IRS Phone Scam

IRS phone scams and may other types of phone fraud, continue in many areas, so I wrote this post to remind you what to look out for, and how to avoid being a victim.

If the scammers pick your phone number, you’ll receive a call from someone claiming to be an investigator for the IRS.

woman on the phone

These callers have called numbers in almost every state in the US and are very clever and persuasive. They target taxpayers, and also recent immigrants.

You are told that you owe money to the IRS, or that there is a large tax lien against you that may include criminal charges. They instruct you that this money must be paid immediately through a pre-loaded debit card or wire transfer.

If you aren’t cooperative, the caller may become hostile and threaten you with arrest, deportation, or suspension of your driver’s license.

You might hear background noise on the call that sounds like it’s coming from a call site. Some of the callers use equipment which changes the number appearing on your caller ID, to the actual IRS toll-free number.

The caller may know the last four digits of your social security number. They might use very common names like John Smith or Tom Brown.

You may also receive a fake email before the call, that appears to come from the IRS.

Other Types of Bogus Phone Calls

Power/Electric Company Calls

Someone will call claiming to be an employee of your Power/Electric company. They will state that a recent electric bill hasn’t been paid, and will threaten to shut off your power immediately unless this bill is paid. You will be told you have to make an immediate payment through a pre-loaded debit card or wire transfer.

Foreign Lottery & Nigerian Lottery Scams

The U.S. Postal Inspection Service says that consumers are scammed out of millions of dollars every year by solicitations for prizes, and foreign lotteries.

Many of the scammers are in Canada, and offer chances to win foreign lotteries from places like Europe and Australia. They offer chances to win big lump sum prize amounts, with much better odds than American lotteries.

no phone scams

What to Do About Bogus Phone Calls


The IRS states that they will never ask for credit card numbers over the phone, and they also don’t ever ask a taxpayer to use a pre-paid debit card or wire transfer.

They also don’t threaten to have you deported, or arrested. If there is a tax problem, their first contact will usually be by mail.

In some cases, after the scammers or you hang up after receiveing a threatening call, you may get another call soon afterwards, from someone claiming to be from the police – those calls can also show a police department number on your caller ID. So that is a sure sign that both calls where a scam.

The IRS also says they don’t contact taxpayers by email or text messages, asking for personal and financial information. They don’t ask for PIN numbers or passwords.

The website can give you more information, and has links to actually report scams. You can also call their regular number of 1-800-829-1040 if there any issues with your taxes.

Power/Electric Company

Electric Utility companies will usually not ask for personal information over the telephone, unless you called them first.

They also don’t send emails threatening to close your account.

Don’t give personal information to anyone who calls you, including any kind of account numbers, passwords, social security numbers, or credit card numbers.

If you are suspicious about any call you receive, hang up, and then call your utility company back at the number given on your bill. If you call them first and they ask for information, it’s OK, but if anyone calls you first, don’t give any information.

If you get a suspicious call, my advice is to just hang up. If you want you can ask for their supervisor’s name, and then hang up. Then call your local police or law enforcement to report the incidents.

Foreign Lottery and Other Scams

The FTC (Federal Trade Commission) says that it’s illegal to play a foreign lottery, either over the phone, or by mail.

Most of the phone operations are phony – you won’t receive the promised lottery tickets.

If you give one of these callers your credit card number, you’re making a big mistake. They will probably make unauthorized charges and leave you with a big bill.

The odds of winning a foreign lottery are extremely slim – just like with American lotteries.

There are no secret companies, formulas, or systems that will give you any special access or a better chance of winning.

Some phone pitches may claim that a lottery sweepstakes comes from the IRS. It isn’t true.

More Phone Scam Peventions Tips

Be aware that many of these phone scammers are very clever and good at what they do. Some people have been cheated out of their life savings. Elderly people often become victims because they are lonely, and the scammers are very good at starting a friendly conversation.

They will lie and say they are from the same town you are, or that they work for a company you really trust.

Some signs of a scam are claims that you’ve won a prize, or a special promotion. If they say they just need to put the shipping charges on your credit card, and you give them the number, they may put hundreds of dollars in unauthorized charges on your card.

In the United States telemarketers are required by law to tell you their name and that they’re making a sales call, before they give any pitch.

If they don’t do this, you should just hang up.

Don’t fall victim to high pressure tactics. You should ask to get written information before you decide to buy something.

If something is really “free”, you shouldn’t be asked to pay any shipping charges or fees.

