Welcome to our Blog

Here you will find content from our monthly Newsletter and other ramblings.

Phonetastic & Tabulous – October Newsletter

Phonetastic & Tabulous

Dear reader,
Phones… Tablets… more and more of us are using smartphones and tablets to do more and more things, from gaming and banking to using social media and reading the news, these portable devices have become an integral part of our daily lives. I realise, to many of you, smartphones haven’t had the same prodigious life changing effect as they have on us millennials, such as myself… However, I’m sure many of you still use them and appreciate the convenience of having mini super computers in your pockets, so in this month’s newsletter, we wanted to point out a few ways you could get more use out of your devices.

Over the past few months’ phones have certainly been making the headlines, on September 7th Apple launched its latest iPhone 7 and caused a bit of a debate having opted to remove the traditional headphone jack. On the 4th of October Google announced its first fully google build phone the ‘Pixel’ and of course I’m sure many of you have heard about Samsung’s disastrous launch of its ‘Note 7’ (exploding phone) that has since been subject to a worldwide recall, and bans from use on aircraft.

Here are three tips to get more out of your devices.

1. Use App’s

So many times, we see people using the inbuilt web browsers to do things on their phones or tablets, either looking at and sending email, or going to Facebook via the mobile web. Despite it working ok for the most part, the mobile web is nowhere near as user-friendly as a dedicated purpose build App, designed to do one sole function well. With apps, you get a much easier experience with than the mobile web, especially if it’s something you use a lot. Sometimes the App’s do need configuring and user account info adding, however, this is normally once only.

2. Try a Keyboard

Many people are using their tablets as laptop and desktop replacements these days, and although they are often capable of doing the job, one common gripe is when used for typing long documents or emails. That’s why buying a simple Bluetooth keyboards attachment can work wonders in helping eliminate some of the frustration in using tablets. This not only saves screen space by eliminating the virtual keyboard, it also giving some all-important tactile feedback from actual keys…!

3. Update!

If you have read any of our other emails or blog posts, you will know that updating PC’s is very important and is just as important on tablets and phones. Updating, more often than not fixes bugs and adds better functionality to a device. This also applies to app’s, if you ever find a particular app or game freezing, or behaving strangely, you should check to see that there is not an update available. These updates usually install automatically, however not always. If you want to check, go to the ‘App Store’ on Apple Devices or ‘Google Play’ Store on android and search for the updates section. How can I improve?

How can I improve?

We feel so many people are not getting the most out of their smartphones and tablets, or are struggling to get to grips with all the advanced features they include. That’s why we would like to remind you of our range of training and support sessions available here in the shop.

We try to remain flexible in our training sessions and do our best to adapts to your individual request for help, after all, we are all different. Our needs, wants and expectations are so often on a spectrum unique to us as individuals. So no matter how small or large your question, we’re happy to help. Still, if you only have a few questions, but would still like to learn, we offer a few broad learning categories. In which we can guide you through the subject area, with our introductions and favourite top tips, as well as answering your questions along the way. These sessions aim to help you get the most out of your devices, feel more confident and stay safe.

Training Categories include

 

  • Tablet Training and using apps (iOS & Android)
  • Introduction to Apple MacOS
  • Security Review and Online Safety
  • Sort it Out Session

In our, “Sort, it Out Session’s” you can come along with a list, and time permitting work our way through it with you.

So, whether your new iPad is still in its cellophane wrap or your Samsung Galaxy is driving you mad, your passwords are giving you a headache, we could help you get started or just ‘Sort it Out!’

 

In Store Training sessions start at £29.99 for 45 minutes, Home Sessions are £59.99 for 1 hour

To book or enquire about training and support call on: 01442 800126 or get in touch here LINK

 

Keeping Cool – September Newsletter

HSC Newsletter – September 2016

Keeping Cool

Dear reader,

First off, our apologies for missing the August edition of the newsletter, what with holidays, a busy workload and some tough problems to solve, we just missed out on the deadline. My hat is proverbially ‘tipped’ to any journalists, bloggers, writers or anyone else out there for that matter, writing to a deadline…!

Hopefully you’ve all been enjoying the last few days of unusually warm September sunshine *(Although as I’m writing, the heavens appear to have opened and we should perhaps start counting the animals two by two…) or did so over the summer break, perhaps lounging outside in the sun, or cooling down with a nice iced beverage. As I’m sure you can imagine our digital devices aren’t such ‘fans’ of the warm weather, and much like us humans, over heating can cause serious problems.

Over the summer we have had a succession of failed and failing computers in for repair, all due to over heating and cooling fan failures, so we thought we would share a few examples with you.

Here is a short video of an Apple Mac whose graphics card has failed due to clogged fans and thus overheating, unfortunately this is now not cost effective to repair. LINK

This is a screen shot of my own iPhone I was using to listen to music on the beach in the hot weather, this happened even though it was kept it in the shade!

file-16-09-2016-11-57-59

 

 

 

 

 

 

 

 

 


There are some do’s and don’ts to help keep your equipment cool and safe from overheating.

  1. Keep it ventilated: A common issue to be aware of involves using a laptop in bed or on a blanket. In doing this, the duvet or blanket tend to block vent’s so hot air cannot escape, it also acts as an insulator keeping the heat in and heating the whole computer. The solution would be to keep it on something hard and flat like a tray large book. This would at least allow minimal air flow under the laptop.
  2. Placement: On a PC tower, you can check were the air ventilation holes are, usually they are on the side. Make sure that the side is not pressed up against a wall or desk blocking the air.
  3. Keep it clean: For many of us, our ‘desktop’ computers should perhaps be called ‘underdesk’ computers…! It’s easy for dust to accumulate when the computers are stored on the floor or carpet, check out this video of a seriously dusty PC! LINK
  4. Scan for viruses: Machines infected with viruses and malware will generate extra heat and require the fan to work doubly hard to cool it down. Often because the processor inside is being used constantly by the infection, or antivirus program, this constant use will not only slow the system down but also generate unwanted noise as well as heat.
  5. Avoid the sun: If you keep your laptop or computer near a window you should take care to avoid direct sunlight on to the machine, as this will only add to the heat generated.

As part of our ‘Heath Check PC MOT’ we will clean out the cooling fans of your laptop or tower to help keep them running at their best. Keeping computers cool is important all the time not only in hot weather, as you can see overheating issues can be very serious and can cause irreparable damage.

 

Eye Candy

Some computer users go to extreme lengths to keep their PC’s cool, these days’ lots of top end gaming machines come with liquid cooling systems, where excess heat is channelled away from vital components in a more effective manner. These systems are popular among gamers not only for their heat channelling prowess but there *cough ‘cool’ factor. Elaborate systems include LED lighting, Transparent cases and coloured cooling liquid giving a very interesting and futuristic look to otherwise dull black or grey PC Cases. Check out these examples.

   

Don’t forget here at High Street Computers we build custom PC’s to order, and given the right budget you can make a pretty awesome machine, including liquid cooling and completely unnecessary but totally awesome LED lights. Ideal as a birthday or Christmas present, get in touch with a budget and/or requirements for a particular game HERE if you would like a free custom build quote.

Yours Andrew…

P.S. Please feel free leave comments below, or suggestions for future Newsletter topics!

Backing Up – July Newsletter

Just a short newsletter this month, what, with holidays, a home move and a recent surge in windows 10 related repairs! I have barely had time to get keyboard to LCD…

At the end of this sentence, please stop reading this email, grab a pen and paper and write down exactly how you are backing up your data.

So, how’s that paper looking? Hopefully you’ve got 50 lines detailing exactly how each of your devices, computers, phones, tablets, camera’s are being backed up, right? No? Don’t panic, but do be concerned, making a data backup, in my opinion should go right to the top of your to do list. If, however, you’re happy with your backup plan, knowing your data is safe in the event of disaster, here are some relaxing sounds LINK so sit back and relax for five minutes and think about nothing.

You can now pin that paper to the wall as a constant reminder how well, or not, your backing up your precious data…!

 

This issue has been highlighted to us many times in the past couple of weeks, either through, encryption virus and ransomware, spillages on laptops, accidental deletion or just sudden breakdown, we have had to break the bad news to several customers that their precious pictures or documents have been lost, possibly permanently.

For those without a backup plan or if you want to just improve on what you’re already doing here are a few practical things that you can implement today.

Copy and Paste

Possibly the easiest way to backup, though far from perfect.  Find yourself a memory stick or external hard drive and copy then pastes your precious files to the stick, bear in mind size constraints. Keep the disk in a draw, don’t use it for anything else…! Do this once a month/week/day..!

Semi-Automated Local Backup

Apple Mac’s offer a built in backup tool called Time Machine, it is pretty easy to set up. Just buy yourself an external disk, with at least the same storage capacity as your computer’s hard drive, though large is probably better. Plug it in to your mac, launch Time Machine from the System Preferences and follow the on screen instructions. (Be aware, if it is the first time using the disk on a Mac your computer may need to ‘Format / Erase’ the hard drive to set it up.

Windows 7,8,10 computers offer built in a built in backup tool as well, it’s called Windows File History. It can be found through clicking the Start Menu > Settings > Update & Security > Backup (when you have plugged in an external drive it will be offered here in the menu, follow the onscreen instructions to start backing up.

Cloud Synchronisation

Many of you may be familiar with services such as Dropbox, OneDrive, Google Drive, iCloud Drive et al… the list goes on… These services provide buy means of an account and a small installed program a way to store files, photo’s etc online and keep them synchronised on multiple computers. In the event that one of your devices breaks or is lost you can retrieve your files on another device or buy logging in to your account through any internet connected machine. These services are quite easy to use, however the free access come with limited storage capacity unless you pay for the premium services.

Online Backup (Cold Storage)

Another type of online backup, constantly uploads your data to the cloud keeping it safe this is not the same as cloud syncing, online backup tends to be slower to access, but offer higher storage capacity for your money, and also protects from accidental changes such as making a change to a document that will be synchronised across all connected computers. Have a look here LINK for one of these types of backup.

 

If you are worried about your backup plan and want some help setting up a synchronisation service. We are now offering 45min training sessions here in the shop. Prices are £29.99 for 45min: give us a call on 01442 800126 or fill out this ‘contact us form’ for availability and bookings.

Passwords – June Newsletter

Passwords – June Newsletter

Dear Reader, This month we have decided to cover another security related issue, the infamous PASWORD…!

Hacking attacks and data breaches have become all too common in recent years, as the world and our society goes online, becomes more digital (as the singularity approaches! :-0 – see link for more… ) As our lives and the web become increasingly intertwined, the need for caution, best practice and management of our digital lives increases, and for good reason. Criminal gangs are actively targeting companies to steal their user’s data and passwords, it is becoming more and more important for us to better protect ourselves.

Below are a few more recent examples of data breaches suffered by companies, potentially putting their users at risk.

List of high-profile data breaches

MySpace (May 2016 ) 360 Million potential compromised accounts : Link

TalkTalk (October 2015) around 157,000 personal records compromised : Link

British Gas (October 2015) 2,200 customer accounts compromised : Link

Potential data breaches have also been reported in the last few years at M&S, Twitter, LinkedIn and Spotify, though in some cases it is unclear if systems were hacked or if passwords were harvested from infected computers.

There was also an incident back in 2014 where systematic attacks on celebrity iCloud accounts lead to nude photographs being shared online. This was put down to weak passwords and publically available and guessable security information such as birth towns, first school, mother’s maiden name etc. Link https://www.theguardian.com/technology/2014/sep/02/gang-hackers-naked-celebrity-photos-routinely-attacked-icloud

Why should I care?

These days, like it or not, you likely have an account and accompanying password for pretty much every online or household service you can think of, from e-mail to Facebook, loyalty cards, online shopping, utilities and banking they all require a password in one form or another. The need to remember multiple passwords has become a fact of life for all of us, and at times can be an infuriating, frustrating and laborious task, especially when we can’t access the information we want when we want.

Over time most of us have found ways to cope with this and for a great many of us, we may be putting ourselves at risk. One of the most common ways is to use the same password across multiple accounts or perhaps slight variations of the same one, but chances are the same one is repeated on at least a few accounts. I know I am as guilty of this as the next person.  At the last count, I had around 220 different online accounts with passwords! and a recent security alert from Spotify showed me I had repeated passwords on far more that I realised, I spent an age changing passwords and deleting old accounts, frustrating as it might be it had to be done. Anyway you will realise, as I, that this is a very bad idea and that ‘digital hygiene’ is something we all need to start thinking about more seriously.

Below we will briefly talk about a five of the best ways you can start to improve your online passwords and manage your security more effectively.

Advice

1: Change your email account password.

In my opinion, the most important online service after banking is your primary email account, the one you use most and the one that is most often linked to other online services. If you’re going to go to the effort of changing any password and having a good strong unique password, you should probably start here. (In item 3 we talk about ways to choose a good password.)

It is likely that a great may more of your online accounts and services use this email account as a recovery method, and if it is compromised it could lead to other accounts being accessed as well.

2: Enable two-factor authentication

Many of the big technology companies such as Apple, Google, Microsoft and Facebook support some form of two-factor authentication. This, in its most basic form, usually means registering a mobile phone number with the company, so you can receive text messages containing a single use, unique code to verify that it is really you trying to access your account. Most often, this form of identification will be used when changing important details in your account or perhaps when logging in from a new device for the first time or at an unusual geographical location. It is meant to prevent unauthorised access in the event that your password has been compromised.

3: Use Better passwords

In an ideal world, your password should be a long string of random letters, numbers and symbols, containing no real words or common number sequences, though for most of us mortals it would be too difficult to remember.  That is why talk in the IT word these days has moved away from pass – ‘words’ and instead to pass – ‘phrases.’ This emphasises the fact that, the longer a password is, the harder to crack it will be. Having a passphrase will help in the difficult task of remembering a long unique password that is hard to be broken. For example, if your password is ‘Rex’ you can easily increase the length to ‘mybestfriendrex’ and to follow the best practice you can substitute some of the letters for symbols and numbers to make it extra strong. Such as “Myb3stfr!3ndR3x”There are tools online that measure the strength of a password to help give you and idea how to make a good one. Try entering the examples I gave above to see the difference it can make.  Follow this link for the tool. https://password.kaspersky.com/

4: Don’t reuse passwords

This is easier said than done, I think we are all probably guilty of this to some extent. Though the next item below can help greatly in dealing with all this password and account related stress and frustration.

5: Use a password manager

As I mentioned above in article 3 the best password is a unique random one, combined with never reusing it on any other services, and granted this would be impossible for a human to achieve. That is why ‘Password Managers’ are increasingly recommended by security experts.

The basics of how they work are as follows.

The manager will generate and store strong and unique passwords for your online accounts, the stored passwords are protected by encryption making them impossible to extract without the ‘Master Password’ This master password is your key to unlocking the password manager and access your stored passwords. Meaning; you only have to remember one password that you can make strong. Using a manager for example you would go to your Facebook account and rather that typing in your username and password for Facebook, the manager would pop-up and automatically fill out both, but only after you have entered your ‘Master Password’

Here is a recent review of the best Password Managers out there to help you choose if you want to give it a go. LINK  Most come with some sort of free trial, but do be careful if you fully commit to using one as most will tell you that if you lose your ‘Master Password / Key’ it will be impossible to get back the stored account information.

 

There are various opinions on how best to keep safe online so don’t just take my word for it have a closer look at what others say. Here are some links on the subject.

Kaspersky Microsoft – Techradar – Guardian

If you are worried about online security or want some help getting to grips with a password manager or even just want some help using windows 10. We are now offering 45min training sessions here in the shop. Prices are £29.99 for 45min: give us a call on 01442 800126 or fill out this ‘contact us form’ for availability and bookings.

Thanks for reading

Andrew

 

Windows 10 – May Newsletter

Dear reader,

Like it or not some of you are probably reading this email on your newly upgraded Windows 10 PC, perhaps you’re a tech maverick and choose to upgrade straight away back in July 2015, maybe you finally bit the bullet and gave in to the constant nagging, or, as many others will testify, you went to make a cup of tea and when you came back your computer was as if by magic, churning away installing Microsoft’s latest and greatest operating system. We wanted to try and get to the bottom of this auto-updating saga and in this month’s email we will try to give you a clearer picture as to what exactly Microsoft is doing, and we’ll throw in our two cents on Microsoft Windows 10. Don’t forget Windows 10 is a free upgrade until July 29th, 2016 after that it will cost £99.99, everyone likes a freebie don’t they?

Anyway, so Windows 10…

Oh.. and a word of advice, before upgrading, first check with your computer manufacturer that it has been tested for Windows 10!

 

The Big Question “Does windows 10 automatically install itself?”

In short, well… Err… maybe, sort of… there’s not really a short answer…

Most of you are probably familiar with the windows 10 pop-up box asking to upgrade, or reserve a copy. In the IT world, this type of popup or advertising is called ‘Nagware’ as it keeps nagging / reminding you to upgrade or buy something.  Up until February of this year that was the pinnacle of pushiness from Microsoft, however, the reclassification of the windows 10 update from an ‘optional update’ to a ‘recommended update’ took Microsoft’s aggressive roll-out of windows 10 up a gear.

