Prepare for the Scare! What is Scareware?

Don't Hit the Panic ButtonWhen Scareware Strikes

Don’t Hit the Panic Button
When Scareware Strikes

Image courtesy of
Stuart Miles/FreeDigitalPhotos.net

Scareware! What is it? Oxford Dictionaries defines it as:

Malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.

Scareware is not a new concept but it appears to be in vogue again…or “rogue” again…as the case may be. Scareware is also referred to as rogue security software. The key is to understand that it’s fake computer security software, disguised to look legitimate in order to fool you into believing your computer is infected and at risk. The objective, of course, is to get you to pay money for the fake service to remove viruses that don’t really exist. Scareware generates notifications that resemble Windows system messages or warnings that look like they’re from legitimate antivirus or antispyware software, firewall applications, or registry cleaners. The fake security software can look pretty convincing and uses familiar sounding names that seem legitimate, such as:

  • ErrorSafe
  • Virus Shield
  • XP Antivirus
  • Registry Cleaner XP
  • VirusRemover
  • Antivirus
  • WinAntivirus
  • WinFixer
  • DriveCleaner

Once on your machine, scareware can overwhelm you with persistent notifications and fake alerts, which are difficult to close and can reappear quickly. The scareware software will badger you in hopes that you’ll relent and enter your credit card information to purchase the security product to clean the infections — viruses that don’t really exist.

Best Defense
The most effective defense against scareware is a combination of best practices techniques. A good first step is to gather a little knowledge about scareware before it lands on your computer. Expect to get hit with it sooner or later and have a plan for how to react. Doing so can keep you from overreacting when that scary message pops up with a “Security Warning”, “Alert”, or “Update”. Sometimes it’s difficult not to overreact, especially when media hype and news headlines have heightened our awareness and anticipation of an impending malicious computer attack.

Do Not Click
When a scareware popup window appears, DO NOT click on it anywhere. If you panic or react instinctively, you might take hasty actions, like trying to click the “X” on the upper right-hand corner of the window in an attempt to close it. That’s what the scammers want you to do. Often, clicking the “X” not only fails to close the window, but it results in a duplicate windows appearing every time you click. Another possible outcome is called “clickjacking”, which launches your Internet browser and directs you to an unknown website, likely one featuring fake security scan. Finally, clicking the window could simply download rogue security software onto your machine, launching an executable file that could contain an actual virus or other malware. All are good reasons to not click anywhere on a scareware message.

However, if you’ve already done the clicking, try the following:

  • While hovering your mouse over the scareware window located down in your system tray or task bar, right-click and then left-click on “Close”. That doesn’t always work, in which case you’ll need to manually close your Internet browser, as follows:
  • Hold down the “Ctrl” & “Alt” keys simultaneously while pressing the “Del” key. This will open the Task Manager window. From the top left tab (labeled “Applications”) click on the name of the scareware program to highlight it and then click “End Task” to shut it down.

Know Your Antivirus Provider
Hopefully you have an antivirus or Internet security software installed on your computer and it is turned on. (Don’t laugh! You’d be surprised how many people have it but unknowingly aren’t actually using it.) Make sure you know the name of the product you are using, as well as its look, feel, and functionality. That way, when your already-installed legitimate antivirus software notifies you of an infection or security threat, you’ll recognize it and know it’s authentic. Conversely, if a message comes from a program that’s not the one you recognize, you’ll know it’s most likely an imposter, aka scareware.

Keep Your Antivirus Software Updated & Scan Regularly
Once you know your antivirus software, check to make sure it automatically updates with the latest security definitions on a regular basis. If it does, you can be reasonably certain that any popup messages you receive, saying you’re infected, are scare tactics by scareware scams. It never hurts to manually update your antivirus software to retrieve their latest virus definitions, followed by the running of a full system scan.

Anytime a message from a supposed antivirus company claims that only their product can detect and remove a particular infection, run for the hills! That’s an indication of scareware. In that case, whatever you do, don’t cough up any cash.

Keep Software Applications Updated
Be sure to regularly update all of your computer’s other software programs, starting with the operating system. From the Control Panel, ensure the Windows Update is set to download and install updates automatically. Be sure to also update the following software applications:

  • Adobe Reader: Used for reading PDF files.
  • Java: Used for viewing certain websites and pages.
  • Flash Player: Used for videos, ads, and games.

Install a Popup Blocker
To prevent scareware popup windows from tempting or tricking you, install an effective popup blocker program and set it to prevent popups from opening if they are from any websites other than ones you’ve approved. A popup blocker will stop most scareware attacks but some may still get through via other methods, such as Flash Player.

