Scammers or Terrible Social Engineers?

Scammers are on the rise these days, from email scams to phone scams, and even in the mail. Let’s start with email/internet scams. My goal is to use up as much of the scammers time as I can an I use a few ways to verify the scammers location. Usually you will get an email from some prince or someone who is in the hospital wanting to give you their life funds because they don’t trust their family. Don’t respond or give them any information. They all use the same terminology when speaking to you as well. “Can you KINDLY respond back to me”. “Kindly” is one of their favorite words. Another red flag is the payment method, they will ask for a money graham or western union transfer to a name you have not heard of. Most scammers I have dealt with have been very bad at answering questions because that is a waste of their time. Their goal is to make you feel like you are dealing with a very smart individual who will send you what you have ordered or what you are talking about in the discussion. Check the email address they send it from and use reverse email website to see if you can find out more on who you are talking about.

Such site includes:


These sites are free and easy to user when it comes to reverse email look-ups. They won’t give you a real name so it’s not worth trying to locate.

Another thing to try to get the scammers to do is click a link that has been tagged by an IP logger. What is an IP logger you might say. It is a link that has been modified or changed so that the person clicking on it will give out their location. Scammers work on a network of different locations. Most of the time the location of where they want the money sent isn’t where they are. They have a pickup person in one place who sends the funds to someone in another location. This makes the whole operation harder to locate and most of the time the funds to leave the united states or the country the scam is located in. If you can split your operation you are harder to find. The Two main IP loggers I use are:

They are very accurate and do well.

Example, A website I am currently investigating is they have pulled information off other dog breeders websites and pulled them to their own using older pictures as well. I have used two different Email addresses to contact them, both times I have gotten a different name to send a money graham too. That is what they use for their operation as well, harder to track and non-refundable. The thing is if they don’t get what they want from you they will either threaten you or move on to the next person they are scamming. This is one of the examples when you trying to purchase an item from them. On the contrary when they are buying something from you they use similar tactics and usually want to send you more money than the item is worth. The reason for this is so you can cash it and they have your bank realize its fraud while you send the money back to them. In one case I have had them send an expedited check to me at my job to test out them sending the document to me.


Second is Tech support scammers. They are getting craftier, I have A set of videos on this. Microsoft will never call you if your computer has a virus. This section will be a little shorter and I’ll link my YouTube page to it. Their goal is to craft webpages that look like Microsoft errors and be very identical the actual Microsoft website if you have not paid attention to how it looks. Pay attention to the web address line and make sure it is a Microsoft website. Scammers do not affiliate themselves with the actual company. They state that they are techs to fix your computer approved my Microsoft. They have many techniques to make you think you have virus’s. Please visit my YouTube page for more on how they work.


In conclusion, Scammers, or social engineers are out there daily trying to steal your money from you, they come in many forms. IRS calls to door to door salesman. Be careful who you talk to and who you share your information with or who you allow to use your computer.


Signing off!


WannaCry Ransomware : What is it and How to Protect against it


The WannaCry ransomware burst into the spotlight over the weekend as reports of infections streamed in from around the globe. This has affected systems in more than 150 countries with more than 230,000 computers infected.

What is Ransomware?

Ransomware is a type of malicious software(computer virus) that encrypts and blocks access to data until a ransom is paid. It usually spreads via spam emails and malicious download links and displays a message requesting payment to decrypt it.


The WannaCry ransomware A.K.A. Wanna Decryptor, uses a leaked NSA exploit Eternal Blue that targets Windows SMB service which can be used to hijack computers running unpatched, vulnerable Microsoft Windows operating system.

The ransomware that has affected systems in more than 150 countries recently. It leverages Social Engineering/Spear Phishing as their attack vector by sending some malicious links or a PDF file, which when clicked, installs the ransomware. Once installed, it scans the entire network for other vulnerable devices and spreads.

Follow these steps to prevent infection:

  • Update your system.
  • Upgrade to windows 10 if you are using older versions. Keep it updated.
  • If you are using older versions of windows , apply these patches immediately.
  • Enable Firewall, block access to SMB ports – TCP – 137,139 and 445 and UDP – 137 and 138.

  • SMB is enabled by default on Windows. Disable SMB service –,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012

  • Have a pop-up blocker running on your web browser.
  • Update your antivirus.
  • Backup your data regularly.
  • Do not open any attachments from any Unknown sources.



Never Pay ransom.

Its upto you whether to pay the ransom or not. There is no guarantee that you will get your files back.