<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>identity theft Archives - A1 Computer Repair</title>
	<atom:link href="https://a1computerrepair.com/tag/identity-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://a1computerrepair.com/tag/identity-theft/</link>
	<description>Computer Services</description>
	<lastBuildDate>Thu, 02 Jun 2022 22:06:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Free Software Isn&#8217;t Free and Installing It Can Cost You</title>
		<link>https://a1computerrepair.com/free-software-isnt-free-and-installing-it-will-cost-you-plenty/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 23 Jan 2015 02:56:25 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[free download]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[PC Tips]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[Scum Ware]]></category>
		<category><![CDATA[scumware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows tips]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=1282</guid>

					<description><![CDATA[<p>Freeware isn’t actually free software, and we’re all paying for it now. We regularly tell our customers to be very careful when installing free software because it generally carries a hidden payload of crappy software with it. Most computer tune-ups we perform for our customers begin with the removal of a bunch of free, useless [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/free-software-isnt-free-and-installing-it-will-cost-you-plenty/">Free Software Isn&#8217;t Free and Installing It Can Cost You</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Freeware isn’t actually free software, and we’re all paying for it now. We regularly tell our customers to be very careful when installing free software because it generally carries a hidden payload of crappy software with it.</p>



<figure class="wp-block-image"><img decoding="async" src="/wp-content/uploads/2015/01/free-software-not-free.png" alt="Free Software Isn't Free" title="free-software-not-free"/></figure>



<p>Most computer tune-ups we perform for our customers begin with the removal of a bunch of free, useless programs that are sapping the life out of our customer&#8217;s computers. In most cases they did not even install this pesky software, they installed something else that snuck the bad software into their computer as a hidden payload.</p>



<p>The folks over at <a href="http://www.howtogeek.com" target="_blank" rel="noreferrer noopener nofollow">http://www.howtogeek.com</a> went to the leading software download sites and grabbed the top ten software recommendations and here is what happened when they installed it. Check out the results, you will be surprised. Do you and your computer a favor and stay clear of free software, when it comes to software, you really do get what you pay for.</p>



<h4 class="wp-block-heading"><a href="http://www.howtogeek.com/207692/yes-every-freeware-download-site-is-serving-crapware-heres-the-proof/" target="_blank" rel="noreferrer noopener nofollow"><i>Every</i> Freeware Download Site is Serving You Crapware (Here’s the Proof)</a></h4>
<p>The post <a href="https://a1computerrepair.com/free-software-isnt-free-and-installing-it-will-cost-you-plenty/">Free Software Isn&#8217;t Free and Installing It Can Cost You</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bank Account Stealing Malware Returns</title>
		<link>https://a1computerrepair.com/bank-account-stealing-malware-returns/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 22:33:33 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[ransom ware]]></category>
		<category><![CDATA[Scum Ware]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[windows security]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=870</guid>

					<description><![CDATA[<p>Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say. The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which officials said infected up to one million computers in 12 [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/bank-account-stealing-malware-returns/">Bank Account Stealing Malware Returns</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say.</p>



<figure class="wp-block-image"><img decoding="async" src="/wp-content/uploads/2014/07/Bank-Account-Stealing-Malware-Returns.jpg" alt="Bank Account Stealing Malware Returns" title="Bank Account Stealing Malware Returns"/></figure>



<p>The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which officials said infected up to one million computers in 12 countries, and was blamed in the theft of more than $100 million.</p>



<p>&#8220;This discovery indicates that the criminals responsible for Gameover&#8217;s distribution do not intend to give up on this botnet even after suffering one of the most expansive botnet takeovers/takedowns in history,&#8221;.</p>



<p>By infecting large numbers of computers, the cybercriminals were able to control the devices to steal passwords and send out emails to further spread the infection.</p>



<p>The news came as the Department of Justice said it had made progress in rooting out the malware infections.</p>



<p>In a status report filed in court, officials said that &#8220;all or nearly all of the active computers infected with Gameover Zeus have been liberated from the criminals&#8217; control and are now communicating exclusively with the substitute server established pursuant to a court order.&#8221;</p>



<p>A blog post by the security firm <a href="http://www.emsisoft.com/en/" target="_blank" rel="noreferrer noopener nofollow">Emsisoft</a> said the new variant may be harder to combat because it is using &#8220;an evasive technique that allows the botnet to hide its distributive phishing sites behind a constantly shuffling list of infected, proxy computers.&#8221;</p>



<p>Gameover Zeus, which first appeared in September 2011, stole bank information and other confidential details from victims.</p>



