Springfield: (07) 3180 4228 | Toowoomba: (07) 4596 6268
image of eStorm Service Centre logo
  • Home
  • Apple Repair & Services
    • Apple iPhone Repairs
    • Apple iPad Repairs
    • Apple Mac Repairs
    • Apple Watch
    • Beats
    • Other Services
  • PC Services
  • Shop
  • About Us
  • Blog
  • Reviews
  • Contact
authorised_apple_service_provider_estorm_service_centre

What to Do When Your Computer Is Infected

January 19, 2023 by eStormAus

The sad truth is that most of us are underprepared when it comes to computer infections. Without the proper precautions in place, it’s only a matter of time before a computer virus or harmful malware take hold of your device. If this has happened to you, the most important thing you can do is not panic. While infections can be dangerous and should always be taken seriously, there are a number of steps you can take to remove the infection and prevent any serious long-term damage.

The Different Types of Computer Infections

Unfortunately, there exists a multitude of threats that pose a danger to your device and networks. While each threat is unique, they often fall into one of the three following categories:

1. Viruses infect machines via a compromised link, file or website, and can wreak havoc on your device. In order for them to spread from device to device via a carelessly shared link and/or insufficient antivirus protection.

2. Worms can have the same affect has a virus, but don’t rely on humans to spread. Instead, their programming enables them to spread and infect every device on the same network.

3. Malware can come in many forms including adware, spyware and ransomware. While each attack differs, they are all designed to monitor your actions and collect personal data. In the most nefarious cases, your personal data can be be stolen, held hostage and even sold online.

Warning Signs That Your Computer Is Infected

Although infections may not also be obvious, here are a few warning signs that may signify you have a computer virus or some form of malware running on your device:

  • Device is running slowly and/or frequently crashing
  • Your internet browser is being redirected to unknown websites
  • The hard drive space suddenly changes dramatically
  • Missing, altered or corrupted files
  • Unexpected pop-up windows that keep appearing
  • Random noises coming from the device
  • Unexpected mouse movements or keystrokes
  • You’re alerted to attempted network connections
  • Warnings from anti-virus and/or anti-malware software
  • Spam is being sent from your email and/or social media accounts

What To Do If Your Computer Is Infected

Install and Run Antivirus Software

Hopefully, you already have an up-to-date antivirus program. If you don’t, then download one immediately! There are two kinds of antivirus software: real-time and on demand. While both are capable of detecting and removing harmful computer viruses and malware, a real-time scanner autonomously performs system scans for in the background while you’re using your divide. An on-demand scanner, on the other hand, has to be manually activated every time you wish to scan your device.

Once you’rve installed an antivirus software (and confirmed that it’s running as it should be), check your device for any virus and/or malware infections by running a thorough scan of your device’s system. Antivirus programs often offer a variety of different scans, the most comprehensive of which is usually called a full system scan. While these scans may take several hours, in most cases you do not need to remain with your device for the duration.

Remove Any Suspicious Files and Programs

Once the scan is complete, review the findings. The antivirus program should alert you to any identified threats and recommend a course of action. Once you’ve undergone the recommended steps, run another scan to confirm whether or not the threat has been eliminated. In most cases, deleting or quarantining any malicious files and programs will resolve the issue. However, if the antivirus software is unable to remove the threat, then it’s time to call in a professional. The worst thing you can do is ignore the problem!

Isolate the Device

To prevent any further damage, you should disconnect your device from all wireless and wired networks, including the internet. Some infections cans use these connections to migrate, so any device connected to the same network as yours will be vulnerable to attack.

Reset Your Passwords

It’s better to be safe than sorry! You can avoid any unauthorised access to your accounts and online profiles by changing all of your passwords and log-in credentials immediately. Be sure to only use a device that’s free from infection to complete this step! You should also do this in level of priority, with workplace, financial and email accounts taking precedence. If you are still concerned about any potential data theft or fraud, contact these institutions directly and brief them on the situation. This way they can monitor your account for any suspicious activity.

Delete Any Sensitive Information

Any potentially sensitive information (ie. personal identification, professional documents, etc), delete them as soon as you can! It’s better to go through the potential hassle of replacing these documents than to have them stolen by a cyber criminal. Do not transfer these files onto a portable drive or cloud storage, as this could result in the infection spreading to other devices.

Keep Your Back-Ups Separate

By now you should be in the habit of regularly backing up your devices. However, if you don’t already have a backup copy of your data, do not try to make one while your device is infected (without consulting an IT professional first). By connecting your backup drive to an infected device, you’re putting any data and previous backups stored on there in jeopardy.

Have a Professional Take a Look

Let’s face it…we’re not all IT wizards. Sometimes, trying to solve the issues ourselves can do more harm than good. If you’re antivirus protection is unable to remove the infection or you find that the operating system, programs and/or date are compromised beyond repair, then you should contact a reputable IT support team. They’ll have the knowledge, experience and tools best equipped to tackle the issue and minimise any potential fallout.

How To Avoid Future Infections

As the saying goes, “an ounce of prevention is worth a pound of cure.” Adopting a proactive approach can prevent infections from occurring in the first place and save you untold money, time and mental stress. Here’s a few easy practices that can help keep your device infection-free:

  • Use a good antivirus software
  • Keep your software, apps, internet browser and operating system up-to-date
  • Thoroughly research apps and software, only download them from reputable sources 
  • Carefully read the permissions the apps and software ask for
  • Absolutely never click on any unverified links in electronic communications (emails, texts, etc) or on unfamiliar websites
  • Never open attachments in suspicious looking emails
  • Use a secure VPN connection when browsing the internet, especially when connecting to a public Wi-Fi
  • Don’t insert any unknown USBs, hard driver or disks into your device

Filed Under: Blog Tagged With: antivirus protection, antivirus software, computer infected, computer virus, get rid of computer virus, get rid of malware, malware, malware infection, malware protection, what to do if computer has malware, what to do if computer has virus

Holiday Gift Guide 2022: Best Apple Products and Accessories!