Windows 7 and 8.1 PC’s have settings panel where users can choose how updates are installed based on the updates designated classification, i.e. automatically or not. By default, important updates are downloaded and installed automatically, and crucially there is also a checkbox that reads “Give me recommended updates the same way I receive important updates” this checkbox is by ticked by default, meaning that the reclassified windows 10 upgrade would, for most users be downloaded automatically.

Once this update has been downloaded, users of windows 7 or 8.1 would see a ‘Get Windows 10’ popup window either when they turn on their computer or at apparently random intervals. (See image below) This window would present a message to the user stating a time and date to schedule the full upgrade, now this is probably where most people get the idea that they were upgraded to 10 without consent. On the various iterations of this ‘Get Windows 10’ message window, the most aside from the message advertising Windows 10, the most prominent button is ‘OK’ which if clicked means agreeing to the scheduled time and accepting that Windows 10 will be installed. In fact, most of the various iterations, the popup, has no clear ‘NO, I do not want Windows 10’ button. There is only the smaller slightly obscure option to ‘Change the upgrade schedule or cancel the scheduled upgrade.’ otherwise, the ubiquitous red ‘X’ to simply close the window only for it to reappear later or at the next login.

I can imagine entirely that a great many people have simply clicked the ‘OK’ button, either without reading or fully understanding the content of this message box, or simply out of frustration brought on by the constant nagging. Indeed, it is completely possible that another user of the PC, sold to the idea of Windows 10 clicked ‘OK’ knowing fully well the consequences of this fateful left click. Either way, however the upgrade was scheduled, it does appear the manner in which it’s happening is messy and unclear enough that a great many people are convinced that they have been upgraded without giving consent.

In my opinion, the way Microsoft have gone about the whole thing seems a bit underhand, they are employing similar tactics we see in malware and adware, in fact only recently as this BBC News article discusses they took it a sneaky step further in yet again changing the ‘Get Windows 10’ scheduled upgrade popup so that if a user clicked the red ‘X’ to dismiss the window, it would, in fact, mean they were agreeing to the update the same as if they had clicked ‘OK.’ The lesson here is read the small print and be carful what your click on… easier said than done…!  Either way, Windows 10 is here to stay, and unless you turn to Apple side of the force or indeed go all-out and install a version Linux, you will most certainly be using a Windows 10 computer soon enough.

Opinion :

I asked the guys in the shop what they thought about windows 10, here’s what they said.

William Said: “It’s amazing! a lot more user-friendly than Windows 8 and is much better for users accustomed to older systems such as XP and Vista. I like that they removed the popup charm menu included in windows 8”

Nihat: Nihat is so impressed, he was left speechless when I asked for his opinion, although when pressed for comment he said “01101001 00100000 01101000 01100001 01110110 01100101 00100000 01101110 01101111 00100000 01101111 01110000 01101001 01101110 01101001 01101111 01101110

 

And me? (Andrew), *cough… Apple OS 10.11 is where it’s at, more stable, safer and user friendly for the average non-technical user, anyway, fruit sales pitch over (I will save the rest for another email) No, seriously, though, Windows 10 is in my opinion a powerful user-friendly operating system, and shouldn’t be too much trouble to get used to. With a little persistence and playing around I think most users will get their heads around it quite quickly. It does offer a much similar experience to Windows 7 / Vista than Windows 8 did, after all, I’m guessing that most of you have used a Windows XP or Vista computer before, and I would hazard a guess that the trauma of moving from XP to 7 has been long forgotten…

I’m very much of the opinion and philosophy that keeping up with the new will give you less of a problem in the future, that doesn’t mean pitching a tent on Regents Street to be first in line for the new iPhone, but instead trying not to fall too far behind making life more difficult when your forced to upgrade or move on. We see this kind of problem often when helping customers move from Windows XP and old versions of Microsoft Outlook or Live Mail to new Windows computers.

This sort of thing is a new phenomenon and I feel the tech companies have let down consumers when by not providing easier ways to move from one system to another. Never the less I feel we must accept this sort of change and as an inescapable part of the larger consumer computing revolution. (Sorry for rambling. All that to say Windows 10 is not bad… coming from an Apple fanboy, that must mean something…!)

By Andrew Shaw

Scam IT Calls – April Newsletter

Scam Calls

In this month’s HSC Newsletter, we would like to bring your attention to the very real and growing problem of Scam IT Support Telephone Calls. Please read on, if you find our advice and information useful or interesting please share it with your friends and family.

We feel the best way to protect people from such attacks is to teach them what to look out for.

You will find some helpful links at the bottom of the email should you need further advice and support concerning this type of scam.