<p>The FBI blamed the Gameover Zeus botnet for the theft of more than $100 million, obtained by using the stolen bank data and then &#8220;emptying the victims&#8217; bank accounts and diverting the money to themselves.&#8221;</p>



<p>The June crackdown also targeted another computer virus, dubbed &#8220;Cryptolocker,&#8221; which appeared in September 2013.</p>



<p>Russian Evgeniy Mikhailovich Bogachev, 30, an alleged administrator of the network, was charged in Pittsburgh, Pennsylvania, with 14 counts including conspiracy, computer hacking, bank fraud, and money laundering in the <a href="http://www.us-cert.gov/ncas/alerts/TA14-150A" target="_blank" rel="noreferrer noopener nofollow">Gameover Zeus</a> and <a href="/free-cryptolocker-malware-protection/" target="_blank" rel="noreferrer noopener">Cryptoblocker</a> schemes.</p>



<p>Originally from: http://news.yahoo.com/bank-stealing-malware-returns-us-crackdown-193233883.html</p>
<p>The post <a href="https://a1computerrepair.com/bank-account-stealing-malware-returns/">Bank Account Stealing Malware Returns</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keyloggers &#8211; Keystroke Logging Software Threats</title>
		<link>https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 24 Nov 2013 21:46:28 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[key logger]]></category>
		<category><![CDATA[key loggers]]></category>
		<category><![CDATA[keylogger]]></category>
		<category><![CDATA[keylogger removal]]></category>
		<category><![CDATA[keyloggers]]></category>
		<category><![CDATA[keystroke logging]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[spyware prevention]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=746</guid>

					<description><![CDATA[<p>A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/">Keyloggers &#8211; Keystroke Logging Software Threats</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware.png" alt="Keyloggers---Keystroke-Logging-Software-and-Hardware" title="Keyloggers---Keystroke-Logging-Software-and-Hardware"/></figure>



<p>For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information.</p>



<p>Keyloggers can be either software or hardware-based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware-3.jpg" alt="Keyloggers - Keystroke Logging Software and Hardware 3" title="Keyloggers - Keystroke Logging Software and Hardware 3"/></figure>



<p>As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user’s privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potentially obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal users’ personal documents, money, or even their identity.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware-2_thumb.gif" alt="Keyloggers - Keystroke Logging Software and Hardware 2" title="Keyloggers - Keystroke Logging Software and Hardware 2"/></figure>



<p>A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot-up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including:</p>



<p>· Undetectable in the process list and invisible in operation</p>



<p>· A kernel keylogger driver that captures keystrokes even when the user is logged off</p>



<p>· A remote deployment wizard</p>



<p>· The ability to create text snapshots of active applications</p>



<p>· The ability to capture http post data (including log-ins/passwords)</p>



<p>· The ability to timestamp record workstation usage</p>



<p>· HTML and text log file export</p>



<p>· Automatic e-mail log file delivery</p>



<p>All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor websites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its keylogging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo’s password and gain access to the needed file.</p>



<p><a href="http://a1computerrepair.com/computer-repair-services/">A1 Computer Repair</a> – Malicious Software Removal Experts</p>
<p>The post <a href="https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/">Keyloggers &#8211; Keystroke Logging Software Threats</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Phishing? Phishing and Identity Theft</title>
		<link>https://a1computerrepair.com/what-is-phishing-phishing-and-identity-theft/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 23 Nov 2013 08:43:27 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti phishing]]></category>
		<category><![CDATA[e-mail fraud]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=738</guid>

					<description><![CDATA[<p>Scammers and Hackers are Phishing For Your Identity Who hasn&#8217;t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/what-is-phishing-phishing-and-identity-theft/">What is Phishing? Phishing and Identity Theft</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Scammers and Hackers are Phishing For Your Identity</strong></p>
<p><img fetchpriority="high" decoding="async" style="background-image: none; border: 0px; margin: 0px 5px 5px 0px; padding-left: 0px; padding-right: 0px; display: inline; padding-top: 0px;" title="what is phishing" alt="what is phishing" src="http://a1computerrepair.com/wp-content/uploads/2013/11/what-is-phishing_thumb.jpg" width="237" height="300" align="left" border="0" />Who hasn&#8217;t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you&#8217;ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.</p>
<p>Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.</p>
<p>It is not as easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The &#8220;From&#8221; field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company&#8217;s website, when in fact, it is a fake website built to replicate the legitimate site.</p>
<p>Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the &#8220;From Field&#8221; can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.</p>
<p>A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.</p>
<p>Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.</p>
<p>The post <a href="https://a1computerrepair.com/what-is-phishing-phishing-and-identity-theft/">What is Phishing? Phishing and Identity Theft</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Personal Computer Security, The Threats and Solutions</title>
		<link>https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Nov 2013 09:08:00 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spyware prevention]]></category>
		<category><![CDATA[Virus Removal]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=695</guid>

