• Facebook
  • Twitter
  • Mail
  • LinkedIn
  • Youtube
  • Trustpilot
Computer Troubleshooters
  • About Us
    • Customer Reviews
    • Solutions Catalogue
  • Find An Expert
  • Business Solutions
    • Managed Service Solutions
    • Cyber Security
    • Backup & Recovery
    • Cloud Services
    • CT VoIP
    • Remote Support
    • Office 365
    • Mobile Device Management
    • Repair Service
  • Residential Solutions
    • Residential Managed Services
    • Residential Repair Service
    • Residential Backup & Recovery
    • Residential Cyber Security
  • News
  • Franchise Opportunities
    • Franchise Opportunity
    • New Owner Training Schedule
    • The Industry Opportunity
    • Training & Support
  • Contact Us
  • Menu Menu

Viruses that Appeared in 2013

18/12/2013/in Computer Repair, Global Newsletter, How To: Technology 101, Industry News: This Week in IT, Technology & Tools/by briancraigie

As we close the books on 2013, people begin producing lists that review what has happened. I think these lists are interesting, and look forward to reading them.   As we move into 2014, let’s review the computer viruses that wreaked havoc in 2013 and will most likely continue to in 2014, so you ensure you and your technology are protected and informed.  When you are online remember to STOP.THINK.CONNECT.

  • VirusesCryptolocker – Rising in prevalence during the fall, hackers were taking over computers and holding personal files and information for ransom. The model of stealing something and holding it hostage till someone pays a monetary ransom has been around for ages, but this is the first time it has been seen with a 21st century twist.This virus was created by a group of overseas criminals, and transmitted through infected attachments on email messages.
  • The best protection method is to avoid opening attachments from senders that you are unfamiliar with or on emails that you are not anticipating.If your computer is attacked by this virus, they suggest immediately unplugging. The hope is that the virus will have stalled and an expert technician will be able to salvage your data.

  • Microsoft Phone Scam – This scam was making its way around during the summer of 2013, it even took one of our franchise owners by surprise. The goal of the phone call is to catch people off guard, because the caller identifies themselves as a Microsoft employee that has been alerted that there is something wrong with your pc, and they need remote access to repair.They are trying to lull you into a false-sense of security that something is wrong and you have to give them access. Once they gain access, they actually install a virus on your computer and then charge you to remove it and repair the damage they have caused.
  • FBI Virus – This internet scam accesses your computer and preys on your fear of being contacted by the FBI and threatened with fines and jail time. Once it infects your computer a fake message with the FBI logo will appear on the screening accusing you of downloading something illegally, while locking your computer. A ransom-like notice will be sent to you, forcing you to pay the hacker to regain control of your computer.Like many other viruses this is also transmitted by accessing suspicious email attachments or untrustworthy websites.
  • Facebook Virus – Like its name suggest, this virus is transmitted by clicking links within the Facebook website.  The goal is to discover and obtain your banking usernames and passwords to steal all of your available funds. This virus, also known as Zeus, will remain dormant on your computer until a banking website is accessed.  It then quickly moves into action to steal your information.The best way to combat this virus is to only access links that are provided by people you know, and that do not appear to be suspicious in nature. Also, because the virus targets banking websites, making sure that your bank’s website is secure and has a 2-step verification process will help protect your funds.
  • Search Conduit – The last virus on our list, is not a traditional virus, it is actually a browser hijack.  It is a menace that exhibits malicious traits on your browser.  It is commonly installed through when you download something else. It will install the Conduit Toolbar to your default browser and change your default homepage to search.conduit.com.
  • The Conduit search engine will act very much like other search engines (e.g. Google or Bing) and display both ads and sponsored listings.  It will track your search history in an effort to boost advertising revenue, which is commonly known as a black hat SEO tactic.  It tends to be quite difficult to remove, and you may have to call in a local expert for help because it takes hold of your browser and operating system.

Tags: 2013, cryptolocker, facebook virus, fbi virus, microsoft phone scam, virus, viruses
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
https://computertroubleshooters.co.uk/wp-content/uploads/2018/09/logo.png 0 0 briancraigie https://computertroubleshooters.co.uk/wp-content/uploads/2018/09/logo.png briancraigie2013-12-18 15:54:332021-02-07 10:58:04Viruses that Appeared in 2013
You might also like
Your guide to understand the Heartbleed Bug

Latest News

  • Windows 10 Tips and Tricks to Maximise Productivity03/02/2022 - 10:43 am
  • Windows 10 Problems and Solutions You Can Troubleshoot at Home03/12/2021 - 10:56 am
  • Tips to Help Extend Your Laptop Battery Life05/10/2021 - 10:47 am

Categories

  • Cloud Computing
  • Computer Networking
  • Computer Repair
  • Data Recovery
  • Features
  • General
  • Global Newsletter
  • How To: Technology 101
  • Industry News: This Week in IT
  • Managed Services
  • Press Release
  • Security
  • Technology & Tools

Follow Us On Facebook

Follow Us On Twitter

Tweets by @Comptroubuk

Follow us

  • facebook
  • twitter
  • linkedin
  • youtube

Contact Us

TRUSTPILOT

Trustpilot
© 2018 Computer Troubleshooters UK. All Rights Reserved Designed by Squiggle Web Design
  • Terms & Conditions
  • Privacy Policy
Small Businesses Face the Same IT Concerns as Large Companies5 Tips to Increase Internet Security in the Workplace
Scroll to top
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT