Archives 2025

Amazon Related Scams

Article (PSA-0031)

Why This Matters

Amazon serves millions of shoppers worldwide. Because of that huge customer base, scammers love to impersonate Amazon in order to steal money or personal data.

Amazon’s Official Stance

Amazon will never ask you for payment info, passwords, or personal details over the phone.

Common Scam Tactics

Off‑Platform Payments

  • How it works: A seller lists a product on Amazon, then contacts you with a link to pay via CashApp, Venmo, Zelle, or a wire transfer.
  • Why it works: You lose Amazon’s buyer‑protection and the scammer gets your credit‑card data directly.
  • What to do: Never pay outside Amazon’s checkout. If a seller asks for an alternate payment method, hang up and report the listing.

Phishing Phone Calls

  • How it works: Someone pretends to be an Amazon rep and asks you to “verify” your account by giving a password or credit‑card number.
  • Why it works: With over 220 million Prime members, scammers know a few will be waiting for a call back from Amazon support.
  • What to do: Never share passwords or payment info on an unsolicited call. End the call and call Amazon’s official number (888) 282‑395 (or use the Help page).

How to Spot a Fake Amazon Message

  • Look for a URL that ends in amazon.com or amazon.com/support. Hover over links to see the real address.
  • Beware of urgent language: “Your account will be closed in 5 minutes – click now.”
  • Legitimate Amazon emails will address you by name and never contain spelling mistakes.

What to Do If You Think You’ve Been Scammed

Scam‑Avoidance Checklist

  • ✔️ Amazon never asks for passwords or payment info over the phone.
  • ✔️ Verify every link – it must contain “amazon.com”.
  • ✔️ Never pay outside Amazon’s checkout.
  • ✔️ Hang up on suspicious calls; call Amazon’s official support line.
  • ✔️ Report any scam to Amazon and the FTC.

Need Help?

If you have questions or think you’ve been targeted, call us at (707) 506‑6802 and speak with a technician.

How do antivirus and antispyware work to protect you?

Article (PSA-0030)

Overview

Antivirus and antispyware are software tools that work together to keep your computer safe from viruses, spyware, ransomware and other unwanted programs.

Key Protection Features

1. Real‑Time Scanning

  • Continuously watches your system while you browse, download or run programs.
  • If a file looks suspicious, a pop‑up warns you right away.
  • What to do: Click **Quarantine** (or **Remove**) and then run a quick full scan.

2. Scheduled Scanning

  • Runs a deep scan of selected folders or the whole drive at a time you set (daily, weekly, …).
  • Finds hidden threats that may have slipped past real‑time checks.
  • Tip: Leave it on a night when you’re not using the computer.

3. Signature‑Based Detection

  • Uses a constantly‑updated list of known‑bad code called **definitions** (think of a “cheat sheet” for malware).
  • When a new virus appears, the vendor releases a fresh definition and your program downloads it automatically.
  • Keeping the program **licensed and up‑to‑date** guarantees you get the newest cheat sheet.

Why Up‑to‑Date, Licensed Software Matters

  • Only a current, licensed product receives the latest definitions.
  • Out‑of‑date software may miss brand‑new threats.
  • A licensed product also includes technical support if you ever get stuck.

Built‑In Windows Protection (Free)

  • Windows 10/11 includes **Microsoft Defender Antivirus**, **Microsoft Defender SmartScreen** (antispyware) and a built‑in firewall.
  • All three update automatically through **Windows Update** – no extra subscription needed.
  • For most home users these tools provide solid baseline protection.

Safe‑Browsing Habits (Bonus Tips)

  • Never click a link or open an attachment from an unknown sender.
  • Check the URL: genuine Amazon, Google, or bank sites start with https:// and show the correct domain.
  • Keep your operating system, browsers, and plugins (e.g., Flash, Java) patched.

Quick Security Checklist

  • ✔️ Enable real‑time scanning and automatic updates.
  • ✔️ Schedule a full scan at least once a week.
  • ✔️ Verify your antivirus/antispyware is licensed and not expired.
  • ✔️ Use the built‑in Windows firewall (or a reputable third‑party one).
  • ✔️ Practice safe browsing: verify links, avoid unknown attachments, keep software current.

Need More Help?

If you have a specific question about PC security or want a quick health check, call us at (707) 506‑6802 to speak with a technician.

Current Computer Security Landscape

Article (PSA‑0029)

Why This Matters

Every computer – whether it lives in a home office or a corporate data‑center – is a potential target for criminals seeking money or data. In October 2023 ransomware attacks were 66 % higher than a year earlier (Symantec). This increase shows how lucrative “locking you out” of your own files has become.

What Is Malware?

Malware is malicious software. It is a catch‑all term for any program that harms a computer without the user’s consent. The most common families are listed below.

Common Ways Malware Gets In

  • Infected email attachments
  • Compromised USB or thumb drives
  • Software downloaded from the internet
  • Links in emails, social‑media posts, or chat messages
  • Exploits in legitimate Windows apps and features (the “living‑off‑the‑land” technique)

Typical Malware Types (brief)

  • Viruses – Replicate themselves, slow or cripple a system, and can delete or corrupt files.
  • Spyware / Keyloggers – Record what you type and steal passwords, banking information, etc.
  • Adware – Show unwanted ads; sometimes the ads contain malicious links.
  • Scareware – Pretend to be an antivirus, claim you’re infected, and try to sell fake cleanup software.
  • Ransomware – Encrypt files and demand a ransom to unlock them. Often follows another infection.
  • Botnets – Networks of compromised computers used for spam, DDoS attacks, and other large‑scale threats.

How Attackers Do It Today

Recent research (Symantec) shows the main infection route is no longer massive botnets but exploiting known vulnerabilities in publicly‑facing applications. Attackers increasingly use legitimate Windows tools—remote‑desktop programs, PowerShell scripts, or built‑in admin utilities—to move laterally across a network. Because these tools appear normal, traditional antivirus signatures often miss them.

Why Everyone—Home or Business—Should Care

  • Financial loss – Ransom payments, fraud, or the cost of data recovery.
  • Legal risk – Breached customer data can trigger fines and lawsuits.
  • Reputation damage – Clients lose trust when you can’t protect their information.
  • Personal impact – Family photos, tax records, and other irreplaceable files could disappear.

Basic Steps to Stay Safe (Quick Checklist)

  • ✔️ Keep software up to date. Enable automatic Windows updates and patch third‑party applications.
  • ✔️ Use a reputable antivirus/antispyware suite and keep its definitions current.
  • ✔️ Enable the built‑in Windows firewall (or a trusted third‑party firewall).
  • ✔️ Back up important files regularly – at least weekly, using an external drive or a cloud service with versioning.
  • ✔️ Be skeptical of unexpected emails, links, or attachments. Hover to see the real URL before clicking.
  • ✔️ Limit admin privileges. Use a standard (non‑administrator) account for everyday activities.

If You Suspect an Infection

  • Disconnect the computer from the internet (disable Wi‑Fi/Ethernet).
  • Run a full scan with your security suite.
  • If ransomware messages appear, do NOT pay the ransom. Contact a professional (see phone number below).
  • Restore files from a clean backup if possible.
  • Change passwords for any accounts that may have been compromised.

Need Help Now?

If you think your PC is infected or you have questions about securing your network, call us at (707) 506‑6802 to speak with a technician.