Thursday, July 25, 2024

I think someone is accessing my accounts and/or devices! What do I do!?

If you suspect someone is accessing your accounts and/or devices, quickly securing them is crucial. Here are steps to check if your devices or accounts are being monitored or accessed by a 3rd party; and how to secure them!!


Check If Somone Has Access To Your Accounts and/or Devices:

  1. Check for Unusual Behavior Being Exhibited By Your Device(s):

    • Unexpected battery drain.
    • Data usage spikes.
    • Overheating devices.
    • Unusual pop-ups or applications.
  2. Review Account Activity:

    • Check recent activity on your accounts to see if there are any unauthorized logins or changes.
      • On Gmail: 
        • Go to “Details” at the bottom of your inbox.
      • On Facebook: 
        • Settings > Security and Login > Where You're Logged In.
      • For other services, look for similar settings.
  3. Check Connected Devices:

    • Review the list of devices connected to your network or online accounts (Google, Apple, etc) and remove any devices that you do not recognize.
  4. Review Installed Apps:

    • Go through your installed applications and look for any apps you don't recognize or remember installing.
      • On Android: Settings > Apps.
      • On iOS: Settings > General > iPhone Storage.
  5. Check Permissions on/of Your Device(s):

    • On Android: Settings > Apps > [App Name] > Permissions.
    • On iOS: Settings > Privacy > [Permission Type] (e.g., Location Services, Camera).
  6. Update Your Software:

    • Ensure your device's operating system and all apps are up to date, as updates often include security patches.
    • On Android: Settings > Software Update.
    • On iOS: Settings > General > Software Update.
  7. Run Security Scans:

Steps to Secure Your Accounts & Device(s):

  1. Change Your Passwords:

    • Update passwords for all accounts linked to your devices.
    • Use strong, unique passwords for each account.
    • Consider using a password manager.
  2. Enable Two-Factor Authentication (2FA):

    • Set up 2FA for all accounts that support it to add an extra layer of security.
  3. Logout from All Devices:

    • Sign out of all devices for each account. This will force any unauthorized users to log back in, prompting 2FA if enabled.
    • Look for "Log out of all devices" or similar options in account settings.
  4. Reset Your Device:

    • Factory reset your device to ensure no malicious apps remain.
    • Backup important data before resetting.
      • On Android: Settings > System > Reset > Factory data reset.
      • On iOS: Settings > General > Reset > Erase All Content and Settings.
      • After resetting, only reinstall apps from official app stores and trusted sources.
  5. Monitor Account Activity:

    • Regularly check account activity for any unauthorized access or changes.

Notify & Seek Help:

  1. Notify Account Providers:

    • Contact the support teams of the services where you suspect unauthorized access. They can help secure your account and investigate any breaches.
  2. Consider Legal Action:

    • If you believe your privacy is being violated or if there are any illegal activities, contact local law enforcement for assistance.
  3. Get Professional Help:

    • For further assistance in securing your accounts and devices, contact Pacific Northwest Computers in Vancouver, WA. We can provide professional help in securing your digital presence. Reach us at 360-624-7379.

Additional Tips:

  • Use a Password Manager: Consider using a password manager to generate and store complex passwords securely.
  • Regularly Monitor Accounts: Keep an eye on your account activity and be alert to any suspicious behavior.
  • Educate Yourself on Security: Stay informed about online security practices to better protect your digital life.

By following these steps, you can regain control of your accounts and devices, enhancing your overall security. If you need personalized assistance, don't hesitate to reach out to professionals for help!


Pacific NW Computers

Saturday, July 13, 2024

How to do a Tune-up/Clean-up with Virus Scans for your PC!

General PC Tune-up/Virus Scan Procedures:

Uninstall/Install Software:

  1. Uninstall Obvious Bloatware:
    • “Free Trial” software
    • Obvious junk programs & toolbars (One Search, Driver Support, One Bar, etc)
      1. Use the PNW Computers “Browser Hi-jack” blog article as a reference to find and remove software malicious Adware Programs.
      2. Computers that are heavily infected should be checked with ‘TDSKiller’ to rule out the presence of a Rootkit BEFORE any cleaning procedures begin. Unless cleaning is needed to run the utility.
  2. Install/Update Essential Programs:
    1. Security Clean-up Software List (Ninite.com can be used for installing most apps):
      1. Chrome, Firefox, Edge - Update
      2. Java, .Net & Silverlight Runtimes - Update/Install
      3. Malwarebytes Antimalware
      4. Malwarebytes ADWCleaner
      5. BleachBit

Security Scanning & Virus/Malware Removal:

  1. Virus and Malware Scanning:
    Run FULL (not a quick/fast) Virus Scan with Local AV as well as Malwarebytes and ADWCleaner

  2. Web Browser Clean-up:
    • Check all Installed Web Browsers’ Extensions/Add-ons for anything unwanted/needed.
    • Check the general browser settings (Start Page, Default Search Engine, Etc.) for any tampering or modifications and reset to defaults if needed.
    • ADWCleaner is an excellent tool for finding and removing browser hijack apps.

Performance Tune-Up:

  1. Junk File Clean-up - Bleach Bit

  2. Paging File Optimization

    1. Set the PC's paging file to either 1.5 the amount of RAM or set to 4096MB.
      1. Settings > System > About > Advanced System Settings
        1. Select the “Advanced” tab at the top
        2. In the “Performance” section click on “Settings”
        3. Click on the “Advanced” tab
        4. Under “Virtual Memory” click on “Change”
        5. Set the paging file accordingly
  3. Optimize System Performance Options

    1. Right-click ‘My Computer’ > Properties > Advanced System Settings> Click ‘Advanced’ tab > Click ‘Settings’ under the “Performance” area.
    2. Un-check all of the PC's visual effects performance options except for:
      1. "Use visual styles on windows and buttons"
      2. “Smooth Scroll List Boxes”
      3. “Smooth Edges on Screen Fonts”
      4. “Show Translucent Selection Rectangle”
      5. "Use drop shadows for icon labels on the desktop"
      6. Start-up Program Entries can also be managed using the Task Manager.
      7. Disable all unnecessary start-up items
        1. Typically leave start-up programs related to:
          1. OneDrive/MS Office
          2. iCloud Drive
          3. Printers
          4. WIFI Software
          5. Audio/Video Software
          6. Specialty apps such as Garmin, Fitbit, etc

Windows Updates:

  1. Access Windows Updates through System Settings
  2. If the Microsoft Update feature is not/has not been enabled, enable Microsoft Updates in the Windows Updates “Advanced Options”. You can also enable the “Notify me when a restart is required” option too as well.
  3. After the Microsoft Update feature has been enabled, Windows Updates will now check for both Windows and Microsoft Updates.
  4. Allow the computer to check for new updates.
  5. Once checking for updates is finished, download and install all available updates.
    1. You may need to do this process more than a few times to make sure the system is fully updated.
  6. Some Windows Updates may fail. Do not hyper-fixate on failed updates, as they will likely resolve on their own after a few update/restart cycles.
  7. Verify Installation of all currently available Windows Updates AND Upgrades

Wednesday, July 10, 2024

Fake Tech Support Scam: What You Should Do!


A fake tech support scam is a type of fraud where scammers pose as legitimate technical support personnel from well-known companies to trick victims into giving them access to their computers, personal information, or money. Here’s how these scams typically operate and how to clean up your system if you did/do fall victim to this type of scam!


How Fake Tech Support Scams Work

Initial Contact:

  • Cold Calls:
    Scammers often call victims directly, claiming to be from reputable companies like Microsoft, Apple, or a popular antivirus provider. They usually say they've detected viruses, malware, or other issues on the victim's computer.
  • Pop-Up Warnings:
    Victims might encounter alarming pop-up messages while browsing the web. These pop-ups often claim that the computer is infected and instruct the user to call a provided number for immediate support.
  • Emails:
    Scammers may send phishing emails that appear to come from legitimate companies, warning about security threats and urging the recipient to call for support.

Convincing the Victim:

  • The scammer tries to convince the victim that their computer is at serious risk. They use technical jargon and alarming language to create a sense of urgency.
  • They might ask the victim to open certain files or run specific commands that produce harmless but alarming-looking results, reinforcing the scammer’s claims.

Gaining Remote Access:

  • The scammer persuades the victim to install remote access software, such as TeamViewer, AnyDesk, or LogMeIn. This gives the scammer control over the victim’s computer.
  • Once they have access, they might pretend to run diagnostics or show fake errors to maintain the illusion of a serious problem.

Exploiting Access

  • The scammer may install malware, steal personal information, or use the computer to commit further fraud.
  • They often demand payment for their "services," claiming they can fix the issues they "found." Payment might be requested via credit card, wire transfer, gift cards, or other non-reversible methods.

Continued Exploitation

  • Even after payment, scammers may leave behind software that allows them to regain access or continue monitoring the victim's computer.
  • They might sell the victim's information to other scammers, leading to further fraud attempts.


How to Protect Yourself

Be Skeptical of Unsolicited Contact

  • Legitimate companies rarely contact customers out of the blue about computer issues. 
  • If you receive an unsolicited call or message, be wary.

Verify Claims Independently

  • Don’t trust pop-ups, emails, or calls without verifying their legitimacy through official channels. 
  • Look up the company’s official contact information and reach out directly.

Do Not Allow Remote Access

  • Never give control of your computer to someone you do not know or trust. 
  • Legitimate support personnel will not ask for remote access unless you have initiated the contact through verified means.

Use Reputable Security Software

  • Keep your antivirus and anti-malware software up to date. Use reputable programs like Malwarebytes Anti-Malware to protect your system.

Educate Yourself and Others

  • Learn about common scam tactics and share this knowledge with friends and family, especially those who might be less tech-savvy.


Here's a step-by-step guide to help you ensure your computer is secure and free of any unwanted remote access software if you did fall victim to a fake tech support scam/scammer.


Immediate Steps To Take If You Have Been Scammed

1. Disconnect from the Internet

  • Unplug your ethernet cable or turn off your Wi-Fi to prevent further remote access.

2. Identify and Remove Remote Access Software

  • Check Installed Programs
    • Go to `Control Panel > Programs > Programs and Features`.
    • Look for any remote access software (e.g., TeamViewer, AnyDesk, LogMeIn, RealVNC).
    • Uninstall any suspicious or unfamiliar programs.
  • Check Task Manager
    • Press `Ctrl + Shift + Esc` to open Task Manager.
    • Go to the `Startup` tab.
    • Disable any suspicious entries that start with Windows.

3. Scan for Malware and Adware

  • Malwarebytes Anti-Malware:
    • Download and install Malwarebytes
    • Run a full scan and remove any detected threats.
  • ADW Cleaner
    • Download and run ADW Cleaner.
    • Follow the prompts to clean any adware, toolbars, or PUPs.


Additional Steps You Can Take...

Network Settings

  • Ensure no changes have been made to your network settings:
    • Go to `Control Panel > Network and Sharing Center > Change adapter settings`.
    • Right-click your network connection, select `Properties`, and check for any unfamiliar protocols or services.

Check for Suspicious Services

  • Press `Win + R`, type `services.msc`, and press Enter.
  • Look for any unfamiliar services that are running and set to start automatically.
  • Right-click and stop these services if they seem suspicious

Update Your System

  • Ensure your Windows operating system is up to date:
  • Go to `Settings > Update & Security > Windows Update`.
  • Install any available updates.

Reset Passwords

  • Change the passwords for your computer accounts, especially if they have administrative privileges.
  • Change passwords for any online accounts accessed from this computer.

Enable Firewall and Antivirus

  • Ensure Windows Firewall is enabled:
    • Go to `Control Panel > System and Security > Windows Defender Firewall`.
    • Make sure you have an antivirus program running and up-to-date.

Monitor for Unusual Activity

  • Keep an eye on your system for any unusual behavior or performance issues.


Final Steps

Consider Professional Help

Data Backup and Recovery

  • Backup your important data to an external drive or cloud storage.

System Restore or Reinstallation

  • If you suspect deep-rooted infections or issues, consider performing a system restore or a clean installation of Windows.


Feel free to reach out if you need further assistance or if anything is unclear. Stay safe!


Monday, July 8, 2024

How Did I Get Infected!?!


For those of you who think, "Well, if I don't install random new programs from the internet or download random EXE files, I won't get infected" that's not really the case today. Most people are not infected because they browse the internet and accidentally click on an EXE file. That was more common several years ago.

Nowadays, most people get infected because the malware comes to them. 

You don't have to go out on the internet and have to "find" viruses or malware to get infected.

The malware arrives in your inbox, in your private messages, from a trusted source, a hacked website, or inside a program you use, whose company got hacked, like in the case of 3CX.
  • The 3CX hack, which came to light in late March 2023, was a sophisticated supply chain attack. The incident involved the compromise of 3CX’s Windows and macOS build environments, allowing hackers to push trojanized software to 3CX customers.
  • The breach began when an employee at 3CX downloaded a trojanized installer for the X_Trader trading software, which had been compromised by North Korean threat actors. This malicious installer gave the attackers access to the employee's device and corporate credentials, enabling them to infiltrate 3CX’s network and insert malware into the 3CXDesktopApp. The attack was likely carried out by a North Korean hacking group tracked as UNC4736, linked to the financially motivated operation dubbed AppleJeus​ (Security Week)​​ (Security Week)​​ (CISA)​.
This doesn't mean there aren't still things like malware advertising (malvertising), where you see ads on Google to entice you to click on or download something malicious. Another major source of malware now is also social media platforms! YouTube videos as well!! 

For instance, if you look for any kind of cheat, crack, or mod for a popular video game, you will often find videos with external links. Many of these links, especially if they're password protected, contain malware.

Sometimes, it's literally the first search result when looking up something as harmless as "sewing patterns and templates"!!

Here are further examples of common ways people can get infected:

  • Phishing Emails:
    One of the most prevalent methods. Attackers send emails that appear to be from trusted sources, tricking recipients into clicking malicious links or downloading infected attachments. These emails often mimic legitimate communications from banks, social media platforms, or even colleagues.
  • Compromised Websites:
    Legitimate websites can be hacked to serve malware to visitors. This method doesn't require any action from the user other than visiting the site. Drive-by downloads exploit vulnerabilities in browsers or plugins to install malware without the user’s knowledge.
  • Software Supply Chain Attacks:
    These involve compromising a trusted software vendor to distribute malware to end users. The 3CX hack is a prime example, where attackers infiltrated the development pipeline of 3CX, a business communication software, and inserted malware into the software updates, affecting thousands of users.
  • Malvertising:
    Malicious advertisements, or malvertising, are another common method. These ads can appear on legitimate websites and redirect users to malicious sites or directly download malware. Even major advertising networks have been exploited to serve malvertising.
  • Social Media Platforms:
    Attackers exploit the popularity of social media to spread malware. They create posts or messages with enticing links that lead to malicious sites. YouTube videos offering cheats, cracks, or mods often include external links that direct users to malware. These links can appear highly ranked in search results, making them seem legitimate.
  • Messaging Apps:
    Private messages on platforms like WhatsApp, Facebook Messenger, and others can carry malicious links or attachments. Since these messages often come from known contacts, users are more likely to trust and click on them.
  • Trusted Sources:
    Sometimes, malware is spread through channels that users inherently trust. This could be through an email from a known contact whose account has been compromised or through a popular website that has been hacked.

We always recommend installing and using good, trusted, and reliable antivirus and antimalware software for your system. While they are not a silver bullet, these tools provide essential layers of defense against various cyber threats. Antivirus software is designed to detect and remove viruses, while antimalware software targets a broader range of threats, including spyware, adware, and ransomware. 


In addition to antivirus and antimalware software, browser add-ons can enhance your online security by providing additional protection against malicious websites and phishing attacks. One such recommended add-on is Malwarebytes's Browser Guard


Benefits of Using a Browser Guard: 
  • Blocking Malicious Websites:
    Browser Guard blocks websites that are known to host malware, preventing you from inadvertently visiting harmful sites.
  • Protection Against Phishing:
    It helps identify and block phishing attempts, protecting your personal information from being stolen.
  • Ad Blocking:
    The add-on can block unwanted ads, which can be a source of malware through malvertising.
  • Improved Browser Performance:
    By blocking malicious content and unwanted ads, Browser Guard can enhance your browsing experience and speed.

Pacific Northwest Computers Practices Combined Protection; What is That?!

No single solution can offer complete protection against all cyber threats. Using a combination of antivirus, antimalware software, and browser add-ons provides multiple layers of defense, significantly reducing the risk of infection and data breaches. 
Here’s why combined protection is essential:
  • Layered Defense: Different tools specialize in different areas of protection. Antivirus software focuses on traditional viruses, while antimalware software targets newer, more sophisticated threats. Browser add-ons provide real-time protection while you browse the web.
  • Reduced Risk of Zero-Day Attacks:
    Zero-day attacks exploit unknown vulnerabilities. Having multiple layers of protection increases the chances of detecting and stopping these attacks.
  • Comprehensive Coverage:
    Combined tools cover a wider range of potential threats, from viruses and worms to phishing attempts and malicious websites. 
  • We recommend using an Antivirus, 1-2 "stand-alone" scanning tools for general malware and adware scanning, as well as a maintenance/clean-up utility for removing junk/temp/cache/cookie data. 


In today's cybersecurity landscape, simply avoiding the download of random programs or EXE files is not enough to protect against infections. Malware delivery methods have become more sophisticated, targeting users through phishing emails, compromised websites, and even trusted sources like popular software vendors, as seen in the 3CX hack.


Malicious advertisements and social media platforms have also become significant vectors for malware distribution. Given this complexity, it's essential to use a multi-layered defense strategy. This includes installing and regularly updating trusted antivirus and antimalware software to provide essential protection against various threats.


Additionally, browser add-ons such as Malwarebytes Browser Guard offer critical extra layers of security by blocking malicious websites, protecting against phishing attempts, and enhancing overall browsing performance by removing unwanted ads.


Combining these tools creates a robust defense system, significantly reducing the risk of infection and providing comprehensive coverage against a wide range of cyber threats. By staying informed and proactive, users can better safeguard their systems and personal information from evolving cyber threats.

Monday, July 1, 2024

While we understand that prices on Amazon can be very competitive, there are several reasons why our prices might be slightly higher...


1. Quality Assurance: 

We source our parts from reputable suppliers who meet our strict quality standards. This helps us ensure that you receive reliable, durable, and high-quality parts. Amazon sellers can sometimes be not very well established 3rd sellers. There is also the risk of receiving "counterfeit" products from online sellers such as Amazon as well: https://www.aboutamazon.com/news/policy-news-views/amazon-counterfeit-crimes-unit-latest-updates-2024

2. Expertise and Support: 

Our team offers personalized service and expert advice that you won't get from an online marketplace. We can help you choose the right parts for your specific needs.

3. Warranty and Returns: 

We stand behind the products we sell. If you encounter any issues with a product or part, we make the process of replacement or return smooth and hassle-free by taking care of it for you.

4. Supporting Local Business: 

By purchasing from us, you are supporting a local business that contributes to the community. Your support helps us continue providing high-quality service in our area.

5. Value-Added Services: 

In addition to selling parts, we offer a range of value-added services such as maintenance, repair, and installation, which can save you time and ensure the job is done right.

We believe that these benefits provide significant value that justifies the price difference. We are committed to offering you the best possible service and ensuring your satisfaction with every purchase.