Can I Just Unplug My Computer to Shut It Down?
You may damage your computer.
By pulling the plug or forcing a power-off by holding down the power button, you risk corrupting data on your hard drive and damaging hardware.
I’m not sure what kinds of problems you’re having with the power button, but even that needs to be used correctly, or you could end up with the very problems you’re seeing.
1.Report the scam
In Canada: Contact Law Enforcement
2.Report misleading ads
“TrustInAds.org comprises a group of Internet industry leaders that have come together to work toward a common goal: Protect people from malicious online advertisements and deceptive practices.” Report misleading ads here.
3.Shut down their remote software account
Write down the TeamViewer ID (9-digit code) and send it to TeamViewer’s support (they can later on block people/companies with that information)
LogMeIn: Report abuse
4.Spread the word
You can raise awareness by letting your friends, family, and other acquaintances know what happened to you. Although this may be an embarrassing experience if you fell victim to these scams, educating the public will help someone caught in a similar situation and deter further scam attempts.
If the scammers represent themselves as working with or for Malwarebytes, please make sure to contact Malwarebytes support – we are actively working to combat these scammers. Any information you can provide about these scammers will help us prevent those scammers from targeting other people.
If you already paid:
Contact your financial institution/credit card company to reverse the charges and keep an eye out for future unwanted charges.
If you gave them personal information such as date of birth, Social Security Number, full address, name and maiden name you may want to consult the FTC’s website and report identity theft.
If you have been contacted by a company that you think may be attempting to scam you, please see the following list of confirmed scammers (please make sure to click on the “Tech Support Blacklist” link for the up-to-date list).
HP Recalls Batteries for Notebook Computers and Mobile Workstations Due to Fire and Burn Hazards
This recall involves lithium-ion batteries for HP Notebook computers and mobile workstations. The batteries were shipped with or sold as accessories for HP ProBooks (64x G2 and G3 series, 65x G2 and G3 series), HPx360 310 G2, HP Envy m6, HP Pavilion x360, HP 11, HP ZBook (17 G3, 17 G4, and Studio G3) Mobile Workstations. The batteries were also sold as accessories or replacement batteries for the HP ZBook Studio G4 mobile workstation or for any of the products listed above.
Consumers should immediately visit www.HP.com/go/batteryprogram2018 to see if their battery is included in the recall and for instructions on how to enable “Battery Safety Mode” if their battery is included in the recall. The website provides consumers instructions on how to initiate the validation utility to check their battery and what to download if their battery is included in the recall. These batteries are not customer-replaceable. HP will provide free battery replacement services by an authorized technician.
HP has received eight reports of battery packs overheating, melting, or charring, including three reports of property damage totaling $4,500 with one report of a minor injury involving a first degree burn to the hand.
Best Buy and other stores and authorized dealers nationwide and online at www.Amazon.com, www.hp.com and other websites. The batteries were shipped in notebook computers and mobile workstations sold from December 2015 through December 2017 for between $300 and $4,000. The batteries were also sold separately for between $50 and $90.
HP Inc., of Palo Alto, Calif.
If you are looking for the best Computer Repair in San Antonio Texas and surrounding areas like Live Oak, Converse, Windcrest, Selma and Schertz consider SAPC Upgrades for affordable fair priced Computer Repair.
- Protecting your DATA is our #1 goal
- Fair Flat Rate in shop/remote pricing
- Free Estimates
- Malwarebytes Authorized Reseller
- Friendly, honest communication, no “geek-speak”
- Professional, experienced technician
- Microsoft Registered Partner
- Locally owned and operated since 2003
- We strive to build lasting relationships with our customers
SAPC Upgrades offers many quality computer repair services.
This is a public service security announcement for all users of computers running any version of Windows.
We have confirmed that a serious virulent ransomware threat known as WannaCrypt0r/WannaCry has affected Windows computers on shared networks in at least 74 countries worldwide, with 57,000 reported individual cases being affected. And according to the analysis team at Kaspersky Lab, that number is growing fast.
Once one computer on a network is affected, the malware infection easily spreads to other Windows computers on the same network, shutting down entire government agencies and national infrastructure companies. Hospitals across the UK were being forced to divert patients and ambulance routes as of Friday afternoon, and several utility companies across Europe reported infection across their computer networks according to BBC News.
What Is Ransomware?
Ransomware is a kind of malicious script or software that installs itself on your computer without your knowledge. Once it’s installed and running, it will lock down your system and won’t allow you to access any files or programs on that computer. Usually, as in this current WannaCry exploit, it will alert you to the lockdown with an impossible-to-ignore pop-up screen which informs you that your computer is being held for ransom. To unlock your system and regain access to the computer being held hostage, the lock screen informs you that you must purchase an unlock tool or decryption key from the hacker.
Where Did This Threat Originate?
In this case, Microsoft has been aware of the vulnerability since March 2017, when it published a Security Bulletin covering the potential risk. According to the Spanish newspaper El Mundo, early indicators seem to point to the attack originating in China, but more information is needed.
How Can You Tell If Your Computer Is Infected?
The most obvious way to tell if your computer has been affected is if you are seeing a ransomware pop-up screen when you start up your computer. But because we don’t know how long the malware sits on your computer or network, not seeing this pop-up isn’t necessarily an indication that you haven’t been infected. The bottom line: if your Windows computer has connected to a shared network, such as those found in schools, public places, cafes and businesses, and you don’t have complete control over every computer on that network and haven’t been keeping Windows up-to-date, your computer may be infected.
How to Protect Yourself From the Vulnerability
According to Microsoft a fix for this vulnerability was released on March 14th for all affected versions of Windows. If you are running Windows and have automatic updates enabled you should be okay. If you don’t and haven’t updated recently you should update to the most recently released version immediately. It is important to note that unsupported versions of Windows, like XP, did not receive this security update. Those systems should either be isolated or shut down.
Please pass this along to your friends and family. Those that are less technical may not have updates auto-enabled, and may need a helping hand updating their operating system.
Massive Ransomware Outbreak
We have an update on this outbreak here. The ransomware is using an NSA exploit leaked by The Shadow Brokers, and has made tens of thousands of victims worldwide, including the Russian Interior Ministry, Chinese universities, Hungarian telcos, FedEx branches, and more. Original article below.
A ransomware outbreak is wreaking havoc all over the world, but especially in Spain, where Telefonica — one of the country’s biggest telecommunications companies — has fallen victim, and its IT staff is desperately telling employees to shut down computers and VPN connections in order to limit the ransomware’s reach.
The culprit for these attacks is v2.0 of the WCry ransomware, also known as WannaCry or WanaCrypt0r ransomware. For those affected, you can discuss this ransomware and receive support in the dedicated WanaCrypt0r & Wana Decrypt0r Help & Support Topic.
WCry ransomware explodes in massive distribution wave
Version 2.0 was detected for the first time around four hours ago by independent security researcher MalwareHunter. The security researcher says the ransomware came out of nowhere and started spreading like wildfire.
In these first four hours, WCry 2.0 made more victims than Jaff, a ransomware spotted this week distributed via the Necurs botnet, the former home of the Locky ransomware. In numbers, in just four hours WCry made 1.5 times more victims than Jaff did all week.
Currently, researchers weren’t able to pinpoint the exact origin of the WCry distribution campaign. At the moment, it could be from malvertising, exploit kits, email spam, or hand-cranked RDP attacks.