It wasn’t that long ago that anti-virus software was the epitome of computer security, especially if you were a Windows user. However, ransomware and crypto malware attacks are rising at a terrifying rate and show no signs of stopping. Unfortunately, traditional anti-virus software alone is not effective in dealing with these types of attacks
Although experts still recommend using anti-virus software to protect your computer, this is now only the first part of a “layered approach” to keeping your PC and personal information safe.
The second part of the “layered approach” is to ensure your computer’s other software (especially the operating system) is up-to-date. Remember the WannaCry ransomware attack which struck the NHS’ (amongst other organisations) Windows machines in May? Microsoft had already provided a software update about two months before the attack that protected users running operating systems like Windows 7 or Windows Vista from WannaCry. However, PCs that hadn’t been updated or that were Windows XP were left vulnerable. Microsoft says users who were running Windows 10 weren’t affected by the attack.
Don’t forget to keep your anti-virus software, like Windows Defender, updated too. The software can't fight a threat it doesn't yet know about, and that information is found in regular updates.
The third layer is to recognise that phishing attacks are the most common way for attackers to get into your system. Phishing attempts happen when you receive an email with a malicious link in it, or are asked to enter your username and password on a website that impersonates your bank’s website, for example. So, try to be smart about what email service you use. Google and Microsoft are good choices, because, as they have effective inbuilt controls and security, they help prevent phishing in their Gmail and Outlook.com email services.
DO BACK UP YOUR DATA REGULARLY, because should your computer become infected by ransomware, you can wipe your computer, install the operating system from scratch, and then restore it from the backed-up version. OK, so it can be a pain to do, however it’s better than losing everything. Don’t forget to unplug your back up drive from the computer once the backup is done, otherwise it too will become infected.
Finally, as I have mentioned many times before, vigilance and common sense are crucial factors in helping prevent malware and ransomware attacks:
Never follow links from e-mails. Instead open a new tab or window and enter the URL of your bank or other destination manually.
Enter your username and password only over a secure connection. Look for the “https” prefix before the site URL - if there is no “s,” beware.
In our last article, we spoke about the ransomware which crippled, amongst other large organisations, the NHS, mainly because their computer systems were still running the hugely outdated Windows XP operating system. In fact, any computer user who is still using Windows XP is at risk of being struck by any type of malware or ransomware, by which we mean that all their data, including photos, coursework etc, could be lost forever.
Well this also applies to anyone still running Windows Vista on their PC. And there are many people out there. Mainstream support for Windows Vista actually ended on April 10, 2012, but Microsoft continued to offer support options and updates as part of its extended support phase. However, that came to an end on 11th April of this year.
Microsoft has confirmed that "After April 11, 2017, Windows Vista customers will no longer receive new security updates, non-security hotfixes, free or paid assisted support options, or online technical content updates. Microsoft has provided support for Windows Vista for the past 10 years, but the time has come for us, along with our hardware and software partners, to invest our resources towards more recent technologies so that we can continue to deliver great new experiences."
Windows Vista will continue to work after 11th April, but if new security vulnerabilities or bugs are found - and believe me, that will happen - Microsoft will not issue updates to fix them. Some programs will continue to work and you can still run security software to keep your device as safe as you can, but fact of the matter is you are basically putting yourself at risk.
The longer you stay with Windows Vista or XP, the higher the chance of you becoming a victim of cyber-crime. Cyber-criminals target out of date operating systems due to their vulnerability, therefore updating your operating system will safeguard you from these external threats and help keep your system more secure with continued Microsoft mainstream support and patches.
Another thing to consider is what will happen to Windows Vista support when it comes to popular programs. Google, for instance, stopped supporting Windows Vista in the Chrome browser nearly a year ago, and Mozilla is now doing the same thing with Firefox.
For those of you who do wish to upgrade to Windows 10, our next article will cover buying new or refurbished PC’s and laptops, on which this latest Microsoft operating system is installed.
It will come as no surprise to you that this week’s article will cover the recent malware attack on the NHS and other major enterprises across the world.
The ransomware in question is called WannaCry (also known as WanaCrypt0r 2.0, Wanna Decryptor 2.0, WCry 2, WannaCry 2 and Wanna Decryptor 2) and in less than four hours, it had infected NHS computers, beginning in Lancashire, and then spreading throughout the NHS’s internal network.