Don’t Download Antivirus Software from a Popup or Email
Go directly to the website of the antivirus service provider to download computer security software. It’s risky to trust a link in a popup or email message, even if it appears to be from a trusted source. There are many convincing look-alikes that are bad news!

Exercise Safe Internet Surfing Practices
Scareware exploits vulnerabilities in code that can be present when viewing PDF files or visiting even a legitimate website. To minimize the opportunities for bad things to happen:

  • Consider using an Internet browser other than Internet Explorer, such as Mozilla Firefox, Apple Safari, or Google Chrome.
  • Do not open attachments or click on links or messages when using social networking sites, like Twitter or Facebook. If you do, be absolutely sure of where they came from and that they are safe.
  • DO NOT automatically click, open, and/or download anything when prompted by a popup window or other message.

 

Under the best of circumstances, the term “scareware” can be used to describe any computer application that is used to prank users by causing anxiety or panic. Sometimes that is the only objective of the scareware, but more often than not, conning you out of your money and/or obtaining your personal information is the goal.

According to some Internet security experts, scareware is actually on the decline. “Ransomware“, may be overtaking it as a threat. Whatever the case, scareware and ransomware both exhibit similar characteristics for infiltrating your machine. And both are bona fide threats to your safe computing.

A little knowledge about, and familiarity with, scareware can help you “Prepare for the Scare!”

If you think you’ve been the victim of a scareware scam, you can file a complaint with the FBI’s Internet Crime Complaint Center.

Related Articles:
Should you be Afraid of Scareware?
Watch out for fake virus alerts

Payment Processor for Scareware Cybercrime Ring Sentenced to 48 Months in Prison
WhatIs.com: scareware

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

5 Things (Spam Emails) to Ignore This Year!

Spam Defined

Learn to Identify and Delete Spam Email
Image courtesy of
Stuart Miles/FreeDigitalPhotos.net

Another year is in the books and a new one has begun. Yeah, I know, it’s hard to believe but here we go! With a new year comes a new To-Do list for wrapping up last year, while checking off the items for kicking off the new year in fine fashion. But rather than add to your list, here are five examples of emails you can ignore all year long!

1. From: Facebook (Security) Team
Subject: You have received a new comment

Don’t fret if you receive an email stating you have deactivated or closed your Facebook account when you know you haven’t. Some indications that these emails are fakes include:

  • The message is sent to an email other than the one you used to create your Facebook account.
  • The message lacks a personal greeting. Instead of addressing you by your name, as listed in your Facebook account, it uses your email address to greet you (i.e., Hi johnny@workemail.com).
  • The email address displayed next to the From name gives it away (i.e., Facebook Security Team [arbitrary@name.com]. NOTE: Even if it does say it’s from @facebook.com, that doesn’t guarantee it’s legit. But if it doesn’t, that’s a dead giveaway that’s it’s fake!).
  • The email includes a call to action like clicking a link within the body of the message (e.g., If this wasn’t you follow the link below: http://www.fakeurl.com).

2. Your Direct Deposit Payments Were Rejected
Do yourself a favor and save a lot of time and energy by ignoring any email you receive that starts out with pathetic writing like,

Please be notified, that your latest Direct Deposit via ACH payment (Int. No. 6478944817996) was rejected, due to your current Direct Deposit software being out of date.

If that’s not enough to cause you to hit the delete button, then do it when the email asks you to,

Please visit the secure section of our website to see the details.

If you still don’t delete it at that point, whatever you do, DO NOT click on the Details link provided in the body of the email. If you’ve read that far in the email, hopefully it’s only because you actually were expecting to receive a direct deposit. Or, as is more frequently the case for most of us, you had scheduled an electronic payment to go out.

3. The Electronic Greeting or E-Card
For the most part, you can ignore the email you receive from the well-meaning friend that warns you of the impending arrival of the worst computer virus ever. These types of emails are recycled and rehashed every year, and quite frankly, are all but worn out! It’s like the gift that keeps on giving. Regifters at the holidays rewrap presents they’ve received in the past and give them to others. Spammers rewrap their emails and send them along with love, like a holiday fruitcake or familiar white elephant gift at the annual holiday party. The message usually keeps with tradition by including a warning from someone’s relative, who supposedly knows a thing or two about these computer things. One version of the message refers to someone’s brother, who is a

very advanced programmer

and

does computer work for a living

and

has a high up status with Microsoft.

This so-called authority warns of a virus that is coming. The message often insists someone has checked with (insert name of preferred antivirus software company) and they have verified that their company is

gearing up for this virus.

