<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Living in Aurora, Town of Aurora, Ontario &#187; Hack</title>
	<atom:link href="https://livinginaurora.ca/tag/hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://livinginaurora.ca</link>
	<description>Living In Aurora Ontario Canada</description>
	<lastBuildDate>Mon, 13 Jan 2020 19:51:13 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Authorized Windows Service Technician &amp; Cyber Crime, That Was Close</title>
		<link>https://livinginaurora.ca/technology/authorized-windows-service-technician-cyber-crime-that-was-close/</link>
		<comments>https://livinginaurora.ca/technology/authorized-windows-service-technician-cyber-crime-that-was-close/#comments</comments>
		<pubDate>Thu, 22 Nov 2012 06:03:36 +0000</pubDate>
		<dc:creator><![CDATA[Anna Lozyk Romeo]]></dc:creator>
				<category><![CDATA[Aurora]]></category>
		<category><![CDATA[Complaints]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Wacky Aurora Hub]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Windows Service Centre]]></category>

		<guid isPermaLink="false">http://livinginaurora.ca/?p=9290</guid>
		<description><![CDATA[He never introduced himself but I was able to get his phony name, Brian Carter. Interesting enough Brian Carter had a strong Asian accent and he was calling from supposedly existing in Toronto Windows Service Centre; however, he failed to mention Microsoft. The conversation lasted for about 20 minutes and he almost had me, more [&#8230;]]]></description>
				<content:encoded><![CDATA[He never introduced himself but I was able to get his phony name, Brian Carter. Interesting enough Brian Carter had a strong Asian accent and he was calling from supposedly<span id="more-9290"></span> existing in Toronto Windows Service Centre; however, he failed to mention Microsoft.</br></br>

The conversation lasted for about 20 minutes and he almost had me, more like scared me that my computer is completely infected and it will soon blow up. He give away his identity with few interesting comments, and not until the moment when he asked for remote access to my computer, I realized &#8211; cyber crime is happening at my home in Aurora.</br></br>

Its been a while since my <a href="http://livinginaurora.ca/category/wacky-aurora-hub/">wacky aurora hub</a> posts and what happened today fits perfectly.

So here is the conversation I recall.</br></br>

<strong>Brian Carter:</strong> <em>Hi am calling from the Windows Service Centre and we have been seeing strange activity on your computer. Your computer is possibly infected with the malware or malicious software.</em></br></br>

<strong>Me:</strong> <em>Excuse me, you are able to see activity on my computer?</em></br></br>

<strong>Brian Carter:</strong> <em>You have registered Windows product with us and we have been monitoring your computer. We noticed strange activity so that is why we are calling you to let you know that we can help you clean things up.</em></br></br>

<strong>Me:</strong> <em>Strange, that you are able to see activity on my computer.</em></br></br>

<strong>Brian Carter:</strong> <em>Your address is</em> spells out my full address where I live. <em>We are calling you because what is happening with your computer is not good. We have noticed suspicious activity and calling to let you know and help you fix it.</em></br></br>

<strong>Me:</strong> <em>Let me put you on hold.</em></br></br>

I put him on hold and ran up to my computer room. I looked at the computer and the Internet was disconnected.</br></br>

<strong>Me:</strong> <em>Hi again. You said you are seeing strange activity on my computer now. My computer is not connected to the Internet.</em></br></br>

<strong>Brian Carter:</strong> <em>Not now but we have been monitoring your computer for three months now and we have reports that you have strange activity.</em></br></br>

<strong>Me:</strong> <em>Let me login to my computer.</em></br></br>

<strong>Brian Carter:</strong> <em>You are logging in?</em></br></br>

I remembered distinctly that he was surprised that I was logging in. He is probably realizing at that point that I am not going to be an easy bait. I realized that he also did not know my name. Usually with registration you get the whole package of information.</br></br>

<strong>Me:</strong> <em>Okay, you said I have <a href="http://en.wikipedia.org/wiki/Malware" target="_blank">malware</a>. Now, how can you tell?</em></br></br>

