<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.floodcomputingsolutions.com/blogs/tag/hacked/feed" rel="self" type="application/rss+xml"/><title>Flood Computing Solutions - Blog #hacked</title><description>Flood Computing Solutions - Blog #hacked</description><link>https://www.floodcomputingsolutions.com/blogs/tag/hacked</link><lastBuildDate>Tue, 07 Apr 2026 07:30:41 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Tech support scammers may try to trick you with a pop-up window that appears on your computer screen]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Pop-upscam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/windows scam.png"/>How to spot a pop-up scam.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QwgNT6yXTIK-LsuxplK6qg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_P8_oWfIcRI62eO0y1Vkb9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ibME9ht4SuSxl9EHGYnZ7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pQd-agU6QDGA5YJI0108iQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pQd-agU6QDGA5YJI0108iQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="font-weight:inherit;margin-bottom:10px;"><strong>Beware Of Tech Support Scammers Who Try To Trick You With A Pop-Up Window</strong></h1></div></h2></div>
<div data-element-id="elm_btHOvqd2S_mgpRpLz1VzLw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_btHOvqd2S_mgpRpLz1VzLw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;"><span>If you're like most people, you've probably seen a pop-up window appear on your computer screen at some point that looked like it came from Microsoft or Google.</span>&nbsp;The message in the pop-up might have said that your computer was infected with a virus and you needed to call a number to get help removing it.</span></h2><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;"><br></span></h2><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;">&nbsp;This is a scam known as a tech support scam, and it's designed to trick you into giving scammers remote access to your computer so they can steal your personal information or install malicious software on your device.</span></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><br></strong></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><br></strong></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span><span style="font-size:32px;">What to do if you see a pop-up window on your computer</span></span></strong></h2><h2 style="margin-bottom:8px;"><div><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you see a pop-up window on your computer screen that is advising of a breach with a tech support number to contact, its likely a scam.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">Tech support scammers often use pop-up windows that look like they’re from Microsoft or another well-known company to trick you into giving them remote access to your computer. They might say they’ve detected a virus or other problems and offer to help you fix them. Or they might say you need to buy new software or pay for a service to protect your computer.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you see a pop-up window like this, don’t click on it. Don’t give the person who opens it remote access to your computer. And don’t buy anything from them.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">Large computer and software companies will never send unsolicited email messages or make unsolicited phone calls to charge you for computer security or software fixes. Microsoft also will never ask you to provide your credit card or bank account information to them.&nbsp;</span></div><div style="color:inherit;"><br></div><div style="color:inherit;"><img src="/windows%20scam.png" alt="Example of Microsoft Scammer Pop-Up"><br></div><div style="color:inherit;"><span style="font-size:18px;font-style:italic;">Example of a SCAM Pop-up</span></div></div></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><br></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span><span style="font-size:32px;">How to tell if the pop-up is from a tech support scammer</span></span></strong></h2><h2 style="margin-bottom:8px;"><div><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">It can be difficult to tell if a pop-up window is from a tech support scammer. Here are some signs to look out for:</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- The pop-up window claims to be from Microsoft or a well-known company.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It claims that a virus or other problem has been detected on your computer.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It requests that you give the person who opened the pop-up window remote access to your computer.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It requests that you buy a product or pay for a service to protect your computer.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you’re unsure whether the pop-up window is from a tech support scammer, don’t click on it. Don’t give the person who opened it remote access to your computer. And don’t buy anything from them.</span></div><div style="color:inherit;"><br></div><div style="color:inherit;"><img src="/locked%20screen%20scam.png" style="width:660.9px !important;height:522px !important;max-width:100% !important;" alt="scammer page example "><br></div><div style="color:inherit;"><br></div></div></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><br></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span style="font-size:32px;">What to do if you've been scammed</span></strong></h2><h2 style="margin-bottom:8px;"><div></div></h2><h2 style="margin-bottom:8px;"><div></div></h2><h2 style="margin-bottom:8px;"><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you think you may have been scammed, there are a few steps you should take: </span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">1. Don’t panic - take a breath and try to remain calm.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">2. Contact your bank or credit card provider to check if any suspicious charges were made.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">3. If you gave the scammer remote access to your computer, change the passwords for all your online accounts.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">4. Contact your IT professional so they can run anti-malware software to remove any malicious software the scammer may have installed. Check for new vulnerabilities created or crawlers left behind to catch your data.&nbsp;</span></div><div style="color:inherit;"><div><span style="font-size:18px;font-family:Comfortaa;">5. Report the scam to the <a href="https://reportfraud.ftc.gov/#/" title="Federal Trade Commission (FTC)" rel="">Federal Trade Commission (FTC)</a>.</span></div></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">6. Let other people know about your experience. </span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><span style="font-family:Comfortaa;"><span style="font-size:18px;">Remember, you never have to pay to talk to tech support representatives. If you receive any calls or pop-up windows that tell you there is something wrong with your computer and you must pay to repair it, it<span style="font-size:18px;"> is li</span></span><span style="font-size:18px;">kely a scam.</span></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;"><br></span></div></div></h2></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 14 Apr 2023 12:40:02 -0700</pubDate></item><item><title><![CDATA[Attention Data Breach Last Pass ]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/LastPass</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/data breach last pass.jpg"/> Is there a safe place to store your passwords online? ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_61cEqEtFTaauW-ai9PQ_aw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1nyrVOAmQuuI6qDD4LUPFg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IImb7taxRJqisYWt5r6ifg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LieRX-qFSx-QB76sjM_e7g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LieRX-qFSx-QB76sjM_e7g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Last Pass Data Breach</h2></div>
<div data-element-id="elm_SmuJX01MRym_if9xPQ5I4g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SmuJX01MRym_if9xPQ5I4g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:14px;">Is there a safe place to store your passwords online?</span></span></p></blockquote><p></p><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<div style="color:inherit;text-align:left;"><span style="font-size:14px;color:inherit;">In short, no. The vault of your own mind, and pen and paper are still the most secure methods of keeping track of your passwords.</span></div>
<div style="text-align:left;"><span style="font-size:14px;"><br></span></div><span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">As seen with the recent news release from LastPass, owned by GoTo (formerly LogMeIn), a company trusted by more than 30 million users and 85,000 business customers worldwide. Last Pass had been breached in August of 22, that went through October 22.</span></div></span><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">The result of the first breech allowed the threat actor enough information to use a software to capture a DevOps Engineer's corporate vault, password and MFA authentication. Giving them access to millions of critical database files.</span></div></span><div style="text-align:left;"><span style="font-size:14px;"><br></span></div>
<span style="color:inherit;font-size:14px;"><div style="text-align:left;"><span style="color:inherit;">The temptation for easy login and password remembrance is not worth the security risk.</span></div>
<div style="text-align:left;"><br></div></span><p></p></div></div></div></div></div>
</div></div> ]]></content:encoded><pubDate>Mon, 06 Mar 2023 06:00:00 -0800</pubDate></item></channel></rss>