The message goes on to say they’ve checked Snopes.com who says it is real. If you receive an email like this, DO proceed cautiously before clicking on or opening an electronic greeting card or other attached file. But do everyone in your contacts list a favor and DON’T

send the message around to all of your contacts ASAP

as the email instructs you to do. DON’T do it even if the email warns that the file will…

burn the whole hard disc C of your computer

or if it claims that…

this is the worst virus announced by CNN.

4. Contests and Giveaways
Don’t forget the adage, If it sounds too good to be true, it probably is. That’s even truer online. When you see a promise that the first (insert number) people to Like or Share a post or a page on Facebook will receive a gift card worth (insert dollar value), don’t waste the effort of lifting your index finger to click or tap. Whether it’s a gift card for a popular electronics store or a prepaid Visa debit card, chances are you’ll be redirected to another website, where you’ll be asked to enter personal information — something you never want to do if you’re interested in protecting your identity. The chances are slim you’ll ever receive a gift card. If you’re still tempted, go directly to the company’s Facebook page or website to verify whether the offers are legitimate.

5. Fake Charities and Fundraisers
Whenever there’s a natural disaster or catastrophe, charities spring into action to help those affected. Unfortunately, the online crooks and scammers mobilize too, preying on people’s compassion and generosity. Beware of requests for donations via text messages, emails, or websites. The con artists are good at tugging at your heartstrings and taking your money, but your money never makes it to your intended party. Verify the validity of any professed charity or fundraiser on your own. Initiate your own search online to find organizations and their websites. Donate directly to a charity like the American Red Cross or United Way by visiting their website. When in doubt, use reputable resources like The Better Business Bureau’s Wise Giving Alliance, The Federal Trade Commission, and Charity Navigator.

Knowing the signs of scam and spam emails can help you to quickly identify ’em, ignore ’em, and better yet, delete ’em.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

StopSign Internet Security Now Powered by GFI Software’s VIPRE Client SDK

eAcceleration™ Corp., makers of StopSign™ Internet Security software, and GFI Software™, have entered into a licensing agreement to further enhance the StopSign web protection software suite using the VIPRE™ Client SDK.

eAcceleration had been looking to update its software to improve their customers’ protection against the rise of malware, and in the end GFI’s software was the clear winner. Leading the software team to evaluate all options, Josh Lizon, Director of Software Development at eAcceleration said,

We evaluated several threat engines using a standardized criteria and found that the GFI engine provides the best balance of detection and removal of threats combined with a small memory footprint and lightning fast scan speeds.

Ed Ahrens, eAcceleration CFO, said this about the licensing agreement between GFI Software and eAcceleration Corp.:

We are extremely pleased to announce our new alliance with GFI Software to utilize their award-winning threat scanner. With this major upgrade to StopSign, it will be hard to find a more effective and robust security product.

We understand the vital role that anti-malware plays in this particular era of cyber security, and with the latest version of our SDK we offer the most cutting-edge security technologies we have to companies like eAcceleration so they can make the security of their software automatic, effective and also provide peace of mind to their customers.

Said Julian Waits, vice president of GFI Software’s Advanced Technology Group.

About eAcceleration Corp.
eAcceleration Corp. has developed and distributed innovative computer software for business and personal computers since 1987. The company started in Silicon Valley, California as an SCSI Device software company. The company’s SCSI Device Management System (SDMS), purchased by NCR™ Corporation/AT&T™, became the standard SCSI Device Management System used in computers around the world. eAcceleration also developed a unique set of accelerator tools for CD-ROM and hard drive applications including “dTime”, “SuperFassst!”, “Webcelerator”, and “Windrenalin HD”.
Today, eAcceleration Corp. is headquartered in Poulsbo, Washington and is the developer of StopSign Internet Security, an online subscription service featuring award-winning computer protection in an easy-to-use interface.

About StopSign Internet Security
StopSign Internet Security software has been at the forefront of anti-virus, anti-spyware, and firewall protection since it first launched in 2001. Boasting a world-class, 100% US-based call center, StopSign technical support is available via email, online chat, and phone. StopSign virus protection software has been downloaded by over 6 million people worldwide.

About GFI
GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized businesses (SMB) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold ISV Partner.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Are You Raising a Cyberbully?

Cyberbully


Cyberbullies Can Strike Anywhere
There’s Digital Media
Image courtesy of Grant Cochrane/FreeDigitalPhotos.net

If you have a preadolescent, moody, hormonal kid, also known as a teenager, pre-teen, or “tween”, you should be aware of cyberbullying. In our digital, mobile, and social world, cyberbullying is a very real issue and a concern for parents.  Cyberbullying is much more than just a modern version of the good-old-fashioned schoolyard bullying.  In general, “cyberbullying” is the term used to describe online activities between minors that can range anywhere from text messages of a teasing nature, to digital harassment, and even threats of physical harm.  Usually it’s deliberate and repeated behavior with the intent of causing physical, psychological, or emotional harm to the victim by way of computers and cell phones.

“Egads!” One more thing for parents to worry about! As if there aren’t already plenty of social minefields that parents need to help Junior traverse during his teenage-angst years, now it’s necessary to know how to recognize when he may be the victim of a digital bully?

Indeed! And it’s precisely that picture parents typically associate with cyberbullying — protecting their little angel from the harm of online meanies.  Most parents are working hard to raise a “good” kid, who’s kind and considerate of others. But all kids, even good ones, make mistakes and bad choices. They need our guidance. It’s important for parents to realize that a child is just as likely to be the cyberbully as they are to be the victim of one. Parents need to be aware of this possibility, even as heartbreaking and devastating as it could be to learn that your kid is the one behaving badly. Sometimes the child has no clue their actions could be classified as cyberbullying. Kids can also switch between roles, from victim to bully and back again, as part of a digital exchange.  Whatever the case, parents need to address the issue head-on and not wait for it to just go away.

It’s anyone’s guess why your offspring might get caught up in the role of the cyberbully. Surely contributing factors are the ubiquitous and oh-so-easy-to-use digital toys of today, which make for an abundance of opportunity. Because communications are merely typed online and not face-to-face, kids can feel less encumbered, making them much more likely to write shocking or mean things they wouldn’t ordinarily say in person. The writer feels a sense of detachment and anonymity, making the comments seem not so personal.

But why would any kid, especially your child, bully another online, regardless of ease and opportunity? The reasons are many and varied:

  • Attention – Looking for laughs , trying to be funny or look “cool.” Attempting to elicit some sort of reaction from the intended target or onlookers.
  • Power-Hungry – Harassing others is a cheap and easy way for a kid to boost their ego.
  • Mob Mentality – It’s easy to pile on or be a “me too” when you can get lost in the crowd. It’s safer, especially if a kid knows the behavior is questionable in first place.
  • Mean Girls – It’s a way for kids to establish or improve their social standing in a group or clique. Reinforces the cyberbully’s place in social circles.
  • Entertainment – It could be as simple as boredom. Too much time on their hands, not enough to do, and too many tech toys available to them.
  • Revenge, Frustration, or Anger – It can start as “vigilante justice” defending themselves from bullies or standing up for others.
  • Vicarious Tough Guy – It’s an easy way to be the tough guy or gal.
  • Accident – Let’s face it, a kid could mistakenly send a message to the wrong recipient or not think something through before they sent it.

So what are the signs that a child might be doing the cyberbullying?

  •  Uses several online accounts or ones that are not their own.
  • Avoids talking about their online activities or what they’re doing on the computer.
  • Quickly switches screens, minimizes windows, or closes programs when someone approaches or walks by.
  • Appears to always want to hide their cell phone or computer from you.
  • Uses the computer excessively or late at night.
  • Becomes angry, upset, or irritated when they’re denied use of a computer, cell phone, or mobile device.
  • Displays increased levels of aggression.
  • Is unwilling to accept responsibility for their behavior.
  • Laughs excessively while using the computer or other electronic devices.

What’s a parent to do if and when they discover their child is a cyberbully?  Do you use the old potty training for dogs technique of rubbing their nose in it by cyberbullying your own child? Although that might teach them empathy for the cyberbully victim, it’s probably not the most constructive method. Besides, if two wrongs ever do make a right, this probably isn’t the time. Try the following:

  • Talk to your kids about the power of words and how damaging and hurtful they can truly be.
  • Talk to your child firmly about his or her actions and explain the negative impact it has on others.
  • Force your child to really reflect on what they did, why they did it, giving serious thought to what the actual impact was on their victim.
  • Try to find out if they themselves have ever been bullied.
  • Require your child to do research on cyberbullying and the long-term damage and trauma it can cause people.
  • Consider restricting your child’s cell phone and Internet privileges until behavior improves and then monitor their activities closely. Remind your child that the use of cell phones and computers is a privilege.
  • Consulting with your child’s teachers, guidance counselors, and other school officials could help you understand why your kid would bully another.
  • If your child has trouble managing anger, talk to a therapist about helping them handle strong feelings in a constructive manner.
  • Also consider seeking professional counseling to help your child combat the urge to harm or harass others.
  • A final next step could be to consider reparations, which take into account the victim and possibly their family. (Keep in mind that a victim of bullying may not be able to readily accept an apology right away.  The victim might question the sincerity of the apology or may suspect an ulterior motive. Sometimes the apology is best made several months after the incident.)

