31 Jan 2021

And Then, Scams...

   Over the past few weeks I’ve noticed an increase in suspect Email. Firstly, as I’ve mentioned before, I use Pop Peeper – spookily, the free version - to check and read mail while it’s on the server and delete right from the server any mail I don’t need or is suspect; thus no dodgy stuff gets close to my computer. There are many mail checkers out there and many Email software programs also have this ability.
   However, one thing I can’t find a definitive answer to is this; is it safe to open a suspect Email attachment while the mail and attachment is on the server? My own thoughts? Don’t risk it at all.
   Okay, I know, mail from unknown senders with dodgy subject lines, and that isn’t always the case, should be deleted without opening and that is indeed wot I done do right there on the server.
   But all these mails always seem to have a PDF file attached and for sure  it’s hard to contain human curiosity as to wot these PDF files could be about{?}. That goes for me too as I’ve had mails stating; PDF Invoice For Payment Month End Attached. An invoice? For wot? Better open it and find out who thinks I owe them money. Stop right there as fortunately, I also know that curiosity can kill the computer thus, as stated, I delete all such mail right there off the server. But, but, but wot’s that PDF file all about? If I’m curious, how many folk just go ahead and open those files while the mail is sitting on their devices? And at wot cost?
   Another observation: Those irritating cookie banners that clutter-up Web pages until accepted, weren’t they an EU directive? If so, now we’re out – and I use ‘out’ in its simplest meaning – can those screen eating, click demanding banners be accepted into the history bin now? 
   Woah!! A post with no mention of co-co or vaccines... Oh, I just did.

Quote;  Confucius.

“Life is really simple, but we insist on making it complicated.”

2 comments:

Ripper said...

Mac, when you open a mail or view an attachment, it doesn't matter where it is - the attachment (say a pdf) has to download into the computer memory so that your pdf viewer can load it. Its the same for everything and that's when malicious code runs.

With the pdf files, most of them are scaremongering, though some of them are .exe files with the .pdf extension. The scammers usually hope to panic you with an authentic looking invoice, so that you will click on the link given and give bank details. That's what most scams are about nowadays, rather than trying to kill your PC.

Ever heard about or had the Microsoft Tech Support scam? This is where your PC seems to get locked (fake), with only a phone number on the screen. When you call the number you get a call centre in Dheli who will take a lot of money off you and do zip to fix it - after all there's nothing wrong in the first place.

They will have you downloading RAS (Remote Admin) software and take control of your machine, and while doing a useless command like dir/c they are in the background searching through all your personal files.

However, these scammers are terminally stupid, since the connection can easily be reversed, which gives you access to their computer, and if that's on a network, ALL of their computers. And more...

The number 1 guy (in my opinion) in handling scum like this is Jim Browning. Take a look at his video from last year (in 4 parts). I'm sure you will find it very interesting indeed.

https://www.youtube.com/watch?v=le71yVPh4uk Part 1
https://www.youtube.com/watch?v=uV-qa9M-o4E Part 2
https://www.youtube.com/watch?v=jTXN9iTKHc8 Part 3
https://www.youtube.com/watch?v=G15xjQM-rGc Part 4

Mac said...

Ripper,
Many thanks; front and centre for the good of all.