Although the NHS does not seem to have been specifically targeted, many NHS trusts still use Windows XP, a version of Microsoft’s operating system that reached its “End of Life” on 8th April 2014. This meant that Microsoft stopped providing security updates or technical support for Windows XP, which instantly made the system vulnerable to a huge array of threats. Even though, in March, Microsoft released a patch for XP & Vista, the NHS failed to implement it!!
In case you missed the furore surrounding this cyber-attack, ransomware is a type of malware that infects a PC and then encrypts data files or even the entire system. Once all the files are encrypted, it posts a message asking for payment (usually in Bitcoins, a digital currency) for a code that will restore the files and threatens to destroy the information if it doesn’t get paid, often with a timer attached to put the pressure on. Even worse is that the hackers often take the payment but still do not unlock the data.
Most ransomware is spread hidden within Word documents, PDFs and other files normally sent via email, or through a secondary infection on computers already affected by viruses that offer a back door for further attacks.
So, it has now been proven that computer users who continue to run Windows XP are playing a very risky game. Unfortunately, this irresponsibility then puts other computer users at risk because their systems end up hosting and distributing malware and viruses. Continuing to use Windows XP on the public internet is very much like going out in public with a virus and coughing on people.
If you are still using an XP machine, STOP! You need to upgrade your existing computer or, if your existing computer is too ancient to upgrade, buy a new one.
For users of the most recent Microsoft operating systems, do protect yourselves by installing antivirus software and keeping your operating system and applications up-to-date. Don’t visit any suspicious sites or open email attachments from unknown sources. Most importantly, you really must perform regular back-ups of ALL YOUR DATA onto an external hard-drive, then immediately unplug the device from your computer since ransomware can encrypt what is on that as well as what is on the computer.
The Internet is a scary place and keeping your child safe online can often be a daunting prospect. Luckily, Windows 10 offers access controls, time limits and activity reports, including reports on the websites, apps and games your child uses. You can set up individual user accounts for each member of the family with their own unique passwords and then tailor the controls and restrictions to the age of your child. It’s relatively easy to set up a user account and then protect and monitor their activity in just a few minutes.
To get started, you need to create Microsoft accounts for your kids, which you then can add to your family at account.microsoft.com/family. Once you've added them to your family, you'll be able to choose the additional limits and permissions you want your kids to have. When your kids sign in with their own accounts, they can personalise their desktop and explore apps and games and in addition, their family settings will be applied to any Windows 10 device they sign into.
To set up a child’s account in Windows 10, open Settings, then Accounts, then click Family and Other Users in the left side panel. From here, you can either add a new family member, which gives you the option to set parental controls on your children’s accounts, or simply add a new user. If you choose 'Add a family member', each person you add will need to have their own Microsoft account. (You can create Microsoft accounts from here by clicking the 'The person who I want to add doesn’t have an email address' link).
For extra security, you will need to enter a telephone number. This way if you’re ever unable to access the account, i.e. if it is hacked or you forget the password, you can have a code sent to your phone that will let you reset it.
On the next screen, there are options to have Microsoft recommend apps and other such advertising techniques. I would suggest unchecking these boxes. It’s entirely up to you, but considering this is a child’s account, I don’t believe that either of these options are relevant.
Once you’ve set up your additional accounts, the next time you reboot or log off your PC the new users will appear to the bottom-left of the login screen.
With your child’s account added, you can set up and configure their account settings using the Microsoft Family Safety website. We will cover this and How to Use the Parental Controls in Windows 10 in our next article.
In our last article, we wrote about the Internet of Things (IoT) and how it is being used to create a “Smart Home” by connecting IoT ready devices to the internet and controlling them with your smart phone or computer.
However, a lack of security in IoT devices, just like in desktop computers and traditional mobile devices, can potentially offer an easy way in to your network and allow hackers to access, collect and misuse your personal information. Many hackers are moving away from businesses and governments, which nowadays have highly reliable internet security, to easier targets. And they don't come easier than the IoT connected smart home with its growing array of web-connected devices, from clever fridges which notify you when you are out of milk (yes really!) to thermostats and smart lightbulbs.
The Internet Society warned last year that: "The interconnected nature of IoT devices means that every poorly secured device that is connected online potentially affects the security and resilience of the internet globally."
