Emails apparently from friends or official sources but which are actually dangerous malware!
Most of you are well aware of this sort of thing; but for those of you who are not so computer savvy, here are two scenarios for your safe use of the internet.
A very good friend of Sue (who shall be nameless) staggered her when he clicked on a “dirty link” in an email he thought had come from a friend.
This email came from the same name as the friend, but a very odd email address; the body of the email contained only a single long hyperlink with no explanatory text.
Beware of such emails; no friendly person should send you a bare hyperlink with no explanation. BUT, even if they do, you should make sure that it is genuine and clean.
Do not click on any hyperlink without confirming its authenticity.
After an immediate “System Restore” this computer is probably OK, but nothing is this scene is certain!
Remember the rules! All hyperlinks in emails should be regarded with suspicion. Sue will vouch for the hyperlinks in SNEB newsletters as she put them in
and they are a great help to you!
Next is this scam from crooks posing as the IRD
Firstly, the IRD will never send out information like this in and email
EMAIL IS NOTORIOUSLY INSECURE! Crooks can get sensitive information from emails.
The IRD on-line service sends emails only to notify you when information is there for you to access.
The IRD web site ends in .govt.nz
like most government departments … not .co.nz
or any of the many other possibilities.
The Worldwide Ransomware Attack (WannaCry): What You Need To Do
The WannaCry virus cannot, as far as we know, attack Apple Mac, iPhone or Android operating systems: it is aimed at Microsoft operating systems.
However, if you are running Windows 10 or Windows 7 and have Windows Updates automatically enabled, you will have already received Microsoft’s patch to block this attack. To reassure yourself, you can click on Settings -> Check for Updates and it should confirm that you are up to date. If not, do an immediate update and enable Automatic Updates.
The Ransomware’s main victims to date have included computers running XP, Vista or Windows 8. If your computer is not yet a victim, you’ll be relieved to know that Microsoft went the extra mile within hours of the outbreak and produced patches for these out-of-date systems, for free. But you must act ASAP: you should first confirm whether yours is a 32 or a 64-bit system by right-clicking on its This PC icon and then clicking on Properties. Then click on this link and download the applicable update. Once you then click on the downloaded file, the vital patch will install itself. Then you should reboot.
The still-unfolding story is here. Needless to say (and as our Tutors keeping repeating), do not open any odd-looking or too-good-to-be-true emails or attachments, now or in the future. That includes any that might seem to come from your friends or contacts but are out of context or not typical of what they normally write or how they express it. Certainly, if you hover your mouse over any attachment and the title and/or web address in the pop-up doesn’t match up, leave it alone, mark the whole email as spam or just delete it.
Tutor Graham Wright’s 2014 Presentation on Computer Security
This is still relevant today. You can download a PDF copy of this by clicking here.
CERT NZ – The NZ Government’s New Site
CERT NZ should be your first port of call when you need to report a cyber security problem. They support businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice. Including getting started with cyber security and keeping your mobile phone safe and secure (click and read).