Sunday, July 5, 2015
1012 C Street  •  Floresville, TX 78114  •  Phone: 830-216-4519  •  Fax: 830-393-3219  • 

WCN Site Search


Lost & Found

Our beloved Gracie is missing since October, Dachshund/Lab mix, microchipped, about 30 pounds, black with little white. $1000 reward for safe return. Call with any information, 830-393-9999 or 419-250-9099.

VideoFound 2 year old female Basset Hound at the corner of 360 Shorthorn & 204 Longhorn Rd, Stockdale. Contact Paula at 210-827-9583.

VideoLost: Cat in Floresville, end of Sutherland Springs Rd., wearing blue flea collar, grey and cream with tabby stripes, my little boy is worried about me. Call 210-216-9634 or 830-393-8496. 
More Lost & Found ads ›

Help Wanted

Help wanted, skills needed: cement, plasterer, welder, fence construction. Call 210-771-5255.
Sears is seeking a Delivery Driver/Sales Associate, must have great people and customer service skills and a willingness to work flexible hours; sales, delivery and installation of appliances, basic computer and register skills a plus, must pass background investigation, starting pay based on experience. If you are seriously interested in this position apply in person (no phone calls please) at the Sears Hometown store located at 2301 Tenth, Floresville.
More Help Wanted ads ›

Featured Videos





Video Vault ›

Scam Central


Scammers pose as feds in attempts to extort money with ransomware




E-Mail this Story to a Friend
Print this Story
December 4, 2012 | 1,496 views | Post a comment

Source: Federal Bureau of Investigation, Internet Crime Complaint Center

A new extortion technique is being deployed by cyber criminals using the Citadel malware platform to deliver Reveton ransomware. The latest version of the ransomware uses the name of the Internet Crime Complaint Center to frighten victims into sending money to the perpetrators. In addition to instilling a fear of prosecution, this version of the malware also claims that the user’s computer activity is being recorded using audio, video, and other devices.

As described in prior alerts on this malware, it lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law. The message further declares that a law enforcement agency has determined that a computer using the victim’s IP address has accessed child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a fine using prepaid money card services. The geographic location of the user’s PC determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is not a legitimate communication from the IC3, but rather is an attempt to extort money from the victim. If you have received this or something similar do not follow payment instruction.

It is suggested that you:

•File a complaint at www.IC3.gov;
•Keep operating systems and legitimate antivirus and antispyware software updated; and
•Contact a reputable computer expert to assist with removing the malware.
 

Your Opinions and Comments


Be the first to comment on this story!


You must be logged in to post a comment.




Not a subscriber?
Subscriber, but no password?
Forgot password?
Scam Central side bar header
auto chooserVoncille Bielefeld homeAllstate & McBride RealtyDrama KidsTriple R DC ExpertsHeavenly Touch home

  Copyright © 2007-2015 Wilson County News. All rights reserved. Web development by Drewa Designs.