Saturday, December 3, 2016
1012 C Street  •  Floresville, TX 78114  •  Phone: 830-216-4519  •  Fax: 830-393-3219  • 

WCN Site Search


Preview the Paper Preview the Paper

Preview this week's Paper
A limited number of pages are displayed in this preview.
Preview this Week’s Issue ›
Subscribe Today ›

Lost & Found

Lost: Male Great Pyrenees, all white, double dew claws on back legs, sweet, shy, not aggressive, Nov. 10, C.R. 404/405, neighbors heard 2 shots, any information appreciated. 830-393-0801.
Found: Red Chihuahua, male, friendly but frightened, need to find his owner, in Floresville. 830-534-6413.

VideoFound: Dog, chocolate color, on old Pittman Rd., be prepared to prove it's your dog, looking for owner. Call or text Tammy at 830-391-6662.
More Lost & Found ads ›

Help Wanted

Oilfield Roustabouts - SEI Oilfield Services now hiring experienced roustabouts at our Jourdanton location, Mon.-Fri. with weekends as necessary, weekly pay, full benefits package, matching 401k, and PTO, $11-$12/hour. If you have prior roustabout experience email your resume and/or contact information to rmclain@seioilfield.com.
Seeking individual to work in a local child-care center, paid holidays, etc., must be high school grad or GED. Apply in person at Cubs Country Childcare, 212 FM 1346 in La Vernia.
More Help Wanted ads ›

Featured Videos





Video Vault ›

Scam Central


Scammers pose as feds in attempts to extort money with ransomware




E-Mail this Story to a Friend
Print this Story
December 4, 2012 | 1,629 views | Post a comment

Source: Federal Bureau of Investigation, Internet Crime Complaint Center

A new extortion technique is being deployed by cyber criminals using the Citadel malware platform to deliver Reveton ransomware. The latest version of the ransomware uses the name of the Internet Crime Complaint Center to frighten victims into sending money to the perpetrators. In addition to instilling a fear of prosecution, this version of the malware also claims that the user’s computer activity is being recorded using audio, video, and other devices.

As described in prior alerts on this malware, it lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law. The message further declares that a law enforcement agency has determined that a computer using the victim’s IP address has accessed child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a fine using prepaid money card services. The geographic location of the user’s PC determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is not a legitimate communication from the IC3, but rather is an attempt to extort money from the victim. If you have received this or something similar do not follow payment instruction.

It is suggested that you:

•File a complaint at www.IC3.gov;
•Keep operating systems and legitimate antivirus and antispyware software updated; and
•Contact a reputable computer expert to assist with removing the malware.
 

Your Opinions and Comments


Be the first to comment on this story!


You must be logged in to post a comment.




Not a subscriber?
Subscriber, but no password?
Forgot password?
Scam Central side bar header
Triple R DC ExpertsAllstate & McBride RealtyVoncille Bielefeld homeFriesenhahn Custom WeldingHeavenly Touch home

  Copyright © 2007-2016 Wilson County News. All rights reserved. Web development by Drewa Designs.