Don’t ever send money by money transfers – you won’t be able to dispute fraudulent charges.

Don’t give anyone your credit card number over the phone.

Robocalls, or automated calls coming from machines, are usually illegal.

My advice is to not even answer the phone unless you see the number of someone you know on your caller ID.

Go to the website for more information, tips, or to file complaints against phone scammers.

Please comment on Facebook.

Share Button

New eBook Now Available

My new eBook is now available at Amazon:

Lot’s of information – 85 pages – a great ebook

Kindle subscribers read for free

Dozens of hours of research and writing over a 5 year period.

It includes chapters on Personal Security, Home Security and Safety, Identity Theft Prevention, Computer Security, and Self-Defense.

Topics include crime prevention in stores, parking lots, malls, traveling, and other areas.

Pickpocket prevention

How to avoid being robbed at an ATM machine

Complete home security guide – burglar proof your home

Complete guide to home security cameras including information on how to buy cameras, what specifications mean, etc.

Catching criminals with security cameras

How to avoid ATM skimmers

Computer Security – including information on virus protection, passwords, online shopping, etc.

Complete information on several Self Defense products and how to use them

Many other topics not mentioned here

Share Button

What is a Botnet?


The FBI Estimates at Least $10 Million in Direct Losses

The word “botnet” comes from combining the words robot and network.

A Botnet is a network of individual computers that are infected with malicious software, and then controlled as a group. The individual computer users don’t know their computers are being used.

computers in a botnet

The botnet is really a type of virus. The software gets on your computer because of something you clicked on a website or email, or something you downloaded.

This software will then “call home” to the host or “operator”, who is now able to control this network of computers.

On Tuesday October 13, 2015 the US Department of Justice (DOJ) disrupted a botnet responsible for at least $10 million in U.S. losses.

The botnet goes by the name of “Bugat”, “Cridex”, or “Dridex”. It was designed to steal banking and personal information.

American and British law enforcement officials helped disrupt the malware. A man named Andrey Ghinkul of Moldova, age 30, was the alleged head of the hacking operation. He was recently arrested in Cyprus, which is an island country east of Greece. The DOJ is seeking his extradition.

The malware operated mostly by spam email sent with attachments that infected computers. It was said that up to 350,000 of these malware containing emails were sent every day, and that the botnet infected about 125,00 computers a year.

After the hackers had control of the victims computers, they used stolen financial information to do electronic funds transfers of millions of dollars. Here are some examples:

  • On December 16, 2011 – $999,000 transferred (or attempted to transfer) from a Sharon, Pennsylvania, City School District account to a bank account in Kiev, Ukraine.
  • On August 31, 2012 – $2,158,600 transferred from a Penneco Oil account to a bank account in Krasnodar, Russia.
  • On September 4, 2012 – $1,350,000 transferred from a Penneco Oil account to a bank acount in Minsk, Belarus.
  • On September 4, 2012 – Ghinkul attempted to transfer $76,520 from a Penneco Oil account to a bank account in Philadelphia, Pennsylvania, USA.

The hackers allegedly got the financial information from a “phishing email” sent to a Penneco Oil employee.

If you think you’ve been a victim of these hackers, the United States Department of Homeland Security – Computer Emergency Readiness Team (US-CERT) has set up a webpage for assistance in removing the malware.

You should also make sure you are running some type of antivirus software on your computer, and that it is up to date. We recommend Kaspersky Anti Virus.


Share Button

Credit Card Skimmers Found All Over Florida

It was recently reported by several news sources that credit card skimmers were found in dozens of Florida gas stations.

The Florida Department of Agriculture and Consumer Services had their inspectors do a sweep all over the state. They checked more than 6,000 gas stations and found skimmers in 81 locations.

Most of the stations appear to be in the Tampa Bay area, but skimmers were found all over the state, even as far north as the Panhandle. They were found in 26 different counties.

I have reported in other posts on this blog about safeguarding against ATM skimmers at banks, and ATM skimmers at gas stations.

Gas stations are by far the most common area where thieves place skimmers. Bank ATM’s are much more secure. There is usually no access to the inside, so criminals have to place devices on the outside – in the form of “fake fronts” and fake keyboards covering the real ones.

advanced card skimmerThe gas station skimmers are usually being place inside the gas pump, so customers have no idea it’s there. Gas station managers and owners should be inspecting the inside of all their pumps daily, but this probably isn’t happening.

An ideal situation would also be to have a security camera at every gas pump facing the customer. However, if gas stations have any security cams, there are usually only one or two outdoor cameras mounted up high, facing a large area.

Steps to avoid being a skimmer victim:

  • The only way you be sure to avoid this crime is to pay for your gas inside and pay cash.
  • Since most of us want to pay outside, it’s best to pick a larger nationwide chain as your location to buy gas, such as 7-11.
  • Pick a location which asks your “billing zip code” when you use your credit or debit card (most 7-11 locations should have this feature on the pumps). This is an extra security precaution, because the crooks won’t know (or will have to guess) your billing zip code, if they stole your data. Run your debit card under “credit” so you don’t have to enter a PIN number.
  • Try to always buy gas at the same location in your town. Try to plan ahead so that you don’t get low on gas and have to stop at a station when you’re out shopping many miles away. Always using the same location allows you to get familiar with the layout, what the pumps are supposed to look like, etc.
  • Use a pump closer to the front of the store, because crooks probably will try to install skimmers on pumps farther away, so no one will see what they’re doing.
  • If anything looks out of place or wrong about the gas pump, or if anything looks loose, don’t use it and inform the manager.
  • Ask the gas station manager or owner how often they check their gas pumps on the inside. Some locations are putting “Security Seal” tape on the outside, but there is really know way to know if a crook could still have gotten access.  Many crooks are easily getting universal keys that fit many different gas pumps. They can open the pump when no-one is watching, and place a skimmer inside very quickly. They can get the data later using Bluetooth wireless technology.
  • Even if a station manager or other employee is checking the inside of pumps, they may not spot any skimmers, so you still have to take the other precautions mentioned on this post. The latest ATM skimmers are very sophisticated and small, and may look like nothing more than any of the other wires running inside the pump console.
  • Check your bank or credit card account daily for unauthorized charges. The easiest way to do this is to check your account online.


Share Button

Hacking Into Home Security Cameras

I’ve reported on this blog that many computer viruses originate in Russia, and it’s been recently reported in some news sources that a Russian website was showing hacked footage from home and other security webcams.

The website showed lists of countries, with the number of webcam videos available from each.

Some of the popular home security systems that have monthly monitoring (ADT, Vivint, etc.) could possibly be hacked by someone using a SDR (software-defined radio), even if the system is unarmed. Someone who was tech savy could jam the system or interfere with the signals. Especially if the system used unencrypted communication signals, the culprit could send his/her own signals to the main controls. But he/she would have to be about 250 feet away or less from your house to do this.computers and disks

Most hackers are getting access through webcams (rather then the wall mounted cameras used by the home monitoring companies mentioned above), that are built into almost all laptops, and hooked up to many desktop computers.

You commonly may be bringing your laptop with you to many private places, including inside a motel room, bedroom, etc.  So the criminals could be spying on you there.

Once an intruder has camera access, they can monitor all your daily activities, when people are coming and going, etc.

There is said to be lot’s of information on the internet, and YouTube videos, on “how to hack into webcams”.

The Russian website mentioned above was probably using one of the most common laptop computerhacking methods, which is to change the default passwords that come with wireless devices and routers. Once they change your password, they’ve locked you out of your own device, and can log in, change your WiFi signal, and control your webcam.

The default passwords are usually easy to guess and won’t lock out after several incorrect guesses. So change your passwords to long ones that are hard to guess.

Another very common method hackers use is email links. They use Trojan Horse attacks to infect your computer with malware. This malware allows the hacker to remotely control your computer, including the webcam.Kaspersky Internet Security 2015

The best way to prevent this is to NOT click on ANY links in emails. Whether it’s an attachment or link that appears to come from a friend, your bank, free music download, etc., I would not click on ANY link in any email.


More Tips to Avoid Security Camera Hacking:

  • Ask your home security system rep what measures they are taking to make sure their cameras and network are not being hacked into.
  • Make sure you have anti-virus software.
  • Make sure your firewall is turned on.
  • Set your security settings at a high level.
  • Make sure your wireless connection and all security cameras have secure, unique passwords.
  • Put a cover over your webcam when not using it, and/or unplug it from the USB port.
  • Don’t put a laptop computer with a webcam in a bedroom.
  • Be careful who you communicate with online, and what personal information you give out in emails.
  • Be cautious about any computer repair people you allow to work on your computer.
  • Don’t buy security cameras from strangers.
  • Don’t buy used security cameras.


Share Button

The Easiest Identity Theft Method

A recent local newspaper article described an identity theft method you don’t hear of too often. However, this method happens a lot, and it can cause you a lot of problems.

