Saturday, August 27, 2016
1012 C Street  •  Floresville, TX 78114  •  Phone: 830-216-4519  •  Fax: 830-393-3219  • 

WCN Site Search


Preview the Paper Preview the Paper

Preview this week's Paper
A limited number of pages are displayed in this preview.
Preview this Week’s Issue ›
Subscribe Today ›

Lost & Found


VideoLost dogs. Male terrier and female yellow lab mix lost between Floresville and Pleasanton Aug. 24 FM 3161 and CR 2505. No collars. If found, please call 830-391-5660.

VideoFound 08/20 on Palo Verde Floresville. The Estates of Eagle Creek subdivision. Please call 210-487-8284 or 210-831-1343. Please help this little one find their home.
Lost: Female German Shepherd, Aug. 13, Oak Hollow and Hwy. 87, La Vernia, mostly black with tan on legs, white on chest. Reward for safe return, call 210-296-1183.
More Lost & Found ads ›

Help Wanted

Although we make every effort to spot suspicious ads before they run, one may occasionally get into print. If that happens, we ask the consumer to call us ASAP so that we can take corrective action.
Sears Hometown Store in Floresville, Texas is hiring warehouse/delivery driver and full-time sales associates. Applicants must be self-motivated with great customer service and sales experience. Management skills and bilingual is a plus. Qualified applicants may apply in person at 2301 10th., Floresville. No calls please.
More Help Wanted ads ›

Featured Videos





Video Vault ›

Scam Central


Malware Delivers Reveton Ransomware in Attempts to Extort Money




E-Mail this Story to a Friend
Print this Story
June 5, 2012 | 2,220 views | Post a comment

The IC3 has been made aware of a new Citadel malware platform used to deliver ransomware, named Reveton. The ransomware lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States federal law. The message further declares the user’s IP address was identified by the Computer Crime & Intellectual Property Section as visiting child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a $100 fine to the U.S. Department of Justice using prepaid money card services. The geographic location of the user’s IP address determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is an attempt to extort money with the additional possibility of the victim’s computer being used to participate in online bank fraud. If you have received this or something similar, do not follow payment instructions.

It is suggested that you:

Contact your banking institutions.
File a complaint at www.IC3.gov.

SOURCE: Federal Bureau of Investigation, Internet Crime Complaint Center (IC3)
 

Your Opinions and Comments


Be the first to comment on this story!


You must be logged in to post a comment.




Not a subscriber?
Subscriber, but no password?
Forgot password?
Scam Central side bar header
Triple R DC ExpertsFriesenhahn Custom WeldingAllstate & McBride RealtyVoncille Bielefeld homeHeavenly Touch home

  Copyright © 2007-2016 Wilson County News. All rights reserved. Web development by Drewa Designs.