Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  Online scams: Greed is still the target

Online scams: Greed is still the target

scam alert triangle sign

I recently got sent a “funny” image purporting to be a way to get free Apps from the Apple App store for Macs by entering a few terminal commands. The person who sent it to me thought it was a hoot, because it had the hallmarks of looking genuine; a set of commands that explained themselves as they went, claiming to enable “Developer Mode” to allow you access to free applications.

It’s not quite explained why a “Developer Mode” would actually allow developers to peer into the works of other developers out there, but then you’re not really meant to think too hard about this particular scam.

Even online, there’s no such thing as a free lunch, but this particular scam would taste particularly sour, as the commands that you would be encouraged to enter would in fact wipe your entire hard drive without any further confirmation. It’s a destructive prank, and one that I didn’t exactly see the funny side of.

Similar recent prank images have suggested variously that iOS 7 would make iPhones waterproof, or that you could make an Xbox One backwards compatible with an Xbox 360, all with destructive intent.

They’re a little different from your ordinary online social scams — you’re not being told you’ve won billions of dollars in a lottery you don’t remember entering, for example, because the intent is more in the realms of malicious damage for the sake of amusing the perpetrator of the prank.

Still, they’re working off the same basis. There’s something you want — in this case, the lure of free apps — and you figure that “it can’t do any harm to type in a few gibberish commands”. The issue is, naturally enough, that it very much can.

In some ways, it’s reminiscent of many of the original computer viruses. Those were purely destructive critters that would (and did) corrupt files, wipe hard drives, and in some particularly nasty cases, corrupt the underlying software on board the system motherboard. Viruses of that type largely fell out of favour when the market emerged both for botnets — machines remotely controlled by virus code for malicious purposes — as well as straight financial gain viruses, whether by harvesting personal information or holding systems hostage. After all, from the malware writer’s perspective, why wipe a system once for no gain when you could make money out of it?

So what should you do?

It’s still eminently sensible to have both a decent backup strategy in mind — especially as the simplest level of backup, an external hard drive, will cost you under $100, while hard drive recovery services can easily run to the hundreds if not thousands — as well as regularly updated antivirus/anti-malware packages running. There are still purely software vectors out there for infection and through that all sorts of problems that you’re better off avoiding.

At the same time, social vectors, such as appealing to your desire for freebies — whether it’s software, movies or straight up free money — remain a constant target because it’s often easier for nefarious types to get you do to do the work compromising your system than working a way around AV software. As such, the most intelligent bit of system security you can employ remains your common sense.

FacebookTwitterGoogle+Share

Recent News

snapdragon

Ever since the computer market shifted from desktop PCs to laptops, there’s been a significant balancing act going on between the needs of computer users for processing power to run programs, and the needs of those same users for battery power to keep their laptops going. At a simplified level, the harder you push a… More 

Apple-Apple

For the longest time, the generally accepted knowledge was that Apple’s Mac computers didn’t get malware or viruses. Apple even went so far as to mock its PC opposition in the famous “Mac vs PC” ads for the issues they had around security and malware, to a fairly solid effect. While Apple’s Macs do still… More 

intel

Quite often these days when we hear about a major security flaw, it’s to do with the underlying software that we’re running on our PCs, whether it’s a dodgy browser exploit, some kind of flaw in productivity software or even “free” content sites that are awash with malware. It’s not quite so often that we… More 

kindle

I’ve recently spent some time checking out Amazon’s latest Kindle e-reader, the 2nd generation Kindle Oasis. It’s the “luxury” choice in Amazon’s e-reader lineup, with a luxury price to match and a few new features to try to lure in those who love reading above other pursuits. One of the key new features is the… More