Stealing mail is much easier than stealing garbage, because mail is clean, and it’s much simpler to sort through and get what you want.

The man in this story stole mail from a woman’s mailbox, including a check to pay for her cable TV bill. He not only changed the payee to himself, but he also increased the check amount by $200!

He was only caught because of a suspicious bank teller. He would have been very hard to track down, but the bank had him on surveillance video, as well as having his driver license number (used for ID to cash the check).

blank check

When they found him, he had more than $20,000 worth of stolen checks in his possession. It’s unclear how long the thefts had been going on, but they believe he simply drove through neighborhoods looking for mailboxes with the flags up.

They also found him with drug paraphernalia, so he probably needed the checks as a quick way to get money for drugs.

Only a few victims have come forward. If this happens to you, it may takes weeks before you discover it. Maybe certain bills don’t get paid, and you get late notices and fees. Or some other form of identity theft takes place, such as a bogus check being cashed, or money being charged to your credit card.

If a thief alters your check and uses it to buy something through the mail, many state attorneys won’t try to prosecute these cases. They say they won’t prosecute because, unlike a check that is used to buy something in a retail store, when a check is sent through the mail, you can’t prove who sent or wrote the check – you don’t actually see the check writer, so there is no store clerk or other witness that can identify a suspect.

If the flag is up on your mailbox, that is a giant signal to anyone walking or driving by, that there is mail they can take out before the mailman arrives.

Thieves will also steal mail after it’s delivered. One popular method they use is to pry open cluster boxes at apartment and housing developments.

After your mail is stolen they can use whatever information they find for identity theft – your full name, address, phone number, bank account and other account numbers, social security numbers, etc. They can use that information to open bogus accounts, buy things online, and other forms of identity theft.

The best way you can begin to catch someone stealing your mail, if no one is watching, is to install an outdoor security camera with a view of your mailbox area.

If you have an IP security camera you can also get an alert sent to your cell phone or computer.

I think it’s better and safer to have all your mail sent to a P. O. Box.


Share Button

Another Bogus Bank Email

I recently received another bogus bank email.  It claimed to be from a very large bank.  It was one of the most official looking bogus emails I’ve seen.

So as not to be accused of defamation, I won’t disclose the actual bank name.  But I will say it is one of the largest banks in America.

bogus bank email

I’ll change their name in the email text below and just call them “Large Bank”:

Subject:     Large Bank Alerts: Sign-in to Online Banking Locked

Attachments: Form – xxx

Dear Valued Customer,

For your security, access to Online Banking has been locked because the number of attempts to sign in exceeded the number allowed,
As a result we are making an extra security check on your personal and financial
information in order to protect your information from online theft.

Your Online Banking has been temporarily suspended, to prevent further
unauthorized access for your safety. we have decided to put an extra
verification process to ensure your identity and your account security.

Please understand that this is a security measure intended to help protect you
and your account. We apologize for any inconvenience

We have attached a form to this email. Please download the form, open it and
follow the instructions on your screen.

Email Preferences

This is a service email from Large Bank. Please note that you may receive
service email in accordance with your Large Bank service agreements,
whether or not you elect to receive promotional email.

Privacy and Security

Keeping your financial information secure is one of our most important
responsibilities. For an explanation of how we manage customer information,
please read our Privacy Policy.

You can also learn how Large Bank keeps your personal information secure
and how you can help protect yourself.

Large Bank
Address of bank

Large Bank, N.A. Member FDIC. Equal Housing Lender
Large Bank Corporation. All rights reserved.

Open Attachment: Form – xxx

There was one big problem with this email.  I don’t have an account at the bank!

Another problem – see at the bottom where it says “please read our Privacy Policy” – there was no link to any privacy policy.

Also notice that the grammar isn’t correct in the paragraph starting with Your Online Banking has been  This could indicate the email comes from a foreign source that doesn’t know how to phrase sentences in English.

Also notice “…access to Online Banking has been locked because the number of attempts to sign in exceeded the number allowed”I‘ve never heard of any bank limiting the number of times you can log into your account.

If you receive an email like this:

  • Don’t click on any links in the email.
  • Don’t download or open any attachments.
  • Don’t try sending an email asking questions to the email address you see at the top of the email.

If you click on any link in the email or open an “attachment”, you could be putting a virus on your computer.  This could include a Keylogger, which works in the background and monitors your keystrokes – copying any passwords or personal information.

The virus could also be a Browser Highjacker or a Rootkit.  These are two of the worst kinds of viruses, that can basically hold your computer hostage and/or prevent you from having any internet access, until they get removed.

If curiosity gets the best of you and you download the “attachment”, you may see a very official looking form, that appears to be from your bank.  It may even have a bank logo.  It will probably say something like “Verify your personal information”, and ask you to enter your name, address, account number, social security number, password, etc.

If you get one of these emails, and you actually have an account at the bank it’s supposedly coming from, you could make a paper copy of the email and bring it in to your local bank manager.  It might help them in efforts to catch the criminals behind it.  After making the paper copy, delete the email.

I would not try sending or forwarding the email online.


Share Button

Personal Security Tips for Students on Spring Break

Spring Break will be starting for many high school and college students in March and April.

First of all, if you are traveling by plane, some good airport security tips include: wearing shoes that are easy to take off, not wearing jewelry, don’t bring a water bottle (on the plane), and don’t make smart remarks to your friends, like “that would be a good place to put a bomb”.

students on spring break

Criminals will hang out in the areas where spring breakers are, so here are some personal security tips to stay safe:

  • Be aware of your surroundings.
  • Use an ATM inside a hotel, instead of one outside.
  • Don’t flash your cash.
  • Don’t flash your jewelry.
  • Try to keep a low profile.  You may want to impress your friends, but it may be safer to not look like you have a lot of wealth and money.
  • Don’t brag or let people know that you have money on you, or valuables in your hotel room.
  • If you have expensive jewelry, it might be a good idea to only bring the “cheap” jewelry with you on vacation.
  • Stay in groups and don’t wander off by yourself.
  • Keep your cellphone in a pocket where it can’t be grabbed easily.  Don’t leave it laying on a bar or table.
  • Don’t leave you car unlocked, your keys in your car, or your engine running.
  • The hotel or bar staff may not be trustable either – be watchful for employees that might be thieves.
  • If you are going to consume alcohol and are underage, be aware that the penalties for having fake ID’s are very severe – bouncers and law enforcement will be on the lookout – not worth trying.
  • Tell your friends where you are going and when you expect to be back.
  • If you’re traveling by car is always, make sure it’s in good condition – check tires, battery, etc.
  • Check your car before getting in to make sure that no one is hiding inside.
  • Do not leave packages or personal items in open view in the car.  Place them in the trunk.
  • At night, park only in lighted areas.
  • Have your keys ready before going to your car.
  • Avoid secluded places.
  • Consider carrying a security whistle or self-defense spray.

Spring Break Health and Safety Tips


Share Button

When Will Smart Cards Come to the United States?

In light of the recent credit card data breaches at Target, Neiman Marcus and Michaels (Arts Supply Stores), many people may be wondering what companies are going to do to beef up security.

The U.S. Department of Justice says that the number of identity theft victims jumped from 16.6 million in 2012 to more than 70 million in 2013.

Smart Chip credit cards are a much more secure system than the magnetic strip cards now used in the U.S.

What Are Smart Cards?

A Smart Card is a credit card that has an embedded microchip instead of a magnetic strip.

smart card microchipThe microchip is actually a microprocessor which can contain up to 8 kilobytes of RAM.

The data on the magnetic strips on credit cards now used in most of the U.S. can easily be read and copied with equipment that just about anyone can buy online.

The information in the Smart Card microchip is encrypted, so it can’t be copied. The card information can’t be read by “swiping”. The data doesn’t get decrypted until it gets to the processor.

The microchip can even generate a new code for each transaction.

Smart CardIn some cases the terminal or processor will require a PIN to decrypt the information, which provides even more security.

The microchip is a fingernail size gold box, usually above the card numbers.

Chip based Smart Cards have been used in more than 80 countries for at least a decade.  In Europe they are used for banking as well as insurance. About 80% of credit cards in Europe are said to have the microchips.

However, the United States has lagged behind in switching to Smart Cards. That is why the hackers, ATM Skimmers, and other thieves love to attack U.S. stores and banks.

The countries that use Smart Cards have seen a dramatic decrease in fraud.

credit cards

The main reason the switchover hasn’t happened in the U.S. is money. Just the new terminals required for Smart Cards can cost many hundreds of dollars, and the total cost of changing to the new technology has been estimated at between $15 to $30 billion dollars.

The actual cards with microchips are also more expensive to mastore saleke.

The credit card companies have basically said that credit card fraud only costs about .05% of their revenue (less than one percent), and the upgrade to Smart Cards will cost them much more than that.

But this isn’t taking into consideration the aggravation and frustration of all the consumers who’ve had their identity stolen!

