قالب وردپرس درنا توس
Home / Insurance / Hard Lesson Learned: A Hacker Victim & # 39 ;s Story

Hard Lesson Learned: A Hacker Victim & # 39 ;s Story



  Blog Template - 600 x 380 (60)

Since October last year, I always try to dial my phone's caller if I'm not working, and I'm much more convinced. to make a call. Like many people, it seemed that my phone would be silenced a lot due to the constant alarms and warnings. If I had heard and answered my phone on October 18, 2019, I would probably have saved my future mother-in-law $ 1,000 by preventing fraudsters from accessing her computer.

I had just come home from a college class and had hung up my phone while doing homework. It rang but I did not know. When I finally checked my phone, I saw the missed calls and tried to call back my mother-in-law, but she did not pick up. An hour passed before my fiancée finally called me cool because her mother's computer was hacked!

I rushed over to their house and immediately saw the stress in her mother's eyes. She had been the victim of a convincing speech about her "critical computer problem." She gave these people money to fix it without even realizing who they were or what the problem was.

I immediately changed all her settings as strictly as possible and made sure that all access to the computer via external sources was turned off. As a programmer, I know that if a scammer could get into her computer, they could try to embed something that would give them access to steal more information. One of my concerns was that they could have installed a Key Logger on her computer. This allows passwords and sensitive data to be sent to them when she typed them on her computer. I eagerly searched for her system and files and found a Key Logger file. I removed it immediately.

You may be asking yourself, how did all this happen? How did she get into a position that allowed a fraudster into her computer? She is not alone. According to Microsoft's digital crime unit, in 2018 a total of about $ 1.5 billion was stolen from about 3.3 million users due to online scams. She became part of that statistic for 2019.

In my mother – in – law's case, she followed a link on Pinterest and ascreen appeared, saying her computer was hacked and called Microsoft. Following random links is a great way to get an unwanted person into your computer. Never follow a link if you do not know where it's going, and never ever download things from random websites. large, bold pressure. The self-taught voice at the beginning of the conversation sounds real to Microsoft, so she did not guess. At this point, she was just worried that she would lose all the photos and important information on her computer. They thought she was talking to Microsoft and informed her that for security reasons they do not accept personal credit cards or PayPal. Her only safe option was to go to the store and buy two $ 500Google Play Store gift cards and pay with them. They gave her a time limit and told her that the computer would be wiped by the so-called "hackers". She reluctantly told angled shewent to the store and came back with the cards, then used a remote desktop connection to let them enter her computer to "fix" the problem. The gift card numbers in the Google Play Store were recorded in a text file for her secure payment as the AUTHOR hackers write random commands to the computer, just like you would see in a movie. When the page went away he hung up and was never heard from him again.

A difficult lesson. Although I still can not understand how anyone falls for this system, it became real that day. I took her through a computer crash course on how to avoid this next time:

  • Press CTRL – ALT – DELETE.
  • Open the task manager.
  • Right-click on the browser.
  • Touch “Exit Task. ”

Boom! Problem solved! Be careful when searching online and always be careful who you allow to "help" you with your computer problems. If the method sounds nice, it probably is. Always make sure that you have backed up your data data and that your personal information is safe on your computer or not at all. If you think you have been hacked, contact someone reputable immediately to help you solve the problem.

Another way to protect yourself is to invest in cyber insurance . Many insurance companies offer solutions for both personal and business protection. Contact your independent agent to learn more about these coverages and how they can protect you, your family and your business from the effects of cybercrime.

Finally, I want to share this video. Many people do not think about the consequences of clicking on a link or attachment in an email containing a virus, but the ripple effect of a single click can quickly become a tide of trouble! Look below to learn more about protecting not only yourself but your employment!

Copyright © 2020 Central Mutual Insurance Company. All Rights Reserved.


Source link