The time to address cyberbullying with your kids is before it occurs. Talk to them about what cyberbullying actually is and what forms it can take. Give examples and explain to them that joking around and teasing might seem like good clean fun, but it can hurt people’s feelings and lead to serious consequences. Also, don’t rely on the school system to educate or intervene when it comes to cyberbullying. There is limited guidance available about whether schools should intervene, or whether they legally can, in bullying situations that occur off-campus, outside of school hours, and/or that involve digital or electronic communications.  Further complicating matters, cyberbullying occurs most often on weekends, when kids have more time and opportunity to be online.

Bullying in any form is unacceptable. It can have severe and long-lasting consequences. When one kid bullies another, it can be devastating.  When dozens of kids bully another, the emotional damage can last a lifetime. The more involved you are as a parent, the greater your ability will be to recognize cyberbullying and put a stop to it. Tech-savvy parents can model good online behavior and help their kids understand the benefits and the dangers of life online in the digital world.

Related Articles:

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Black Friday/Cyber Monday Discounts 2012

Black Friday/Cyber Monday Discounts 2012

Like most companies around this time of year, we’re offering some fantastic savings on our product. This year, our Black Friday/Cyber Monday special is 50% off of any new StopSign Internet security membership.

This offer is only good from 11/21/12 to 11/27/12, so be sure to become a StopSign member or sign up a loved one to keep their Windows computer safe and secure in 2013!

Have a question about our Black Friday/Cyber Monday software special, or just to call our Sales team instead of signing up online? Give us a call at 800-786-7744.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Senior Citizen Guide To Avoiding Internet Scams

Senior Citizen Guide To Avoiding Internet Scams

Senior citizens are a vital community in modern society, but unfortunately they’re often targeted by Internet scam artists looking to make a quick buck. In fact, the Attorney General of Washington state did some research on senior fraud and discovered the following statistic from AARP:

Consumers lose billions of dollars each year to fraud. People over age 50 are especially vulnerable and account for over half of all victims…

That’s a staggering number, and a clarion call for seniors to be proactive in their own defense against fraudsters who would scam them out of their hard earned money.

With a few simple precautions, computing seniors can defend themselves against scams and fraud. And while there’s no end to how many different ways there are to try to bilk someone out of their hard-earned money, these tips can help knock out some of the most common scams.

  • Be Sure To Be Secure Senior citizens are an ever-growing segment of online shoppers, and with many Internet retailers offering discounted or free shipping, it’s no wonder. But fake websites and non-secure shopping can put a damper on anyone’s day. Learn how to tell if you’re shopping on a legitimate website to avoid trouble online. It’s not just shoddy workmanship we have to watch out for when we buy things sight-unseen online, it’s convincing websites that look like the real deal but are secretly swiping your credit card numbers and personal information.
  • Learn How To Avoid Credit Card Scams Keeping a low balance on your credit cards is a great idea, but it’s also a dream come true for fraudsters. Be wise with how you use them and use these tips on avoiding credit card scams. Check your balances monthly, question purchases that you don’t remember, and always be sure to only shop on sites you can trust, like Amazon.com.
  • Your Password Is Your Armor A strong password is your first line of defense against anyone looking to hack into your accounts. And while no password is 100% fool-proof, it’s better to err on the side of caution and use a password that’s much harder to break than using the old standbys like “password”, “iloveyou”, or “asdf1234”. (If you use any of those, change them now) Passwords don’t have to be a big pain in the rear. In fact, with only a few modifications you can make a better, stronger password in minutes.
  • If it sounds too good to be true… We’ve all heard this since we were little, but it’s easy to forget. And somehow, online scammers seem to know how to word things just right to make their scheme seem legitimate. If you do think a good deal has dropped into your lap, do a little research on the company first and make sure that there aren’t any complaints from the BBB, your state Attorney General’s office, or on review sites like Yelp and Consumer Reports.

We could go on and on about fraud prevention and online security, but the tips noted above are a great start for any senior citizen looking to protect themselves from Internet scams. Do you have any additional tips that we may have missed? Leave us a comment below and share your thoughts with the rest of us.

Additional resources for seniors:

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.