However, Mastercard (and possibly other card companies) has reportedly stated that they will start shifting over to Smart Cards around October of 2015.


Share Button

Your Computer is Locked!

Computer Virus is Still in Operation

How to protect yourself and remove this virus from your computer.

Don’t be alarmed – “Your Computer is Locked!” is just the title of this blog post.

This computer virus was first reported by the FBI in August of 2012, but is still in operation today (it has been reported as being used this monthJanuary 2014).

This type of virus is called “Ransomware“. It is put on your computer by you clicking on a link on a webpage or Email.

It can also install itself simply by you going to a website from a search engine listing.

A window will pop up on your computer with a heading at the top that looks similar to those below:your computer is locked

your computer has been blockedNext to the words “Your Computer is Locked” there may be a flag of the country you live in, an FBI logo, a United States Department of Justice logo, or even a Police Department logo.

Then there will be a message underneath that may say “your computer’s IP address was used for pornographic activities”.

It will then say your computer has been blocked to prevent further violation, and to unblock your computer you have to pay a “Ransom” of $100 or more, possibly as high as $300.

Sometimes the virus can turn on your web camera, snap a picture of you, and put it next to the warning message.

You are instructed to use MoneyPak or some other money card to pay the ransom, and links are even provided.

They ask you to use money cards because they aren’t traceable.

The virus completely blocks the use of your computer, and there is no way to remove it. Resetting your computer doesn’t help.

The FBI calls this the “Reveton virus“.

“Free” methods being published online that may have very limited use in removing this virus:

Safe Mode – Since this virus blocks any use of your computer, you can’t run a virus scan to remove it. Going into Safe Mode may allow you to run your anti-virus program, but I have tried this with viruses and it often doesn’t work.

To get into Safe Mode you have to Shutdown and Restart your computer. As your computer boots up, continually tap the F8 key and you should see a black screen with a Menu allowing you to choose Safe Mode. On this screen use the down arrow to get to Safe Mode and then hit Enter. You can try accessing your anti-virus program in Safe mode, but it doesn’t always work.

System Restore – This Windows utility allows you to restore your computer to a previous state (before the virus came on).

Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.

You should see a Welcome page where you can select the option “Restore my computer to an earlier time“.

You should pick a date at least a day or two before you think the virus came on, for a “Restore Point”.

After you pick the date and click “Next”, System Restore brings your computer back to the configuration on that date, and then restarts your computer.

After using System Restore, you may find your computer is back to normal. If so, try running a virus scan.

Even if your computer appears to be back to normal, the virus may still be on your computer. A week or two later you may find the virus popping on again. This is because the virus file was never removed.

There are some programs you may find in online searches that claim to remove this virus. I can’t recommend any of them. Also, some YouTube videos try to show you how to use a Command Prompt, go into your computer files, and delete the virus file.

The problem with this is you need to be very sure of the date the virus came on, and also very sure of what the virus file looks like. You may have to guessif you delete the wrong file you could really mess up your computer.

If you’re a victim of this virus, report it to the Internet Crime Complaint Center.

My recommended methods for dealing with the “Your Computer is Blocked” virus:

FIRST – Make sure you have a good anti-virus program. I recommend Kaspersky. The post before this one talks about Kaspersky, and you can find more information HERE.

FixMeStickSECOND – Buy a FixMeStick now, before you need to remove this virus. If this virus is on your computer, even Kaspersky may not help, because access to your anti-virus program will be blocked.

FixMeStick is an external USB device that runs while your Windows operating system is not running, so malware can’t interfere with it

With no programs on your computer running, the virus can’t power up or hide.

It works great on Ransomware such as the “Your Computer is Blocked” virus, because this malware has to have your machine’s operating system running, which is not required with FixMeStick – so it finds and removes the malware.

It removes viruses, malware, ransomware, spyware, trojans, rootkits and more that cannot be removed by software security programs.

It uses software from 3 of the world’s leading antivirus companies (Kaspersky Lab, Sophos, and GFI).

Updates are automatically downloaded and stored on FixMeStick.

It works an unlimited number of times on up to 3 PCs.

It won’t harm your PC.

How well does FixMeStick work?

There is a Systems Analyst who works for the Department of Defense and knows how to write code that can bypass anti-virus programs.

He used FixmMeStick on some of this “virus code”, and FixMeStick was able to catch it.

Discounted Price at Amazon and get FREE SHIPPING

Great Reviews on Amazon – read them here.


Share Button