So how do we protect ourselves from our networks becoming compromised? The first and most important thing is to change default passwords as soon as we buy an IoT gadget. NEVER use default accounts or passwords as many of them are posted on the internet. In almost every article we write, we reiterate the necessity of a strong password for your computers, bank accounts, email accounts etc – it should be made up of letters, numbers and punctuation (“iwantaCheeseSandwich4lunch!” is a brilliant example except that now most the Fenland Citizen readers know about it!!). Well the same applies to any IoT device you decide to connect to your network.
Simple tools such as Bullguard's IoT Scanner software can also help spot weaknesses. In addition, BullGuard has also published an IoT manual that gives a checklist on what to check and how. (www.bullguard.com/blog/2016/06/internet-of-things-consumer-devices.html).
Other ways to increase IoT security is to keep product software and firmware up-to-date and to buy only from trusted brands like Philips or Nest.
It is also important to be aware that, in the rush to bring new products to market, some manufacturers of IoT devices add on privacy and security features after the fact, rather than including them in the device at the outset. One of the reasons why some IoT devices are cheaper than others is that manufacturers cut corners on security which is akin to putting cheap tyres on an expensive car.
You may have heard the term "Internet of Things" (or IoT) but wondered what it is. In short IoT is the concept of connecting different devices to the web and to each other. This can include anything that has an on/off switch such as washing machines, coffee makers, smartphones, tablets, doors, light switches, coffee makers and many more. These objects or “things” are embedded with software, sensors, electronics, and network connectivity, allowing them to complete tasks and communicate with each other without any human involvement.
One of the ideas behind IoT is to create a Smart Home where objects such as thermostats (in the UK, most energy companies are rolling out Smart Meters), lights, fridges, door locks, toasters, washing machines etc can all be connected to the internet and controlled by your smart phone or computer. IoT also applies to the use of smart devices outside of the home to automate processes, such as roads that alert drivers to spots of black ice or recycling bins that tell the council when to pick them up.
So how does the Internet of Things work? Well, it is made up of three major components: the things themselves; the networks connecting them together and the data flowing between each of the devices. By collecting and analysing this data, the devices can establish patterns of interest, so that users can act upon the data via their mobile apps.
One of the most popular pieces of Internet of Things technology currently available is the Nest, a smart thermostat that is connected to the internet. The Nest learns your household’s routines and will automatically adjust the temperature based on when you’re home or away, awake or asleep, hot or cold, to make your house more efficient and help save on heating and cooling bills. The mobile app allows you to edit schedules, change the temperature when you’re away from home, etc.
There is also the Philips Smart Bulb, which lets you programme and control your lights from your smartphone.
IoT has been described as a world changing revolution that will affect industrial sectors, the home and eventually the entire world. But be warned, the smart home might not be quite so smart when it comes to security.
Cyber criminals must be rubbing their hands together with glee knowing that there are an estimated twenty-five billion devices, including desktops and laptops, online, with separate research stating that 70 percent of IoT devices are unsecured. Connecting even more of these devices creates new, and heightens existing, security risks. In fact, there have been recently reported web attacks that used compromised connected devices, from webcams to printers, to knock out several popular websites.
So what should we be doing to protect ourselves and our homes? We’ll talk about this in our next article.
Once again I feel the need to write another article warning about hacking and identity fraud as I have visited several customers over the last few months whose emails have been hacked. In some of these cases the email hijackers created “forwarding policies” from the customers’ email addresses. But what does this mean and why is it dangerous?
Well, in one instance, a lady received a fake email from BT asking her to login to her BT email account to retrieve her statement. By clicking on the link within the email and then entering her email address and password on the fake BT email page (which looked incredibly convincing by the way), she'd unwittingly given the hacker all they needed to get into her real email account. Once in the BT account, the hacker altered the lady’s email settings so that all of her emails were automatically forwarded to the hacker’s email address.
In another instance a customer called me because he had not been receiving emails for several weeks. It turned out that his BT email account had also been compromised and once inside his email account, the hacker had set up an auto-forward which was sending all his emails to an email address he had never heard of. We only got to the bottom of this because the hacker hadn’t ticked the box to keep a copy of the emails in the in-box; hence he was not receiving any emails.
The reason that this email forwarding scam is so dangerous is because the hackers will receive everything you receive, including bank statements, personal messages, log-in information for other websites and accounts and much more. How long would it take, I wonder, for a hacker to build up enough information from your emails to create a new identity based on you? Not long at all is most certainly the right answer.
My advice therefore to all email users is to check all your email settings, in particular ensuring that the box to forward email on is not ticked. I would also recommend being careful when clicking on a weblink within an email. Personally speaking, if I am asked to log into any of my accounts – be it email, banking, Apple, Google, Paypal or anything - I do it directly through their website and not through an emailed weblink.
I would also like to take this opportunity to stress once again the importance of strong passwords for all your accounts. The longer the password the better and the more characters there are in your password, the longer it will take for a hacker to break it, making it less likely they will continue trying. Do use a mixture of numbers, lowercase and uppercase letters and special characters as it increases the complexity of your password and increases its strength.
You may well remember my article last year warning of the scam whereby someone claiming to be from Microsoft or Windows technical support calls to tell you that your computer has been attacked by a virus and that they need to take control of it in order to remove the virus. In return, naturally, for a large fee. Of course, the caller is not from Microsoft and there is probably nothing wrong with your PC.
It would appear that since many people are now failing to fall for the “Microsoft Scam”, the scammers have put in place a twist on an old trick and are now purporting to call from ‘BT’s support team’ and have very believable answers when challenged.
They warn you that they have detected a virus which needs to be “fixed immediately” and then get you to download a piece of software onto your PC so that they can access it remotely to be able to remove the virus. In reality, what this software does is to give them access to your computer, therefore providing them with all your passwords and log-ins etc. Not only do they then access your bank accounts, they also make purchases using your credit or debit card details.
The alternative trick is to get you to pay the best part of £400 to remove the non-existent virus from your PC.
But the scammers are not stopping at phone calls. There is now an on-line scam in which fraudsters pose as legitimate internet service providers (ISPs) offering fake technical support. It works as follows: you are happily browsing the internet when a warning pop-up appears on your screen. This pop up is supposedly from your actual internet provider warning that “malware has been detected” and urges you to call a number "for immediate assistance”. When you call the number, you will be charged an excessive call fee and be asked to install software that compromises your computer.
It is scarily realistic because the scammers know which internet provider you are subscribed to. But how? Basically they place adverts which are infected with malware on perfectly legitimate websites. The user browses these websites and without even having to click on the advert, the malware in the advert redirects the user to a website in the background which checks their computer and finds their IP address. From the IP address it is easy to find out which ISP owns which IP address.
If you’re called by one of these scammers, whether they purport to be from BT, Microsoft or another company, NEVER let them remotely access your PC and NEVER hand over your bank details. It is simply not possible for a caller to know whether your PC is infected with viruses.
If you think you’ve been a victim, run a virus scan, alert your bank and contact Action Fraud to report the scam.
As children get older it is inevitable that they will start using social networking sites. Within these sites they will be encouraged to share all aspects of their lives – thoughts, opinions, feelings, pictures etc. – thus creating digital traces of themselves across the internet. However, what they probably fail to realise is that the internet keeps a record of everything we do online. In other words, it creates an “online reputation”.
It is vital for children to understand how to manage their online reputation because once information is uploaded to the internet, it can be very easily and very quickly shared around. This in turn could affect their friendships, leave them open to cyber-bullying and even affect their job prospects (many employers and university admissions teams check social media profiles when researching candidates). Yet a digital footprint is incredibly difficult to remove.
You can help your child keep a positive presence online by ensuring they understand the long-lasting effects of their internet activities and that their online reputation is created not only by what they post about themselves but also by what others post about them.
Emphasise the fact that it’s almost impossible to keep things private online. Even friends or family members could pass on messages you’ve asked them not to.
Children should never post anything online they don’t want thousands of people, including their family, to see.
A computer screen may give the illusion of distance between them and the other people they are communicating with, however being online is the same as living in the real world.
Always ask permission before tagging a friend online and never post inappropriate pictures. Watch out for photos tagged by their friends and remove any that are offensive.
Stop & think before posting a comment online. They could end up hurting someone or being hurt themselves. It is easier for comments to be misunderstood when typed rather than spoken.
Ask your child to tell you about all their email and instant messaging accounts and what the passwords are, thus allowing you to monitor their activities. Don’t feel guilty about it - you’re only giving them a false sense of security by letting them believe that privacy exists on the Internet.
Ask them to “friend” you on all their apps. This may not go down well but it could be one of the conditions for you allowing them to access social networking sites.
When your child stops using a social networking site, deactivate or delete their account.