<strong>Brian Carter:</strong> <em>I will tell you. Click on the right side start button.</em> I think he meant left side. <em>Find Computer on the right menu, and then right click and choose Manage. To make long story short he just simply got me to Windows logs.</em></br></br>

<strong>Me:</strong> <em>Okay, what are we looking for then.</em></br></br>

<strong>Brain Carter:</strong> <em>You see the list, some say Information. There are some Warnings and Errors. These are files that are infecting your computer and they grow and grow and eventually they will shut down your computer.</em></br></br>

<strong>Me:</strong> <em>Really?</em> In the mean time all I am seeing that these files are just Windows log files for installation of updates etc, some warnings and some errors. <em>Can I delete them by myself.</em></br></br>

<strong>Brain Carter:</strong> <em>Aha, how many file do you see, 5, 10?</em></br></br>

<strong>Me:</strong> <em>I am still scrolling. I cannot count them there are too many.</em></br></br>

<strong>Brain Carter:</strong> <em>I want to show you something else. These are all files under Applications. Go and click on System files.</em></br></br>

<strong>Me:</strong> <em>Okay.</em></br></br>

<strong>Brain Carter:</strong> He is giving me speech again how my computer can be destroyed by malware or small hacks. <em>See all these files. How many do you see? 5, 10?</em></br></br>

<strong>Me:</strong> <em>Okay, I think you know that I have more than that.</em></br></br>

<strong>Brian Carter:</strong> <em>Oh my goodness. We have some cleaning to do.</em></br></br>

This was the point when I figured he was a hacker. Not calling me by name; showing me just computer log files and not malicious files; talking about Norton Internet Security and how great software it is and still totally not secure. Telling me HP computers have security flaws. And also how two computers not networked but connected to one Internet Service Provided can still get infected from each other. I was getting more paranoid because I knew his mission and I was almost sucked in.</br></br>

I realized that my computer was fine and I was talking to the hacker who was on the mission to hack my computer and possibly install malicious application. Oh well I decided to continue the conversation.</br></br>

<strong>Me:</strong> <em>So what is the next step. You are saying I cannot delete them myself? Is there an application that can do that for me instead of you?</em></br></br>

<strong>Brian Carter:</strong> <em>No, no there is none. That is why we are calling you. We can help you out.</em></br></br>

<strong>Me:</strong> <em>How? You obviously need access to my computer to do that. Am I right?</em></br></br>

<strong>Brain Carter:</strong> <em>Yes, and you can see what I will do.</em></br></br>

<strong>Me:</strong> <em>I think we have to stop right here. I am not the only user of this computer, and actually my husband is the one that maintains it. So I will not allow anyone access our computer without his authorization.</em></br></br>

<strong>Brain Carter:</strong> <em>But the task is very simple. You said that it was your computer.</em></br></br>

<strong>Me:</strong> <em>It is <strong>our</strong> computer. I don&#8217;t know you and I will not let anyone access my computer.</em></br></br>

<strong>Brain Carter:</strong> <em>We can do this in no time. We don&#8217;t need your husband. I will navigate your computer and if you see something you don&#8217;t like you can disconnect.</em></br></br>

<strong>Me:</strong> <em>As I said I will not do so. Is there are number I can call you back?</em></br></br>

<strong>Brain Carter:</strong> <em>When your husband be home? Can I call back at that time?</em></br></br>

<strong>Me:</strong> <em>I don&#8217;t know. He has variable schedule and it is better we call you back. Do you have number I can reach you at?</em></br></br>

<strong>Brain Carter:</strong> <em>Yes, here it is 678-666-0122.</em> This is a number he gave me.</br></br>

<strong>Me:</strong> <em>Oh this is not 1-800 number.</em></br></br>

<strong>Brain Carter:</strong> <em>No.</em> Laughed.</br></br>

<strong>Me:</strong> <em>Where are you calling from and by the way what is your name?</em></br></br>

<strong>Brain Carter:</strong> <em>Toronto. Brain Carter.</em> Spelled his phony name for me.</br></br>

<strong>Me:</strong> <em>And Windows has office in Toronto. What time are you open to?</em></br></br>

<strong>Brain Carter:</strong> <em>Yes, we do. You can call until 7 p.m.</em> He had to think about the time.</br></br>

