This article is from the Hoax Slayer website

“Your Computer Has Been Blocked” Tech Support Scam Browser Popups

written by Brett M. Christensen September 23, 2016
Fake Virus Alert Tech Support Scam

“Critical Alert” message that may appear while you are web browsing claims that your computer has been blocked due to virus and spyware infections and your personal information is being stolen.  It urges you to call a listed support number immediately to get help with the problem.  The page that triggers the popup appears to be part of the Microsoft website and features Microsoft logos, banners, and links.

Brief Analysis:
The claims in the alert message are false and the page has no connection to Microsoft. Your computer has not been blocked and the page has not detected any virus infection or information theft. The message is designed to panic you into calling criminals masquerading as tech support workers. If you call the listed number, the criminals will try to trick you into providing your credit card details, ostensibly to pay for your computer to be fixed. You may also be tricked into downloading remote access software that will allow the criminals to install malware on your computer and steal your personal and financial information. The scam popup window may be difficult to close and may keep reappearing. See the detailed analysis below for more information.

Error # SL9DW61
Please call us immediately at: [Phone number removed]
Do not ignore this critical alert.
If you close this page, your computer access will be disabled to prevent further damage to our network.Your computer has alerted us that it has been infected with a virus and spyware. The following information is being stolen…Facebook Login
> Credit Card Details
> Email Account Login
> Photos stored on this computer
You must contact us immediately so that our engineers can walk you through the removal process over the phone Please call us within the next 5 minutes to prevent your computer from being disabled.Toll Free: [Phone number removed]

Computer Blocked Tech Support Scam

Detailed Analysis:
Imagine that you are browsing the web looking for information or simply for entertainment. You click a link and, suddenly, a rather scary “critical alert” message pops up in your browser. The message warns that your computer has been blocked because of  a virus and spyware infection and, due to this infection, your personal and financial information is being stolen.

It instructs you to call a toll free number immediately so that the “engineers can walk you through the removal process over the phone”. It further warns that, if you do not call within 5 minutes, or if you close the page, your computer access will be disabled to prevent further damage to the network.

The page behind the popup alert appears to be part of the Microsoft website and includes the Microsoft logo and other seemingly Microsoft related elements.

However, the supposed warning is a scam. It is not associated with Microsoft in any way. Nor has it detected any virus infection or theft of information. And, despite the claims in the message, the “engineers” do not (yet) have any control over your computer and certainly cannot disable access if you fail to call or if you close the website.

The warning is just a nasty ruse designed to panic you into calling online criminals posing as Microsoft tech support workers. If you do call, the scammers will claim that you must first download a remote access program that will allow them to take control of your computer and – supposedly – deal with the virus infection. Once the scammers have gained access, they can install malware on your computer. This malware can run silently in the background and harvest information such as your online banking passwords and social media account login details. And, while they have access, the scammers can troll through your files for information they may want to take.

The scammers will also demand that you provide your credit card details over the phone, ostensibly to cover service charges for repairing your computer.

These scammers can be quite intimidating. They may claim – falsely of course –  that you may be fined, or even arrested, if you do not immediately comply with their instructions.

If one of these scam warnings appears in your browser, do not call the listed number under any circumstances.

You may find it difficult or impossible to close the popup window. Or, if you can close it, it may keep reappearing.  If so, you will need to terminate the processes associated with your browser by taking the following steps:

Windows Computers

1: Hit “Control – Alt -Delete” on your keyboard and then click “Task Manager”.

2: With the “Processes” tab active, highlight any processes related to your browser and hit the “End Task” button at the bottom of the Task Manager window.

Mac Computers

1: Hit “Command + Option + Esc to open the “Force Quit Applications” window.

2: Select the name of the browser you are using and hit the “Force Quit” button.

It would also be wise to scan your computer for malware. We recommend Malwarebytes, which is free for home users.

These browser popup tech support scams are very similar to other tech support scams in which the criminals call you rather than the other way around.

This article is from the Hoax Slayer website


This article is from the Action Fraud Website

Alert: Fake BT email takes advantage of global ransomware attack

18th May 2017

Fraudsters are using the global WannaCry ransomware attack as a hook to try and get people to click on the links within this clever BT branded phishing email.

We have received several reports of this very convincing email that claims BT have launched preventative measures to protect your data on an international scale.

After analysing the email, the domains appear very similar and this could easily catch out those who are concerned about the security of their data after the global attack.


Taking advantage

Cyber criminals have been known in the past to take advantage of situations like this to design new phishing campaigns.

If you receive one of these emails do not click on any links and follow our advice on how to stay safe. Instead, go to the BT website directly and log in from there.

We are also aware that companies are sending out legitimate emails of reassurance in connection with the recent cyber attack, if in doubt contact them directly on a method other than the email you have received.

Remember that fraudsters can “spoof” an email address to make it look like one used by someone you trust. If you are unsure, check the email header to identify the true source of any such communication.

Additionally you should always update your Anti-Virus software and operating systems regularly and follow our advice on how to deal with ransomware.

Report fraud and cyber crime to Action Fraud and receive a police crime reference number.

Sign up for free to Action Fraud Alert to receive direct, verified, accurate information about scams and fraud in your area by email, recorded voice and text message.

This article is from the Action Fraud Website


Blithehale Health Centre Patients Blog


This article is from the Action Fraud website.

It is believed that personal information of patients is secure.

NHS hit by large scale cyber attack

12th May 2017

There have been confirmed reports that the NHS has been hit by ransomware, taking down hospital computers.

Currently Trusts and hospitals in London, Nottingham, Blackburn, Cumbria and Hertfordshire have all been affected.

The ransomware which has locked NHS computers is asking for payment of $300 in Bitcoin.

The National Cyber Security Centre (NCSC) is aware of cyber incident and is working with the NHS and the NCA’s National Cyber Crime Unit (NCCU).

View image on Twitter

Here’s the malware attack which appears to have hit NHS hospitals right across England today

A spokesperson for NHS Digital said: “The investigation is at an early stage but we…

View original post 265 more words




£5 note: Deadline looms for digging out old paper fivers

  • 4 May 2017
    Old Fiver 1

    Last day for the old Fiver

    Millions of paper fivers are still in purses, wallets and piggy banks, despite the banknote ceasing to be legal tender by the weekend.

The Bank of England said 150 million of its paper £5 notes – the equivalent of about three for every adult in the UK – remain with the public.

Shops may refuse them from Saturday, although banks should exchange them.

The change to polymer £5 notes marks a temporary absence of women, apart from the Queen, on the Bank’s banknotes.

Social reformer Elizabeth Fry’s portrait has been on the paper £5 note for 15 years. That note will no longer be legal tender from midnight on Friday night.

The paper £5 has been replaced by the polymer note featuring Sir Winston Churchill.

New Fivers 1

New Polymer Fiver

What should I do with my old fivers?

The polymer Churchill fiver entered circulation in September, since when it has been circulating in tandem with the paper £5 note.

With millions of the new notes having been printed, the old paper fivers have been withdrawn by banks. Retailers have accepted the old paper £5 notes, but can refuse them from Saturday.

Shopkeepers will have arrangements with their banks, should they still hold them in their tills from the weekend.

More significantly, millions of the old banknotes are still in handbags, bedroom drawers and down the back of sofas across the country.


Generally, the Post Office will continue to accept the notes as a deposit into any main UK bank account even after the notes cease to be legal tender.

Banks will accept the notes if they are brought into a branch by their own customers – at least for the next few months.

A spokesman for RBS said: “After the note goes out of circulation, customers will still be able to bring in their old £5 notes for exchange at one of our branches. Non-customers will be directed to their own bank.”

A Lloyds Banking Group spokesman said: “We’ll continue to accept them from our customers, either exchanging them for the new polymer note, or depositing it into their account, whichever they prefer.”

