Spam email coming from your own system

There have been a number of reports to us that people are receiving emails that seem to come from someone in their organisation. This is either a random name or docs*@domainname.com.au (* = random number) sent with the Subject: Confidential – ALL Employees Important Document(s) and an Attachment.

This attachment is a virus and will harm your computer so please do not open it. If you have opened an attachment like this, please run a scan on your computer to make sure you don’t have a virus or give Aussie Computer Experts a call on 1300 223 123.

Below is the email in full

 

From: Administrator [mailto:docs8@domainname.com.au]

Sent:

To: user@domainname.com.au

Subject: Confidential – ALL Employees Important Document(s)

 

Please find attached documentation I will need you to complete and send back to me as soon as you can if that-s okay.

 

Please do not hesitate to contact me if I can provide you with any further support or assistance.

 

Thank you

 

This e-mail and / or any attachment(s) is intended solely for the above-mentioned recipient(s) and it may contain confidential or privileged information. If you have received it in error, please notify us immediately at helpdesk@domainname.com.au and delete the e-mail. You must not copy it, distribute it, disclose it or take any action in reliance on it.  For Affiliate Members, this publication is only intended to provide a summary.It does not purport to be comprehensive, definitive or to be legal advice.Changes to the law and government policy may occur quickly.  We recommend that specific legal or other professional advice be obtained about matters discussed in this publication. We give no warranty (and accepts noliability) for loss or damage sustained by any person, corporation or other legal entity as a direct or indirect consequence of their reliance on the matters contained in this publication. For the future of our children please consider the environment before printing this email.

Bank Fraud Emails at it again

We have been receiving reports that the banking fraud and ATO fraud emails are on the rise. Please be aware of these emails. No legitimate business will send you an email asking you to go to a website to reset a password without you clicking on a reset password link.

An example of the fraud email:

Delete or report these emails

If you get these emails, please either delete them or forward them onto the relevant business so they are aware of the fraud in their name.

Some examples:
ACCC Scam Watch
ATO Report a Scam
NAB Report a Scam
CBA Report a Scam
Westpac Scams Website
ANZ Scams Website

Xbox 360 Competition Draw

The time has come to draw the winner of our Xbox 360 competition and the winner is:

Matt Cooper – Aspect Architecture

Xbox Competition

Xbox Competition

 

Quality Assurance for Assured Quality

Aussie Computer Experts would like to announce that they have engaged QAS International to develop and implement a Quality Management System which will allow us to attain ISO 9001:2008 certification. Looking forward to it!

www.qualityassuranceservices.com.au

WE RECYCLE OLD AND USED INKS AND TONERS

Want to help save the environment?

Do the right thing and drop your old Inks and Toners into Aussie Computer Experts.
We have a drop box sitting out the front of our door that you can drop your Inks and Toners in.
We do this as a free service, and non for Profit!

If you have any questions please feel free to contact us on 1300 223 123

Internet Browsing

If we ask people what internet browser they are using, we normally get a blank look or we are told they use google or ninemsn. If you are unable to answer this question yourself, you are most likely using Internet Explorer if you have a Windows computer or Safari if you are using a Mac.

Viruses are designed to infect the most amount of people and cause the most amount of damage and are normally targeted for a Windows computer running Internet Explorer. Antivirus and internet security programs are designed to keep the viruses out but if your computer has a big hole in the security then viruses can come through the hole and still infect your computer.

We have made the recommendation to  any customer that comes in with an internet issue or a has had a virus removed to change their habits and change their internet browser to something other than internet explorer and Safari. The main alternatives to the default installed browser is Mozilla Firefox or Google Chrome. Chrome is rated the most secure and the faster internet browser that is available, the only downside is that the layout is very different and may require a small learning curve to adjust. Firefox is Internet Explorer’s main competition. They have similar looks and is very easy to change over. Firefox is not as high as Chrome,  but it is a lot faster and more secure than Internet Explorer and Safari.

To get these browsers installed onto your computer search for Firefox or Chrome and download the file to install. Once installed these browsers will give you an opportunity to import your settings and favourites to the new browser.

If you would like some assistance or want us to do this for you. Please give our office a call on 1300 223 123 and for $40* instore, we can install a new browser and configure this for you.

*This offer is valid until 31/1/2013

Asus Nexus 7 Tablet! Now at Aussie Computer Experts – Only $289

Christmas is just around the corner! Perfect Gift for your loved ones or yourself!

If you’re looking for a tablet for games, media and books, the Nexus 7 is an outstanding device, sold at a great price!

Perfect for Playing Games – Checking Emails – Surfing the web – and the best part! From anywhere!

Call us on 1300223123 or drop into our store – Only $289

Simple. Beautiful. Beyond Smart.

The Nexus brand represents a premium Android-based device that delivers the best Google experience available on tablet. It’s the confluence of the latest software and state-of-the-art hardware and represents a literal nexus of digital life.

Nexus 7 is Google’s latest Nexus experience device and the first tablet to feature Android™ 4.1 Jelly Bean. It combines the best of both Google and ASUS design, with the most advanced software from Google paired with cutting edge ASUS hardware.

[Read more…]

Can’t remove a Printer? We have got the solution for you!

Here’s how we did it, step-by-step:

1. right-click on desktop, create a new shortcut with target as ‘cmd.exe’.
2. right-click on the shortcut, “Run as Administrator”
3. Run the printui tool:  printui /s /t2
4. Try deleting the printers. If that doesn’t work…
5. CLick Start > Run > Services.msc
6. Locate the Print Spooler service, and right-click > Properties > stop service.
7. Open My Computer and browse to c:\Windows\System32\spool\Printers
(you will need to say “oK” to get access to the folder).
8. DELETE the contents of that folder.
9. Restart the Print Spooler service.
10. Go back into the printui utillity (might need to restart it using same method as above) and try removing printers again. This time it should work. If necessary, check the “Ports” tab and remove any TCP/IP ports that are associated with the old printer.
11. Last but not least, I checked other computers on my home network to see if any of those had mapped to the old printer, and I removed those mappings, as the date of spooled documents suggested it was printed to long after it was physically removed.

Androids, iPhones open to attack through Exchange

Wipe phones, steal data and cause mayhem with ActiveSync.

An attacker can steal your contacts, snoop on your email and erase all data from your iPhone or Android using Microsoft Exchange, a Perth university lecturer has revealed.

Peter Hannay discovered that by pushing policy to phones he could wipe the devices clean and likely steal data and sniff outgoing emails.

READ MORE

Are You at Risk? What Cybercriminals Do With Your Personal Data

So what do they have to worry about? According to experts, the most likely security risks for consumers range from the annoying (more spam in their email inboxes) to potentially much more dangerous targeted “phishing” emails, where the sender disguises himself as a trusted individual or organization in order to trick the recipient into clicking a link that will download malware onto his or her computer or into giving the sender confidential information such as a password, credit card or Social Security number.

Why is this information valuable to cybercriminals?

Personal information is the currency of the underground economy. It’s literally what cybercriminals trade in. Hackers who obtain this data can sell it to a variety of buyers, including identity thieves, organized crime rings, spammers and botnet operators, who use the data to make even more money.

For the full article click here