					<description><![CDATA[<p>When it comes to computer security, many of us live in a bubble of blissful ignorance. We might be vigilant and never open email attachments from people we don&#8217;t know, we might take care to make sure an eCommerce site is secure before entering our credit card information, or we might even go so far [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/">Personal Computer Security, The Threats and Solutions</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><img decoding="async" style="background-image: none; margin: 0px 6px 6px 0px; padding-left: 0px; padding-right: 0px; display: inline; float: left; padding-top: 0px; border: 0px;" title="personalcomputersecurity" src="http://a1computerrepair.com/wp-content/uploads/2013/11/personalcomputersecurity.jpg" alt="personalcomputersecurity" width="300" height="229" align="left" border="0">When it comes to computer security, many of us live in a bubble of blissful ignorance. We might be vigilant and never open email attachments from people we don&#8217;t know, we might take care to make sure an eCommerce site is secure before entering our credit card information, or we might even go so far as to install a standard firewall on our computers. Unfortunately, much of the common sense advice we follow when it comes to Internet security does little to combat the cybercrime that is rampant.</p>



<p>Federal Trade Commission</p>



<p>Even the U.S. Federal Trade Commission, a governmental agency that is designed to help consumers, had to issue a press release stating that &#8220;consumers, including corporate and banking executives, appear to be targets of a bogus e-mail supposedly sent by the Federal Trade Commission but actually sent by third parties hoping to install spyware on computers.&#8221;</p>



<p>There&#8217;s little doubt that spyware, malware, and insidious virus attacks make any computer with Internet access vulnerable. But, because not all Internet security breaches are immediately apparent, people are often unaware that their seemingly hassle-free computing is anything but. The Federal Trade Commission offers seven guidelines to help consumers surf the Web safely:</p>



<p><strong>1. Protect your personal information.</strong> For example, when shopping on an eCommerce site, make sure that the page where you enter your personal information is secure, as designated by &#8220;https&#8221; before the URL. It&#8217;s important to stop identity theft before it starts.</p>



<p><strong>2. Know before you click.</strong> For instance, many cyber-criminals impersonate legitimate businesses or send &#8220;phishing&#8221; email that asks you to click a hyperlink. Check out the online merchants and never click on emailed hyperlinks unless you&#8217;re certain of the source.</p>



<p><strong>3. Update anti-virus, anti-spyware, and firewall software often.</strong> Hackers and others who engage in cybercrime seem to always be a step ahead of the good guys. If your computer protection is outdated, you&#8217;re vulnerable.</p>



<p><strong>4. Use a </strong>Web browser and operating system security features. Make sure your browser settings give you optimal privacy and security and ensure that you update your operating system regularly to take advantage of security patches.</p>



<p><strong>5. Safeguard your passwords.</strong> For example, create a unique password for each site you visit, and keep them in a secure place. Use letter, number and symbol combinations that can outsmart automated password detection programs.</p>



<p><strong>6. Always do backups</strong>. If your computer does get a virus or a worm, your files may be goners. Make sure to regularly back up any important files and store them in a secure place.</p>



<p><strong>7. Prepare for emergencies.</strong> If something does go wrong, such as your computer being hacked or infected, or if you accidentally divulge personal information, know what courses of action you should take to remedy the situation and prevent further problems.</p>



<h2 class="wp-block-heading">A1 Computer Repair Services Can Help</h2>



<p>Protecting your computer from all of the threats in cyberspace can seem like a full-time job. Our <a href="http://a1computerrepair.com/computer-repair-services/">computer repair service</a> provides full system optimization, problem diagnosis and repair, installation assistance, and a full complement of security services for your home or business like backup and cloud computing. You pay a small monthly subscription fee and in turn can surf the Web knowing that your computer is locked down and that you&#8217;ll never again have to stay abreast of the latest security software or lug your computer down to a high-priced repair center. <a href="http://a1computerrepair.com/contactus/">Contact us</a> for more information on securing your personal or business computer today.</p>
<p>The post <a href="https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/">Personal Computer Security, The Threats and Solutions</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