The public can take or post any old notes, at any time in the future, to the Bank of England in Threadneedle Street in the City of London, to be replaced.

The old paper £5 notes, when withdrawn from circulation, are shredded and turned into compost, according to the Bank of England.

A spokesman for the Committee of Scottish Clearing Bankers, which represents Bank of Scotland, Clydesdale Bank and Royal Bank of Scotland, has said: “The paper Scottish fivers are not being withdrawn from circulation, they are just not being reissued. They don’t have a withdrawal date as such similar to the English £5 notes.”

The move to the new polymer £5 note has been controversial.

Firstly, after the announcement of Churchill as the main portrait, there were protests and discussions about female representation on banknotes.

Fears of a long-term absence of women on Bank of England notes were finally averted when the the Bank said author Jane Austen would appear on the new polymer £10 to enter circulation in September 2017.

Secondly, vegans and some religious groups have voiced concerns about the new polymer note, as it contains a small amount of tallow, which is derived from meat products.

The Bank recently said it would not redesign and reprint those in circulation, but it was still working with its polymer supplier to “determine what alternatives might be available” for the current £5 note and the Jane Austen £10 polymer note.



Blithehale Health Centre Patients Blog



(on the box or the bottom of the cartridge)


Recall Alert! Check Your Child’s Inhalers ASAP

Nearly 600,000 inhalers were just voluntarily recalled nationwide by GlaxoSmithKline due to “defective delivery system,” with a large number of units having “out of specification results for leak rate” (possible package leakage).

The FDA describes the affected inhalers as prescription-only “Ventolin HFA (albuterol sulfate) Inhalation Aerosol, 90 mcg per actuation, 200 metered inhalations, net weight 18 g inhalers.” The recall is classified as “Class II,” which means “the products might cause a temporary health problem, or pose only a slight threat of a serious nature,” the FDA reports.

To see if your child’s inhaler is affected by this recall, see the lot numbers and expiration…

View original post 37 more words





Fraudsters are sending out a high volume of phishing emails to personal and business email addresses, pretending to come from various email addresses, which have been compromised.

The subject line contains the recipient’s name, and the main body of text is as below:

“Hi, [name]!

I am disturbing you for a very serious reason. Although we are not familiar, but I have significant amount of individual info concerning you. The thing is that, most likely mistakenly, the data of your account has been emailed to me.

For instance, your address is:

[real home address]

I am a law-abiding citizen, so I decided to personal data may have been hacked. I attached the file – [surname].dot that I received, that you could explore what info has become obtainable for scammers. File password is – 2811

Best Wishes,”

The emails include an attachment – a ‘.dot’ file usually titled with the recipient’s name.

This attachment is thought to contain the Banking Trojan Ursniff/Gozi, hidden within an image in the document. The Ursniff Banking Trojan attempts to obtain sensitive data from victims, such as banking credentials and passwords. The data is subsequently used by criminals for monetary gain.

Protect Yourself:

Having up-to-date virus protection is essential; however it will not always prevent your device(s) from becoming infected.

Please consider the following actions:

  • Don’t click on links or open any attachments you receive in unsolicited emails or SMS messages: Remember that fraudsters can ‘spoof’ an email address to make it look like one used by someone you trust. If you are unsure, check the email header to identify the true source of communication (you can find out how by searching the internet for relevant advice for your email provider).
  • Do not enable macros in downloads; enabling macros will allow Trojan/malware to be installed onto your device.
  • Always install software updates as soon as they become available. Whether you are updating the operating system or an application, the update will often include fixes for critical security vulnerabilities.
  • Create regular backups of your important files to an external hard drive, memory stick or online storage provider. It is important that the device you back up to is not connected to your computer as any malware infection could spread to that as well.
  • If you think your bank details have been compromised, you should contact your bank immediately.

If you have been affected by this or any other fraud, report it to Action Fraud by calling 0300 123 2040, or visit www.actionfraud.police.uk.







DVLA Scam Warning