{"id":392,"date":"2017-10-11T01:31:21","date_gmt":"2017-10-11T01:31:21","guid":{"rendered":"https:\/\/howste.net\/?p=392"},"modified":"2022-11-27T05:21:44","modified_gmt":"2022-11-27T05:21:44","slug":"is-your-computer-celebrating-halloween-without-you","status":"publish","type":"post","link":"https:\/\/howste.ninja\/index.php\/2017\/10\/11\/is-your-computer-celebrating-halloween-without-you\/","title":{"rendered":"Is your computer celebrating Halloween without you?"},"content":{"rendered":"<p>Storm Worm &#8212;\u00a0OSX\/RSPlug Trojan &#8212;\u00a0Netsky and Sasser &#8212;\u00a0The Blaster Worm &#8212;\u00a0The Melissa Virus &#8212;\u00a0ILOVEYOU &#8212;\u00a0The Anna Kournikova Worm &#8212; CIH &#8212;\u00a0The Concept Virus &#8212;\u00a0The Morris Worm<\/p>\n<p><strong>Are we talking about something\u00a0I should see my doctor about?<\/strong><br \/>\nWell, we are talking about the worst viruses of all time, and your computer is at risk.<\/p>\n<p><strong>Why does that matter to me, I&#8217;m a smart person, I have antivirus software?<\/strong><br \/>\nWell for starters, they haven&#8217;t all been cured. In fact, some of these are laying dormant on machines across the world. Some of these have been upgraded. And some of these have been modified to work on your phones.<\/p>\n<p><strong>Surely not\u00a0my phone though,\u00a0I\u00a0have an apple it&#8217;s harder to attack.<\/strong><br \/>\nYes, Apple is more resistant than Android or Windows phone. So, these codes get embedded into the apps.<\/p>\n<p><strong>Into the apps? But I only install apps from reputable companies.<\/strong><br \/>\nYep, and just a like a file from an email, an app can have it embedded into it, or it can be part of the download from the app store\/apple iTunes.<\/p>\n<p><strong>Wait, iTunes\/App Stores run virus programs, they check for this stuff, they should know what they are doing.<\/strong><br \/>\nYes, they check for it, after its been reported to them, they go back and retroactively check it out.<\/p>\n<p><strong>Why don&#8217;t they look at it first, before it leaves the app store\/iTunes?<\/strong><br \/>\nThey have too many apps uploaded regularly and they leave it to the vendors to monitor their work.<\/p>\n<p><strong>Well a vendor wouldn&#8217;t intentionally add a virus, that would be counter productive.<\/strong><br \/>\nYou&#8217;re right! But app stores\/iTunes get hacked, just like the rest of us. Are you sure that you want to make them responsible for your safety?<\/p>\n<p><strong>What can I do about it?<\/strong><br \/>\nMake sure that your antivirus is set up to run on any downloads, including App store\/Itunes purchases. That it is checked before it is installed.<\/p>\n<p><strong>Every time?<\/strong><br \/>\nYes, and with Halloween right around the corner&#8230; it&#8217;s time to be extra careful. Halloween is known as being a hallmark time for new and unusual viruses and malware to hit the market. Halloween pranks aren&#8217;t just in your back yard anymore!<\/p>\n<p>If your computer is acting up, call us, call a professional&#8230; take it serious. Shut it off, and call someone to look at it. Make sure your backups are complete now.<\/p>\n<p>If your co worker is acting up&#8230; well thats a different professional, we can&#8217;t help with that.<\/p>\n<p>Happy Halloween<\/p>\n<p>Howste Technical Services<\/p>\n<p><a href=\"tel:4702361999\">470.236.1999<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Storm Worm &#8212;\u00a0OSX\/RSPlug Trojan &#8212;\u00a0Netsky and Sasser &#8212;\u00a0The Blaster Worm &#8212;\u00a0The Melissa Virus &#8212;\u00a0ILOVEYOU &#8212;\u00a0The Anna Kournikova Worm &#8212; CIH &#8212;\u00a0The Concept Virus &#8212;\u00a0The Morris Worm Are we talking about something\u00a0I should see my doctor about? Well, we are talking about the worst viruses of all time, and your computer is at risk. Why does [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"class_list":{"0":"post-392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information_technology","9":"post-with-thumbnail","10":"post-with-thumbnail-large"},"_links":{"self":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":1,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/392\/revisions"}],"predecessor-version":[{"id":5204,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/392\/revisions\/5204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/media\/393"}],"wp:attachment":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/media?parent=392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/categories?post=392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/tags?post=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}