Entries in Computer Hacking (3)


Scammers Hacking Victims' Computers by Calling on the Phone

iStockphoto/Thinkstock(NEW YORK) -- Con artists are using old-fashioned technology to gain access to consumers' newfangled technology.

Here's how it works: A crook calls you on the phone, poses as a technician from a big company like Microsoft, and claims he's detected a virus on your computer.  The crook then asks for access to your computer in order to "help" you.

From there, the scheme can devolve into several different money-making ploys, according to the Federal Trade Commission.  The con artist may:

  • Ask for remote access to your computer and then change your settings in a way that makes your computer -- or the information on it -- vulnerable.
  • Enroll you in an expensive -- but worthless -- computer security, maintenance or warranty program.
  • Trick you into installing malware that then snags your private information, like passwords or financial details.
  • Ask for your credit card information and steal it or use it to bill you for fake services or services that are readily available for free.

As ABC News' consumer correspondent Elisabeth Leamy points out, this is where her oldest and best advice -- "be the hunter, not the hunted" -- comes into play.  In other words, learn to be skeptical of any stranger who comes at you claiming urgency and demanding money.

Instead, take the time to do your own search, says Leamy.  Find a published help line number for your hardware or software manufacturer or Internet service provider and dial it yourself.  Don't rely on any phone number or website the caller provides, as it may be a fake.

And be careful where you look up the contact information you need, Leamy advises.  A large company's home page is a good place to start.  An online ad is not so reliable, because the FTC says con artists have begun boldly placing ads containing false information in order to build an aura of realism around themselves.

If you have already fallen victim to one of these schemes, follow these steps:

  • Use legitimate security software to run a scan and see if there is malware or virus activity on your computer.
  • If you gave the caller any passwords, change them for the account in question and any other accounts for which you use the same passwords.
  • If the caller charged bogus services to your credit card, call the card company and insist that those charges be reversed.
  • If you think personal financial information may have been stolen, order your free credit reports at, created by the Fair Credit Reporting Act, and check for suspicious activity.
  • If you verify that you are a victim of identity theft, the Federal Trade Commission has an entire website to guide you through fighting back, and you can find it by clicking here.

Copyright 2013 ABC News Radio


Mac OS X Report: Virus Infects 600,000 Computers

Courtesy of Apple(NEW YORK) -- More than 600,000 Apple computers worldwide have been infected with the Flashback Trojan, leaving their system’s security vulnerable to criminal hackers, Russian anti-virus firm Dr. Web reported.

Over half of the infected computers are in the United States, and nearly 20 percent are in Canada.

“This once again refutes claims by some experts that there are no cyber-threats to Mac OS X,” the report stated.

The trojan began quietly circulating in September under the guise of an Adobe Flash Update.  Once installed, the virus disables some security features allowing hackers to gain control of the computer.

Later versions of the malware used weaknesses in the Java language to install the code and infect the machine.

Apple released a security patch for users to download and protect their Macs this week; users who have not yet installed the patch remain exposed.

“People used to say that Apple computers, unlike Windows PCs, can’t ever be infected -- but it’s a myth,”  Timur Tsoriev, an analyst at Kaspersky Lab in Russia, told the BBC.´╗┐

Copyright 2012 ABC News Radio


FBI and DOJ Investigate NASDAQ Computer Hacking

Photo Courtesy - Getty Images(NEW YORK) -- NASDAQ released a statement Monday confirming the intrusions into their Director’s Desk program, which was reported by The Wall Street Journal over the weekend.  The investigation into who installed malware onto the system has been ongoing for over a year.

According to law enforcement officials, the investigation was initiated by the U.S. Secret Service but is now being headed by the FBI’s Cyber Division at FBI Headquarters. The Justice Department’s Computer Crimes and Intellectual Property Section is also involved in the ongoing investigation. 
Officials are unsure who installed the programs and what their intent was, but there is speculation the program allowed the designers of the software to see what items and messages were being shared via the Director Desk platform.

The NASDAQ’s stock trading computers were not breached and Director’s Desk is a relatively small system that is offered by NASDAQ with about 10,000 users worldwide.

Copyright 2011 ABC News Radio´╗┐

ABC News Radio