<strong>Me:</strong> <em>Are you directly working for Windows or are you contractor?</em></br></br>

<strong>Brain Carter:</strong> Getting annoyed. <em>I am authorized Windows Technician. Just hang up now and call me again to verify the number.</em></br></br>

<strong>Me:</strong> <em>No that will not be necessary. If we think there is an issue we will call you later. Please understand that I do not allow anyone who calls us to access our computer. I don&#8217;t feel comfortable. I don&#8217;t know who you are even if you are telling me who you are. It is so easy these days to be scammed. I really don&#8217;t know if you are telling the truth.</em></br></br>

<strong>Brian Carter:</strong> <em>I completely understand. Please call us back.</em></br></br>

<strong>Me:</strong> <em>Good bey.</em></br></br>

<strong>Brian Carter:</strong> <em>Good bey.</em></br></br>

How ironic this whole conversation was. Later, I was thinking may be he will give up his cyber crime activities after the nice concluding conversation we had. I think he got a bit sucked in to and given me enough of his information to find out more about him on the Internet. We never called him back and probably this number does not exist anymore.</br></br>

The lesson is &#8211; do not do any business over the phone, especially when that someone calls you first.</br></br>

I will keep you updated if he calls back.]]></content:encoded>
			<wfw:commentRss>https://livinginaurora.ca/technology/authorized-windows-service-technician-cyber-crime-that-was-close/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Under Attack, Hack-ed, Spam-ed, Telephon-ed, Tired</title>
		<link>https://livinginaurora.ca/complaints/under-attack-hack-ed-spam-ed-telephon-ed-tired/</link>
		<comments>https://livinginaurora.ca/complaints/under-attack-hack-ed-spam-ed-telephon-ed-tired/#comments</comments>
		<pubDate>Mon, 03 Oct 2011 04:22:53 +0000</pubDate>
		<dc:creator><![CDATA[Anna Lozyk Romeo]]></dc:creator>
				<category><![CDATA[Aurora]]></category>
		<category><![CDATA[Complaints]]></category>
		<category><![CDATA[Issues]]></category>
		<category><![CDATA[Town of Aurora]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Comments]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[ReCaptcha]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Guard]]></category>
		<category><![CDATA[Spam]]></category>

		<guid isPermaLink="false">http://livinginaurora.ca/?p=3656</guid>
		<description><![CDATA[New technology has its pros and cons. I like the pros, but the cons have been lately giving me lots of headache. My blog has been hacked not once but twice. It took many long hours and days to clean up and put back to safe mode in Google search engine. Just recently, over three [&#8230;]]]></description>
				<content:encoded><![CDATA[New technology has its pros and cons. I like the pros, but the cons have been lately giving me lots of headache.<span id="more-3656"></span><br /><br />

My blog has been hacked not once but twice. It took many long hours and days to clean up and put back to safe mode in Google search engine.<br /><br />

Just recently, over three days I received over 2000 spam comments. Probably generated via comment script. People have nothing better to do.<br /><br />

I installed security feature (shown below), but can you believe spam comments are still coming through. Not many now, probably three or five a day, but that means that some individual who has nothing better to do is actually typing spam comments manually.<br /><br />

<img src="/uploads/reCaptcha_screenShot.jpg" alt="" title="reCaptcha_screenShot" width="600" height="432" class="aligncenter size-full wp-image-3662" /><br />

For those who comment on my blog, before posting a comment you must enter the security words displayed in the box. Sorry for inconvenience, but I don&#8217;t have other option.<br /><br />

Then &#8230;<br /><br />

Then couple of nights ago, I get telephone call letting me know that I won a &#8216;<em>Caribbean vacation trip to Florida</em>&#8216; and by paying one time US$280 on my Visa card I can have it. Dahh &#8230; <br /><br />

What a waste of time on my part. I am tired. I just want to blog, and not to worry about anything else. I just want to get calls from people I know and not bogus marketing schemes.<br /><br />

I am tired.]]></content:encoded>
			<wfw:commentRss>https://livinginaurora.ca/complaints/under-attack-hack-ed-spam-ed-telephon-ed-tired/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
