Sunday, October 26, 2014
1012 C Street  •  Floresville, TX 78114  •  Phone: 830-216-4519  •  Fax: 830-393-3219  • 

Lost & Found

Lost: Black female Chihuahua named Gloomy and black male Chihuahua named Rico, from CR 126, Floresville, missed dearly by their family! Call 210-428-3803. 
Lost: Small black female dog, no collar, her name is Shortcake, has long hair, Sutherland Springs area. Call 830-391-5099.
If you are missing a pet in Floresville, be sure to check the Floresville holding facility. Animals are only kept for 3 days. Contact Las Lomas K-9 Rescue, 830-581-8041.
More Lost & Found ads ›

Help Wanted

Plastic Product Formers, Inc. is accepting applications for a full-time blow-mold operator. Must be willing to perform physical work in an outside environment and work 10-12 hour shifts including overtime. Must be willing to work some weekend and night shifts. Will be required to clean, set-up, operate and monitor blow-mold equipment while also performing trimming and inspection of production parts. Includes packaging and material handling. Must pass background check and drug test. Excellent benefits offered. Fax 210-635-7999, email resumes@vpracingfuels.com, 7124 Richter Road, Elmendorf, TX.
Retail Customer Service Associate, required skills/experience - customer service experience, basic math, money handling, and computer literacy a big plus. Forward your resume or letter outlining your experience ASAP to floresvillestoreowner@gmail.com.
More Help Wanted ads ›

Featured Videos





Video Vault ›

Scam Central


Scammers pose as feds in attempts to extort money with ransomware




E-Mail this Story to a Friend
Print this Story
December 4, 2012 | 1381 views | Post a comment

Source: Federal Bureau of Investigation, Internet Crime Complaint Center

A new extortion technique is being deployed by cyber criminals using the Citadel malware platform to deliver Reveton ransomware. The latest version of the ransomware uses the name of the Internet Crime Complaint Center to frighten victims into sending money to the perpetrators. In addition to instilling a fear of prosecution, this version of the malware also claims that the user’s computer activity is being recorded using audio, video, and other devices.

As described in prior alerts on this malware, it lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law. The message further declares that a law enforcement agency has determined that a computer using the victim’s IP address has accessed child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a fine using prepaid money card services. The geographic location of the user’s PC determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is not a legitimate communication from the IC3, but rather is an attempt to extort money from the victim. If you have received this or something similar do not follow payment instruction.

It is suggested that you:

•File a complaint at www.IC3.gov;
•Keep operating systems and legitimate antivirus and antispyware software updated; and
•Contact a reputable computer expert to assist with removing the malware.
 


Your Opinions and Comments
Be the first to comment on this story!

You must be logged in to post comments:



Other Scam Central
Scam Central side bar header
Chester WilsonTriple R DC ExpertsAllstate & McBride RealtyBlue Moon Karaoke & DJWilson's Auto ChooserVoncille Bielefeld homeDrama KidsSacred Heart SchoolHeavenly Touch home

  Copyright © 2007-2014 Wilson County News. All rights reserved. Web development by Drewa Designs.