 

Many of you may have seen or read in the news, stories of cold call fraud attacks, in which an unsuspecting person receives a telephone call out of the blue from someone purporting to be from Microsoft or an affiliate company. Callers claim to be from impressive-sounding yet ultimately fictitious Microsoft departments, some real examples used by scammers are: Microsoft Tech Support, Windows Helpdesk or Windows Technical Department Support Group.

Scammers are ready and armed, perhaps with some real address information or personal details of the person they are calling. This information could have been stolen or simply bought legally online. Either way, when used by the scammer in conjunction with cold reading techniques, scare tactics or other psychological tricks, the scammer will attempt to persuade the victim into trusting and following instructions. An attacker may suggest that a victim’s personal information or computer is in danger and that the purpose of the call is, in fact, to protect them from attack, or indeed that their computer has been infected with a virus and that they can help fix the problem. Whichever tactics the scammer employs their ultimate aim is to gain remote control of the victim’s computer.

Having gained the victim’s trust a scammer will walk them through a few simple steps to a website installing free remote login software, such as TeamViewer, Ammyy Admin or Log Me In. These tools are freely available for legitimate use and enable remote control of a computer over the internet. Once installed the scammer will ask for a few codes and ID numbers enabling the remote login. This is the point at which the danger for the victim becomes very real and the point which the scammer will try to get to as quickly as possible.

Once in control of a victim’s computer, it is, unfortunately, relatively easy and quick for a scammer to do some serious damage to a PC or lock the computer for the purposes of extorting money from the victim.

The Dangers

 

The following are a few actual examples of consequences and damage done by such attacks. Here at High Street Computers, we have helped multiple customers over the past year undo the damage caused, get the affected computer back up and running or try to move on from this type of attack.

 

Scam Support & Virus Removal:

Having connected to a computer the scammer will attempt to bewilder the victim using complicated language and displaying various examples and system information usually hidden from view. They will say that this is evidence of a virus or damage to the computer and will ask the victim to watch as they ‘fix’ the problems. At some point, the scammer will ask for payment for the service either through a money transfer company, card details or perhaps get the user to log on to their internet banking with the scammer connected. See the photograph of a fake receipt for such an attack.

System Password Lock: With a few commands it is possible for an attacker to create a new system password on a computer, that cannot be easily broken. In some circumstances, the fix may require the operating system to be reinstalled and the data restored. The scammer may demand a ransom to unlock the computer as without the password it will be unusable.

Ransomware Encryption: An attacker may download a very nasty virus onto a computer that will encrypt and lock all the user’s files, including documents and pictures. This is possibly the worst thing that can happen, as in many cases it will be impossible to unlock files without paying the ransom. Unfortunately, often the only solution is to restore files from backup, hoping that the backup disk was not also connected to the infected computer.

Advice

Needless to say, Microsoft or Apple will never call you to ‘Fix’ your computer, please find the companies’ official advice on this matter at the following links here and here. It would also be prudent to be cautious of similar calls from any company that you have not specifically requested help.

Our advice for someone who may have fallen victim to an attack is the following;

  1. Immediately shutdown the computer.
    • If a scammer is in control and you cannot shutdown, unplug the computer or hold the power button until it turns off.
  2. Contact your bank.
    • If you have given away card details or are concerned your accounts may be at-risk, immediately inform your bank that you may have been a victim of fraud or ID theft. The bank should have advice and a procedure on how to protect your cards and online accounts.
  3. Take your computer offline, scan for viruses, malware and remote login software.
    • To do this you can unplug the network cable from the back of the tower, disabled wireless networking on a laptop either with a button or keyboard shortcut or disable the wireless adapter in windows. You can then try and remove any remote software you may have installed, reconnect to the internet just long enough to update your antivirus programme, disconnect again then perform a full virus scan of your computer.

If you are unsure of how to do this take your computer to a reputable repair company or shop such as ourselves High Street Computers or ask friends and family for advice on services in your area.

 

We realise this may all be a bit depressing and alarming, but unfortunately this kind of attack although rare does exist and can be very damaging to your digital life.

Finally to lighten the tone of this month’s email, check-out this video in which a Scammer is pranked by a tech savvy guy. In the video listen to a real audio recording between a Scammer claiming to be from “Microsoft Tech Support” watch as the prankster tests the scammers patients to the limit!

If you have been a victim of an online fraud or would like more information on the serious nature of this issue, follow the following link to the Police Action Fraud website. You can report a crime or find advice and support.