Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Don’t Take the Facebook Lollipop

A new Facebook app has been circulating the web just in time for Halloween, and it’s offering a spooky reminder of how susceptible our Internet security is these days.

The app is among the most sophisticated to appear on Facebook. A blue lollipop with a razor inside it greets users. “Connect to Facebook” reads the button beneath it. Next comes the usual permission request that asks users to grant access to their private information, in other words, to put Internet security aside. A few seconds later, a video begins to play. The scene opens to a dark, musty looking corridor with creepy music playing in the background. A dirty, sweaty man sits behind an ancient computer. He logs into Facebook, but what shows up on the screen is not his account. It’s yours.

For the next minute or so, he clicks through your photos and reads your actual wall posts as he appears to be tormented by some kind of rage, anger, or jealousy. Before long, he types in your location, pulls up an online map, and heads to his car. He’s coming for you.

The scariest part of the video is that the crazed man out to get you doesn’t hack into a network service in order to breach your Internet security. Nor is he even part of your immediate network. He has access to your information because it’s all public. Even when you think you’re protecting your Internet security by adjusting your privacy settings, “Take This Lollipop” is an example of how we frequently opt out of maintaining high Internet security to allow apps Facebook access. Every time we allow an app access to our information, we are essentially signing a waiver to allow our Internet security to be breached.

To generate the video, users need to access it from an external website that connects to Facebook. This shows that Internet security problems extend past internal Facebook apps, especially since we now regularly link Facebook to external websites. We also access it through a variety of network services. In fact, threats to Internet security don’t even need advanced network services anymore. Even a creepy stalker in a basement that shows no evidence of a sophisticated network service can access your private information.

As Wi-Fi and 4G become standard in so many devices, accessing Facebook has become a right, not a privilege. We now expect to find Facebook embedded into smartphones and tablets. The increased reliance on Facebook for even the most basic communication brings with it a heightened threat to our Internet security.

The name of the app is in itself a message against the dangers of careless Internet security practices. Allowing Facebook apps to access your account may not be a primary threat to your network services the way virus are, but it is still a major threat to your personal and Internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for the Phishing Bait

Sometimes, ensuring strong Internet security depends on more than just a secure home or office network service or even a strong anti-virus program. Sometimes, strong Internet security depends on human vigilance, not just firewalls and virus software. This is because phishing, which is one of the most common threats to casual users’ Internet security, can occur even in the most secure network service. Though some Internet security programs or email features can prevent phishing, for example, it still poses a stealthy threat, since it relies on human naiveté.

Phishing is the attempt to breach Internet security and steal your passwords, usernames, and other information by tricking you into giving them up in some form or another. According to Wikipedia, the term “phishing” relates to the idea of falling for bait, the way fish do. So hackers and cybercriminals trying to compromise your privacy via your network service are metaphorically fishing along the river of network services for your information.

Phony or fraudulent emails that try to lure users into giving out their passwords are a common phishing technique. Phishing emails can look like they’re from a bank, a business, or even a government agency. Some emails present users with a phony story and ask them to respond with information that can be used to target their private online accounts.

Phishing emails are getting increasingly sophisticated, which makes them an even bigger threat to Internet security. Because some emails still reach our inboxes, it is important to look for the warning signs. These include poorly written emails with obvious typos or nonsensical information. Also, vague emails that don’t include any specific information about their recipient are usually scams. For example, an email from a financial institution that start with “Dear Customer” instead or your name is clearly trying to breach your Internet security.

Cybercriminals also try to trick users to log into a webpage that looks like an authentic page that actually records the submitted data and exploits it. Even when using a trusted network service, you could be susceptible to this form of phishing. If your Facebook or email login page looks subtly different, be cautious before you enter your username and password as it might be an Internet security scam.

Stay on the lookout for small details that predict phishing scams and threats to your network service like typos, vagueness, unprofessional appearance and tone, sloppy design, and nonsensical requests. But remember that threats to your Internet security aren’t always obvious—many are sophisticated. Change your password often as a regular means of protecting your network service and Internet security. Most importantly, remember that phishing doesn’t force you to give out your information; it tricks you, so don’t fall for the bait.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Ignorance is not Bliss When it Comes to Viruses

Computer viruses and virus removal can cost you more than just time and money; they can cost you valuable data or even a physical hard drive. The problem is that we’re often careless when it comes to getting the right kind of protection against computer viruses. In fact, even after we suspect that some kind of malware has infected our device, we often put off virus removal either because we think it’s not necessary or because we think it’s too much work. Well, both approaches are wrong.

If your device is infected with malware, letting the virus just sit there should never be an option. You should start virus removal immediately. The longer you wait before getting virus removal, the longer your private data is subjected to risks. Additionally, with many viruses, delaying getting virus removal allows them time to brew, so to speak. Think of computer diseases the same way you think of human diseases.

First, this means that prevention is the best cure. So protect your device with the right kind of anti-virus software to avoid the need for virus removal in the first place. Secondly, if your machine does get a virus or malware, don’t wait and be aggressive with your removal efforts. Seek out a virus removal specialist to avoid the risks of amateurish virus removal efforts. This is especially important if you’re worried about the data on your machine. Data recovery can be complicated and expensive, and it can be made worse by poor virus removal techniques.

A crude way of handling virus removal is erasing the entire hard drive and reinstalling Windows. Though his amateurish method of virus removal is relatively easy, it usually means that your data will be lost and that you’ll need a professional data recovery service. One way of avoiding this hassle is backing up your data regularly using a secure service like that offered by Rescuecom.

Getting professional virus removal can make data recovery efforts much easier as professionals can target the threats to your computer while protecting your data. Instead of having to pay for virus removal and data recovery, be cautious, and protect your device to avoid viruses. When you do get them, get them off as soon as possible.

Remember, viruses are not only a threat to your privacy and security; they are also a threat to your valuable data, since they can erase or damage it. In some cases, viruses can damage a hard drive so badly that extensive and complicated data recovery is the only solution left. In fact, sometimes even the most advanced data recovery efforts fail.

Given the risks to your data and to your wallet, the best way to avoid needing extensive data recovery efforts and complicated virus removal services, it is best to stay protected and vigilant. Don’t let viruses destroy your device just because you can’t see any imminent harm. This is one case where ignorance is certainly not bliss.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


51-60 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending