Welcome to MAD Computer Solutions Ltd...

Apples New Event To Be Held On The 9th September

Posted By on September 8, 2014

avatar

Apple has set the date to be the 9th of September 2014 for their latest big event which leaves us all wondering; What exactly will the company unveil?

An invitation sent to media members on Thursday said “wish we could say more”

In the past few months, multiple reports and rumours have suggested that Apple plans to bring out two separate versions of the iPhone 6 this year, with screens that are 5.5 inches and 4.7 inches, when measured diagonally.

Apple was granted permission for a smart watch in July and it has been suggested that the upcoming event will hold the debut for the smart watch. The smart watch device is expected to have a heavy focus on health and fitness apps and will be competing with big brands such as Samsung.

The Apple event will be at the Flint Centre for the Performing Arts in California.




Jennifer Lawerence And Other Celebrity Nude Leaks Sparks Internet Fear Of Mass Celebrity Hackings

Posted By on September 2, 2014

avatar

Naked photos of 101 various celebrities including the likes of Jennifer Lawerence, Kate Upton and Mary E. Winstead were leaked online through the anonymous forum known as ‘4chan’  by alleged, un-named hackers who apparently used ‘Brute force‘ to hack into the celebrities iCloud account to gain access to all of their pictures uploaded to the cloud.

 

Although so many celebrities private pictures were leaked, it is speculated that even more are to come as they have been claimed to be acquired by one of the hackers however they are yet to be circulated online. Jennifer Lawerence’s representative confirmed the authenticity of the images and said that they leaked photos are “A flagrant violation of privacy”. 

Legal action is being taken with these photographs at the request of various victims, the FBI is now involved and has said that any one posting these stolen pictures will be prosecuted. 




New Facebook Messenger App Has Extensive App Permissions

Posted By on August 20, 2014

avatar

facebook messengerThe newly released Facebook Messenger application has been recorded to have been downloaded over 500 million times on android phones alone despite the constant onslaught about it
from the public.

Upon releasing the Facebook Messenger app, a policy was added to it to force the users to install the separate messenger app to continue to use the Facebook chat on smartphones or tablets. Some of the application permissions are the following;

  • Allows the app to call phone numbers without your intervention (which may result in unexpected charged or calls)
  • Allows the app to record audio with your built in microphone, which allows the app to record audio at any time without your confirmation.
  •  Allows the app to take pictures as well as videos with the camera, this allows the app to use the camera at any time without your confirmation.
  • Allows the app to send SMS (text) messages. This could result in unexpected charges.

All of these permissions seem a little sinister and malicious as with all of these, Facebook can literally record every conversation, text message and camera footage that your phone or tablet takes! This is what the public have been very concerned with as they do not trust Facebook with all of this ‘power’ that they have to use the app for malicious reasons, which has caused the app to be rated 1 star on the app store by the public. Although this is a free application with no in app purchases, it is clear that Facebook is making money on this by exploiting user data to companies and the government.




Fear Of Ebola Being Used To Steal Passwords Via Email!

Posted By on August 19, 2014

avatar

As news of the Ebola virus is spreading faster than the disease in West Africa, cyber criminals have been using the disease as a way to steal peoples passwords through emails.

A blog post made by Symantec mentions the different ways these criminals use to try and make people install different viruses onto their computers, such as; Phishing viruses (can be used to steal passwords and sensitive information) trojan viruses and mole viruses. Symantec’s blog -which was mentioned above- shows details on the criminals methods in which they use to get people to install these viruses, two of the campaigns use fake Ebola reports in the form of a power point as attachments. The people that download the attachments get infected with the trojan.Zbot virus and in the second campaign the cyber criminals send out an email that is impersonating a telecom provider which has a presentation attaches about the Ebola virus, the title for this is usually; “EBOLA – Presentation.pdf.zip” which actually runs and executed the trojan.blueso virus on the email readers computer.

The cyber criminals are also using fake websites to gain passwords, by stating that there has been a cure made for Ebola which is untold to the public, they then leave a link for the victim to click on which will then take them onto a fake website which they will be required to log in. Once the victim has entered their details the hackers will have access to their username and password which they entered and will be able to use that for any reason they like.

Here at MadComputerSolutions, we advise you to be safe with your emails and always be on the look out for suspicious and spontaneous emails, and if anything seems odd about an email, be cautious and don’t download any attachments or log in to any strange websites that have been linked.




CryptoLocker virus storms the internet

Posted By on June 20, 2014

avatar

What is CryptoLocker?

CryptoLocker is the most destructive windows virus ever created in a series of ransomware Trojans. The combination of its high demand for money and the short space of time given to pay make it far more threatening than other similar viruses.

Hackers have managed to create a programme called ‘CryptoLocker’, a virus that encrypts your files and demands a ransom of $300. So let’s say you’re happily working on your computer and all of a sudden without realising, all of your personal files are quickly being encrypted without your knowledge. Suddenly you will no longer be able to access your files, and an alert will appears on your screen telling you that you have approximately 4 days to either pay $300 to get an encryption key, or have all of your personal files encrypted permanently. You are against the clock as you see it ticking before your eyes, counting down to the inevitability of your end decision. With CryptoLocker, there is no way of getting out of it other than paying the ransom which is so horribly charged. Removing the software from your computer only makes the potential of the encryption key being deleted, therefore getting your files back an impossibility.

How to prevent an infection

The CryptoLocker virus is being spread mainly as attachments on emails, usually hidden as an invoice, with the message that “your invoice is attached”. Be wary of emails from unknown sources, especially with an attachment. If in doubt delete it.

Most preventions of the infection would need to be done before you are actually infected in order for them to work. You can back-up your personal files onto USB sticks, CD’s, Hard drives and even online onto the cloud, which means that if you are unlucky to be struck by the CryptoLocker virus, then even though you may have your files encrypted on your computer, then a backup of them will be safe and sound on a device or online, un-touched and ready to be used.
It is always worth having anti-virus software such as AVG, McAfee or Sophos, in order to ensure the safety of your computer against most viruses, and to scan your computer regularly to make sure that there are no existing viruses that may be of threat to your computer.

If you manage to get CryptoLocker on your computer, it is advised to turn your computer off right away as this will prevent the spread of infection across your files. If you have backed up your files and have anti-virus then you are safe to remove it as your files will already be backed up and the virus will not be able to do anything once it is removed.

What if I have not backed up my files?

Unfortunately if your files aren’t backed up after you get the virus then there isn’t much more you can do other than pay the ransom, it has been reported by some victims that paying the ransom does work and is your best hope for getting the encrypted files back.
We need to make the internet aware of this virus as it is spreading like wildfire, make sure your employees, your friends and your family know that this virus is out there to ensure their computers are safe.

Free AVG anti-virus




Ebay Hacked!

Posted By on June 2, 2014

avatar

On the 21st of May 2014, eBay’s corporate network database was hacked, with all users’ passwords being compromised they had to act quick. eBay states that there has been no evidence submitted that users’ financial information had been accessed by the hackers, however the company is telling all users to change their passwords as soon as possible.ebay hacked

eBay contacted CNET saying that it recently discovered that it was a victim of “a cyber attack on our corporate information network, which compromised a database containing ebay user passwords.” The companies spokesperson Evan Davis told CNET that there is “no evidence that any financial information was accessed or compromised.”

Since the hacking, eBay has posted on their official website www.eBay.co.uk urging people to change their passwords.

The database which eBay said was compromised held eBay customer’s names, encrypted passwords, email addresses, physical addresses, phone numbers and dates of birth records. Despite this, the company states that users financial information was not accessed.

 

 




Computer Support and Repair In Rubery : Frankley : Northfield : Longbridge : Bromsgrove : Quinton : Worcester : Selly Oak : Barnt Green : Kings Heath : Birmingham : Halesowen : Harborne : Kings Norton : Rednal : Solihull : Maypole : Lickey : Bournville : Stourbridge : Oldbury : Catshill : Droitwich : Edgbaston : Redditch : Kidderminster : Hagley : Dudley : Walsall : Wolverhampton : Sandwell : Sutton Coldfield : Stourport : Server Support : Virus Removal : Web Design : Privacy Policy : Contact Us