They were much more aggressive. Calling me names when I told them I thought my computer was okay. Yelling at me when I said that I would take my computer to the computer repair shop I always use for computer tech support. Even threatening me with arrest, or to have people come to my home, if I didn’t let them clean up my computer like “a good cyber citizen.”Being lured to the tech support siteAnother variation of the tech support scam is luring people to the bogus, malicious fake site. The US Federal Trade Commission (FTC) recently fined ($1.3 million) and shut down some scammers who had stolen over $17 million from their duped victims by luring them to their sites with pop-up alerts telling the victim that malware was on their PC. The ads provided a contact number and people would be told to call to get rid of the problem. From there they’d be directed to a malicious site and the unsuspecting victim would follow instructions, and then nasty malware, ransomware would be downloaded, and they would be charged thousands of dollars to have it removed.Know the signs of a scammerEvery business, of every size, and every individual is a potential target. Make sure that everyone in the organization can recognize some of the key red flags of a tech support scammer.Unsolicited callsIf someone, who is not from any organization or vendor that you know you’ve paid to get tech services from, calls out of the blue and tells you that you have malware on your computer and they need to get into it to remove it, they are probably a crook.Dubious information providedThey will try to sound convincing by telling you to go to your event log viewer, and will sound alarmed and concerned when you tell them the files that you have there; they’ll tell you that those files are all malicious. Don’t believe them. They are logs generated by the many different activities processed by your computer.All of my calls came from people with very thick non-U.S. accents. I asked the first person who called, whose accent was so thick I had to ask him to repeat what he said several times, for his name. He said his name was Sam Wilson. This name also did not match the location from where he sounded like he came.Malicious websitesThese scammers have been using the same bogus business names when they speak with victims. Here are some of the URLs the scammers try to and convince victims to go to: onesupport.me support.me click4support chromecrashreport.com comphelpapp.com costatechhelp.com earntechhelp.com emergencyvirussupport.com get.instant-protection.com gettechhelp.com mypcoptimizerpro.com redlrect-403av.com redlrect-winav.com responsecomputersupport.com security-issue.us security-message.support washtechhelp.com window-defender-security-alert.info windows-spywarealert-cucwmpxvlfqfo2lpxgapsmccuy1yflsnjvtme.coKeep this list handy. If someone tells you to go to one of these sites, you’ll know you are speaking with a scammer; simply hang up.Invalid area codesScam callers often mask their phone numbers, using invalid phone numbers when they call so they cannot be traced. Figure 2 lists the 575 currently unassigned area codes that phone criminals love to use.Of course, some phone scammers will use legitimate area codes, but those numbers are comparatively small. As a case in point, only three of the 14 different phone numbers used by calling criminals who called me were actually used area codes.Keep this list handy. If someone calls using one of these area codes, you’ll know you are speaking with a scammer; simply hang up.Stay awareNever give control of your computer to someone who made an unsolicited call to you. And never provide credit card or financial information to someone claiming to be tech support.If you do fall victim to one of these scams, report it to your company’s information security area and/or local police immediately.Every business, of every size, sector and location, needs to stay aware of these calling scams. These criminals are equal opportunity scammers; they will call anyone anywhere to get a victim. This makes it more important than ever before for every organization to ensure they provide information security training to all their employees, and send them ongoing reminders warning of such scams. It also makes it very important for every individual to be able to recognize the signs of a phone scammer so they will not fall victim, and possibly lose all their files, and a lot of money, in the process.For more information about these tech support scam crimes, see:Phone Scam Open Season – Business RisksMore Phone Scams For the General PublicAnd read more about a particular phone scam where cybercriminals haved posed as Microsoft and Dell tech support.This post originally appeared on the PowerMore web site and was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies. By Rebecca Herold, CEO, Privacy Professor®Have you ever gotten an unsolicited call from someone claiming to be a tech support pro who wants to help you with an urgent problem with your computer? Chances are you have. It is estimated that just one type of these many scams have cost U.S. victims $1.5 billion so far in 2015. It is not known how many of these scams are currently active, but with new ones popping up almost every day, I would estimate there are at least hundreds, if not over one thousand, different groups of these crooks launching their own tech support phone scam.My experiencesI got my first tech support scam call way back in 