Hackers - Yesterday, one of my clients related to me an encounter he had earlier in the day with someone who purported to be from Microsoft. The caller told my client that he was going to help fix my client's computer and that he needed credit card information. My client noticed his mouse moving about on the screen without his input. He immediately unplugged his computer and disconnected the telephone call. In the News - They walk among us! Enjoy - Relax and enjoy these images and videos!
My client was fortunate. He stopped the scammer's game before it had gone fully into play. Others have not been so fortunate, I have heard many stories of unsuspecting people scammed by such creatures.
Although he was quick to assume the worst and unplug his system, Malwarebytes Anti-Malware later found several threats that had not been on the system prior to the hacker's attempted takeover. (My client routinely scans with Anti-Malware and had done so earlier in the day and found nothing.)
Later investigation determined the hacker had gained entry into the system by using an email exploit. (An email exploit is essentially an exploit that can be embedded in an email, and executed on the recipient's machine either once the user opens or receives the email. This allows the hacker to bypass firewalls and anti-virus products.)
Be careful. It is a jungle out there!
Guidelines for safety:
In the News - They walk among us! Enjoy - Relax and enjoy these images and videos!
Enjoy - Relax and enjoy these images and videos!