Keeping Your Family Safe On-Line
The internet is a fantastic resource with its millions of websites, apps, games and online communities, and just like thousands of other parents, I want my child to learn how to use it safely and responsibly. Unfortunately, it’s nigh on impossible to watch what our children are doing every minute they’re online. The increase in use of mobile devices in particular makes it even harder to keep tabs on what they’re watching or playing when they are out of sight. So, how can we help our children to stay safe on-line?
For further helpful advice, we recommend the following websites:
While many people might not yet know the term “two-factor authentication,” there is every chance that you have come across it when you want to check your email, or perhaps your bank statement on-line. Having a password alone unfortunately isn’t as secure as it used to be and if someone gets your password, they can access your account without any fuss. Even having a strong password doesn't completely protect you. Two-factor authentication can help solve this problem.
But what exactly is Two Factor Authentication (or 2FA)? Basically it requires not one but two pieces of privileged information before giving access to an online account. It works on the basis of “something you know and something you have”, ie when using your bank cash machine, you insert your bank card (something you have) and enter your passcode (something you know).
2FA can be a little time-consuming as most major sites and services offering 2FA do it as an optional security feature, so you’ll need to dig around in the security settings of each account to find it. Much also depends on your willingness to ensure a higher level of security as you’ll need to prove your identity every time you log into a protected account from a new device.
However, 2FA does make it much harder for hackers to gain control of your accounts. For example, a hacker trying to access your email account has your email address and even your password, however doesn't have the second element of the authentication process, which in most cases is a unique security code that's sent directly to your mobile phone via text messaging.
Most major services support two-factor authentication when you attempt to log into your account from a new machine:
Google/Gmail sends you a 6-digit code via text message. It also works with the Google Authenticator app for Android, iOS, and BlackBerry.
Apple sends you a 4-digit code via text message or Find My iPhone notifications when you try to log in from a new machine.
Facebook’s two-factor authentication is called "Login Approvals” and sends you a 6-digit code via text message. It also works with apps like Google Authenticator for Android, iOS and BlackBerry, as well as the "Code Generator" feature of the Facebook app.
Dropbox sends you a 6-digit code via text message, although it also works with Google Authenticator and a few other similar authentication apps.
Microsoft sends you a 7-digit code via text message or email. It also works with a number of authenticator apps. Windows Phone users can download Microsoft’s own authenticator app from the Windows Store.
Yahoo! Mail sends you a 6-digit code via text message when you attempt to log in from a new machine.
Contact your credit card or bank Fraud Prevention Team to have the charges reversed and the account protected from future charges.
Change your computer password, along with the password of any online accounts that may have been provided to the scammer.
Update your security software and run a full security scan on your computer. You may also want to contact a local IT professional to have your computer checked for malware.
Please tell your friends and family about these scams. If more and more people are able to stop making it financially worth their while, then the scammers might stop bothering innocent computer users.
Don’t just take our word for it. Here are a few links
Use of fake anti-virus software is a fast-growing scam, especially since people are so aware of the dangers of spyware, adware and malware. Scammers often use the names of well-known companies that specialise in computer security software – such as AVG, Norton, Bullguard, McAfee etc - to gain your trust. The pop-up adverts are almost exact replicas of genuine warning alerts generated by these legitimate security manufacturers - once you click the warning, your computer is infected.
The aim of this scam is to charge you for bogus software and/or obtain your personal information. Once your computer is infected, the scammer is able to gather information to steal your identity or to sell it to other criminals.
Fake virus alerts are usually generated by a Trojan — a program that takes control of your computer after you open an email attachment, click on a pop-up advert or visit a particular website. Sometimes the Trojan creates “false positive” readings, making you believe viruses and spyware have infected your computer, even though nothing has. In other cases, scam software actually implants malicious code into your computer, especially if you request a “free virus scan.”
So how do you know if you have been infected with malware:
On 8th April 2014, Windows XP reached its “End of Life”. This meant that Microsoft stopped providing security updates or technical support for Windows XP, which instantly made the system vulnerable to a huge array of new threats. Indeed, almost immediately, scams and fake software updates began to and continue to plague XP users.