2005. I first wrote aboutanother scammer with a different scam who called me in 2008. I’ve also had over a dozen of my friends and acquaintances contact me to let me know that they had been called by a tech support phone scammer. Many of their experiences have been unique from what I’ve seen. The types of phone scams that can exist are only limited by the imaginations of the crooks committing them.I got another call from another tech support scam caller on November 27 of this year (listen to it here; 15:42 minutes). These tech support scam calls have really evolved and are more aggressive and sophisticated in their tactics than ever before. In the past, they would not call me again after I hung up on them when they called.In the past I would also play along with all the crooks’ calls and then hang up right before the point they would typically infect their victims’ computer. If you listen to my most recent call recording, to the end, you’ll know I stayed with them, playing along and doing as they asked, right up to the point where they wanted me to hit enter to give them access to my computer; I then told them I lost my internet connection. But this time was different, and points to a trend to be much more aggressive than in the past.The call started with one person who, once I was engaged in conversation, said that she could see (even though she did not have access to my computer yet) that my computer was “so badly infected, and putting everyone else” I communicate with through it at risk that she wanted her manager, “the foremost expert in the world in such computer problems,” to speak with me. And then she transferred me to another person.The tech support scam crooks repeatedly called me, 243 more times through December 9 from fourteen (so far) different phone numbers shown in Figure 1. This is an average of 19 calls per day! This shows how much they want to get into other people’s computers, and how lucrative their crimes are, to be so persistent.
VMware introduced vSphere 6.7 on April 17, 2018. vSphere 6.7 is the latest release of VMware’s industry leading virtualization and cloud platform. vSphere 6.7 provides improved performance, management, security and cloud extensibility compared to vSphere 6.5.In fact, based on VMware’s testing, vSphere can handle up to 2X vCenter operations, delivers 3x reduction in memory usage and delivers 3x faster DRS-related operations. It also provides enhanced security for hypervisor and guest operating systems and protects application running on virtualized and cloud environments with VMware AppDefense.vSpehre 6.7 also introduced vCenter Server Hybrid Linked Mode, which makes it easier for organizations to uniformly manage vSphre environments running on-premises and in VMware Cloud on AWS, continuing VMware’s goal of providing a seamless experience as IT environments continue to transition to the Cloud.Dell EMC – Unmatched data protection for VMware environmentsDell EMC works closely with VMware to deliver data protection solutions that are simple to manage and deploy, while providing powerful performance at a low cost to protect.Architected from the ground up for the software-defined data center, Dell EMC data protection solutions provide automation for all aspects of VMware data protection, comprehensive application coverage, and native VMware integration. They deliver high performance and low cost to protect with industry-leading deduplication and bandwidth usage. And, they enable the extension of VMware data protection to the Cloud for each phase of our customers’ journey to the cloud – long-term retention to the cloud, disaster recovery in the cloud and VMware Cloud workloads running on AWS.Dell EMC and VMware Virtual VMUG PresentationCharlie Sevin from Dell EMC and Dennis Lu from VMware recently gave a presentation at a Virtual VMware User Group event on Dell EMC data protection for VMware environments. Their presentation focused on the latest advances from VMware in vSpehre 6.7 and from Dell EMC in protecting VMware environments, both on premises and in the Cloud. You can see this presentation below:ResourcesLearn more about Dell EMC Data Protection for VMware.Learn more about VMware vSpehre 6.7.Find out more about VMware User Group Events, live and virtual.
MOGADISHU, Somalia (AP) — As Somalia marks three decades since a dictator fell and chaos engulfed the country, the government is set to hold a troubled national election. Or is it? Two regional states refuse to take part in the vote to elect Somalia’s president and parliament members, and time is running out before the Feb. 8 date on which mandates expire. The United Nations warns that going beyond that date without a solution doing so brings Somalia into “an unpredictable political situation in a country where we certainly don’t need any more of that.”
TEL AVIV, Israel (AP) — Last week, Israel’s Labor party appeared headed for extinction, with polls indicating it wouldn’t win enough votes in upcoming elections to enter parliament. But following the election of progressive lawmaker Merav Michaeli as its new leader, the party is showing signs of life. Labor, home of the country’s founding leaders and for decades its ruling party, has begun to climb in opinion polls. And Michaeli, a firebrand feminist, is determined to once again make it a major force in Israeli politics. But with many traditional voters having left the party, she has her work cut out for her ahead of March elections.