the money you sent them, and you’re stuck repaying the bank. This can happen even after the funds are made available in your account and the bank has told you the check has “cleared.”

GoDaddy Hacked, Millions of Sites Down

GoDaddy.com, the largest domain name registrar on the Web, has been taken offline, and a self-proclaimed member of the Anonymous hacktivism collective is taking responsibility.

The administrators of GoDaddy confirmed on Monday that they were suffering from technical issues, which the website TechCrunch reports to be impacting a multitude of websites and their affiliated email accounts that are hosted through the service. Although the company has not discussed the specifics yet, a self-described member of Anonymous says that he or she is responsible, a claim that has not been verified yet.

On Twitter, user @AnonymousOwn3r writes, “the attack is not coming from Anonymous coletive [sic] , the attack it’s coming only from me” and that the the action is being carried out “to test how the cyber security is safe and for more reasons that i can not talk now.”

GoDaddy has tweeted, “We’re aware of the trouble people are having with our site. We’re working on it.”

On Friday, it was reported that the White House is preparing to roll out an cyber security Executive Order that will serve as a surrogate until Congress can come to agreement on a bipartisan legislation to protect America’s computer infrastructure.

Earlier this year, GoDaddy announced that they would be supporting the Stop Online Piracy Act, or SOPA, a controversial legislation that if approved would have greatly changed the US government’s ability to monitor the Internet. The company eventually reversed their stance, but not before a massive protest resulted in many of their clients switching to other domain registrars. The boycott reportedly ended with thousands of GoDaddy’s millions of customers, including Wikipedia, cancelling their accounts.

Founded in 1997, Arizona-based GoDaddy.com is used by millions of customers worldwide, including a large number of small businesses. At 4 p.m. EST, GoDaddy tweeted, “Update: Still working on it, but we’re making progress. Some service has already been restored. Stick with us.”

Other social media accounts affiliated with Anonymous have not confirmed the validity of the alleged culprit’s claim and have largely distanced themselves from the hack. GoDaddy’s 24-hour tech support telephone line has also been inaccessible during the duration of the outage.

Office 365 Exchange Online

 

Work smarter, anywhere, with hosted email for business.

Close-up of an email message with a Policy Tip to help prevent sending sensitive info.

Security and reliability

Exchange Online helps protect your information with advanced capabilities. Anti-malware and anti-spam filtering protect mailboxes. Get a Exchange Online Protection Trial or Office 365 Professional Trial to see how good it works. Data loss prevention capabilities prevent users from mistakenly sending sensitive information to unauthorized people. Globally redundant servers, premier disaster recovery capabilities, and a team of security experts monitoring Exchange Online around the clock safeguard your data. And with a guaranteed 99.9% uptime, financially-backed service level agreement, you can count on your email always being up and running.

Stay in control

Maintain control over your environment while gaining the advantage of hosting your email on Microsoft servers. Manage your organization efficiently with the Exchange admin center, an easy-to-use, web-based interface. Run In-Place eDiscovery across Exchange, SharePoint, and Skype for Business data from a single interface through the eDiscovery Center. With mobile device policies, you can create approved mobile device lists, enforce PIN lock, and remove confidential company data from lost phones. And IT-level phone support is available to you 24 hours a day, 7 days a week.

Close-up of the Preview Results page for a search in Exchange Online.

Close-up of a user’s inbox in Outlook Web App.

Easy to use and maintain

It’s easier than ever to provide your users with the business email they need to stay productive. Automatic patching eliminates the time and effort of maintaining your system. Give your users an In-Place Archive, so they can keep all their important data in one place. And provide them with anywhere access to email, calendar, and contacts on all major browsers and across devices. Integration with Outlook means they’ll enjoy a rich, familiar email experience with offline access.

Have questions?

Our Hosted Cloud Solution team is here to help.

Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

To learn more and how Office 365 Exchange Online can benefit your business please contact South Jersey Techies, LLC. South Jersey Techies, LLC is a certified Small and Midmarket Cloud Solutions Microsoft Partner.

To read this article in its entirety click here.

CALL US NOW!