Just as importantly, not only did Windows XP machines start becoming less and less compatible with newer devices, most software makers have now also stopped ensuring that their product works with Windows XP. In fact, only last week Windows XP users have been reporting that after signing out of iTunes they’re no longer able to get back in. Although as yet unconfirmed by Apple, this is probably due to an upgrade in the way the iTunes App securely communicates with the iTunes Store. Furthermore, although Google extended support for Chrome on Windows XP after Microsoft stopped issuing security patches on XP, it has been announced that this support will cease at the end of 2015.
Users who ignore the warnings and continue to run Windows XP are playing a very risky game. Unfortunately, this irresponsibility then becomes everyone else’s risk because their systems end up hosting and distributing malware and viruses. Continuing to use Windows XP on the public internet is very much like going out in public with a virus and coughing on people.
So what should you do if you are still using an XP machine? The best tip I can offer is to run as far away as you can from this insecure, creaky and obsolete operating system. There are 2 basic options for switching to a more secure and less outdated operating system: 1) upgrade your existing computer or if your existing computer is too ancient to upgrade, 2) buy a new or second hand one.
Upgrading to a Windows 8 PC is the best option however can be a little pricey for some. In which case, buying a 2nd hand Windows 7 computer is the next best option.
The advantage of upgrading your operating system or buying a new one is that later this year Microsoft will offer free upgrades to Windows 10 for Windows 8.1 users and then for Windows 7 users. (Please note that the free upgrade is only available for the first year the software is available). Although no exact date has been given, Microsoft has confirmed a summer 2015 launch for Windows 10 in the UK.
We are often asked what the differences are between malware and viruses and why an anti-virus cannot stop everything. This week I’d like to try to help out a little.
Malware (malicious software) is the big umbrella term. It covers viruses, worms, trojans, adware, spyware etc. Malware can be unwittingly downloaded from infected bogus email attachments, USB sticks, pirated material and hijacked websites.
There are 2 major categories of malware: hidden and visible.
This is malware that is predominately installed without the user’s knowledge. Its intention is to cause damage or for financial gain:
Virus - this may corrupt or delete data on your computer or even delete everything on your hard disk. Viruses spread when the software or document they are attached to is transferred from one computer to another.
Worm - a malicious computer program that is able to copy itself incredibly quickly from machine to machine, usually by exploiting a security hole in a piece of software or the operating system.
Trojan - like the mythical Trojan horse, they are often disguised as a piece of software that looks innocent. Trojans are one of the most common methods a criminal will use to infect your computer and collect personal information.
Visible Malware (Grayware)
Grayware refers to applications or files that are non-malicious, but can still adversely affect the performance of a computer:
Spyware - installs components on a computer for the purpose of recording internet surfing habits. Spyware sends this information to its author or to other interested parties when the computer is online.
Adware - displays advertising banners on web browsers, which many computer users consider invasive. Adware programs often create annoying pop-up ads and a loss of network connection or system performance.
PUPS (Potentially Unwanted Program) – software that uses high amounts of system resources and is a common cause of spam e-mails and slow systems.
The reason your anti-virus won't stop all types of malware is because the release rate of malware is so high. New malware is released on a daily basis and the anti-virus companies just cannot keep up. We advise that you protect your computer as best you can by:
Keeping up-to-date with the latest operating system updates and patches.
Installing anti-virus software and downloading updates.
Ensuring that Adobe Flashplayer is up-to-date. Use their official website (never use a pop-up which informs you that you need to update it): https://get2.adobe.com/flashplayer/
THINK BEFORE YOU CLICK. The best way to prevent a malware infection is YOU. Avoid downloading and installing anything you do not understand or trust.
For some people, however, it doesn’t end there. Only last week, a local lady was not only conned out of £209 for a bogus virus removal but the scammers then locked her computer out completely and emptied her bank account of an additional £1,000.
These types of scam have been going on since at least 2008 and Microsoft is aware of the problem. However, apart from alerting people to the scams, there isn’t much more they can do. They do have this to say though:
“Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
So if someone claiming to be from Microsoft or Windows technical support calls you, we recommend the following:
Do not purchase any software or services.
Ask if there is a fee or subscription associated with the "service." If there is, hang up.
Take down the caller's information and immediately report it to your local authorities.
Never provide your credit card or financial information to someone claiming to be from “Microsoft tech support.”
Please tell your friends and family about these scams. If more and more people are able to stop making it financially worth their while, then the scammers might stop bothering innocent computer users.
For further information, see our blog at www.diamondbyte.co.uk/blog
Don’t just take our word for it.. Here are a few links