Saturday, July 4, 2015
1012 C Street  •  Floresville, TX 78114  •  Phone: 830-216-4519  •  Fax: 830-393-3219  • 

WCN Site Search


Lost & Found

$500 cash reward for the return or information that leads to the return of missing bull, registered polled Hereford with tattoo ID# Z203, distinctive marks on head, yellow tag in right ear, "D" brand on right hip, missing from Hwy. 119 and C.R. 454 intersection. Call Patrick Danysh, 210-827-9331.

VideoFound on Longhorn Rd, neutered male Australian Shepherd mix, Call 210-305-2772 to claim.

VideoFound 2 year old female Basset Hound at the corner of 360 Shorthorn & 204 Longhorn Rd, Stockdale. Contact Paula at 210-827-9583.
More Lost & Found ads ›

Help Wanted

Your #1 Advertising Resource! Call 830-216-4519.
SS Water Supply Corp. is accepting applications for a full-time Administrative Assistant. Minimum qualifications: Five years in an office environment, proven organization and computing skills and above average communication ability required. The ideal candidate will have some financial management experience, ability to understand and interpret legal documents, become a notary, acquire skills to support the water utility industry and work independently on occasion. Person selected will be in an environment dealing with a variety of situations while serving the public. Starting pay depends on experience. Great benefits! Applications and resumes will be taken until position is filled! Apply in person at 10393 U.S. Hwy. 87 W., La Vernia, Texas, 830-779-2837.
More Help Wanted ads ›

Featured Videos





Video Vault ›

Scam Central


Malware Delivers Reveton Ransomware in Attempts to Extort Money




E-Mail this Story to a Friend
Print this Story
June 5, 2012 | 1,980 views | Post a comment

The IC3 has been made aware of a new Citadel malware platform used to deliver ransomware, named Reveton. The ransomware lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States federal law. The message further declares the user’s IP address was identified by the Computer Crime & Intellectual Property Section as visiting child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a $100 fine to the U.S. Department of Justice using prepaid money card services. The geographic location of the user’s IP address determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is an attempt to extort money with the additional possibility of the victim’s computer being used to participate in online bank fraud. If you have received this or something similar, do not follow payment instructions.

It is suggested that you:

Contact your banking institutions.
File a complaint at www.IC3.gov.

SOURCE: Federal Bureau of Investigation, Internet Crime Complaint Center (IC3)
 

Your Opinions and Comments


Be the first to comment on this story!


You must be logged in to post a comment.




Not a subscriber?
Subscriber, but no password?
Forgot password?
Scam Central side bar header
Voncille Bielefeld homeAllstate & McBride RealtyTriple R DC ExpertsHeavenly Touch homeDrama Kidsauto chooser

  Copyright © 2007-2015 Wilson County News. All rights reserved. Web development by Drewa Designs.