December 8, 2022 by eStormAus

Tis the season for giving and by now you’ve (hopefully) begun to think about your Christmas shopping. But thinking of that perfect gift for the special someone in your life can often be a struggle. Well, if that person happens to be an Apple aficionado, then you’re in luck! Apple has released their 2022 Holiday Gift Guide and we’ve rounded up a few of our favourites. Here’s our recommendations for the best Apple products and accessories to give this Christmas.

Happy shopping!

AirTags

We all know someone who constantly misplaces their things. Their keys could literally be in their hands and five seconds later they’re turning the place upside down trying to find them! If that scenario seems all too familiar then the AirTag is the perfect holiday gift for them! This circular, stainless steel accessory is compact and discreet, allowing it to easily be fastened to a keyring, bike or pet collar (with the help of a separately purchased AirTag Loop, AirTag Leather Key Ring or AirTag Leather Loop accessory), or slipped into a backpack, purse, wallet or travel luggage. Once that’s done, the AirTag can be used to track the location of the object via the Find My application. The sleek design is even water resistance and includes a small speaker, giving the AirTag a wide variety of uses.

 

AirPods and AirPods Pro (2nd Generation)

When it comes to wireless earbuds, the AirPods and AirPods Pro are one of the most popular on the market….and it’s not hard to see why. September saw the release of the second-generation AirPods Pro. An upgraded version of the original model, this generation includes a H2 chip with support for spatial audio and improved active noise cancellation. Other new new and upgraded features include: adaptive transparency mode (lets you stay aware of your surroundings by letting outside noise in), force sensor controls (adjust media playback and volume via the earbud stem), dynamic head tracking, sweat and water resistance, MagSafe wireless charging case (which holds a total 30 hours of charge) and longer batter life (up to six hours of use, an hour a half longer than the previous generation!). However, if you’re just looking for the basics, then the second and third generations AirPods are more than serviceable and have similar capabilities. All three models also support Siri commands and can be used to switch automatically between Apple devices.

 

HomePod mini

This HomePod may be mini, but it sure is mighty! This compact smart speaker offers excellent audio quality and can nearly everything its big brother (the HomePod) can do. Controlled entirely via Siri, the HomePod mini can be used as a hub for your HomeKit home automation accessories! Place two in different rooms and voila you’re got a home Intercom system! You can even play the audio from your Apple TV through the speaker. For a more immersive sound experience, we recommend setting two up for stereo sound.

If you’re looking to pair it with an additional gift, an Apple Music subscription is an excellent option.

 

iPad, iPad mini, and iPad Air

Perhaps you know someone in need of a new tablet device? Well, look no further! Apple have a broad range of options that cater to a variety of needs and budgets. Here’s our recommendations:

  • iPad (ninth and tenth generation) – The tenth-generation model is the latest incarnation of the standard iPad. With all the same functionality as its predecessor, the 2022 redesign also includes moving Touch ID to the top button, an increase to the display size (it now measures 10.98 inches) and a front-facing camera positioned on the landscape edge. This generations is of iPad is compatible with the Magic Keyboard Folio and first-generation Apple Pencil. However, if you only need the basics, last year’s ninth-generation iPad also makes a great holiday gift! It’s definitely the more budget friendly option, so consider adding on a first-generation Apple Pencil or Smart Keyboard as an extra stocking stuffer.
  • iPad mini – If size is a concern and you’re looking for something more portable, the diminutive sixth-generation iPad mini is just the ticket! While it’s compatible with a second-generation Apple Pencil, you’ll have to look elsewhere if you need a keyboard. While Apple may not have a keyboard product supported by the iPad mini, there are third-party manufacturer and standard wireless keyboard options on the market.
  • iPad Air – Looking for a tablet with a little more oomph? The iPad Air is just the ticket! Besides the iPad Pro models, the iPad Air has the most power of Apple’s tablet offerings. It can handle even the most intensive tasks. For those intending to use it for business or creative pursuits, the second-generation Apple Pencil, Magic Keyboard or Smart Keyboard Folio would make great accompaniments.

 

MagSafe Duo Charger

Designed to charge multiple devices from a singly power source, the MagSafe Duo Charger is the pinnacle of modern convenience. The MagSafe Duo Charger magnetically connects to both your iPhone and Apple Watch to wirelessly (and simultaneously!) charge them. Heads up, you’ll need to ensure that the intended recipient has an iPhone that supports the MagSafe standard (either a twelve or thirteen series handset). For the travel conscious consumer, the MagSafe Duo Charger folds up neatly and discreetly!

Apple Watch

Now this ones a little tricky, as the Apply Watch Suite provides a dizzying amount of options to choose from. In addition to choosing from one of the three models (Apple Watch SE, Apple Watch Series 8 or the Apple Watch Ultra), each model also includes a dazzling array of options for the case size, material and colour ways! Not to mention there’s also the band and band colour to consider…This makes it difficult when deciding on an Apple Watch as a gift.

With its larger screen, faster chip, and new iPhone and Apple Watch crash detection feature, the Apple Watch SE satisfies the needs of the majority of Apple consumers.

However, if you’re looking for a larger Always-On display, a blood oxygen sensor, ECG monitoring and temperature sensor for cycle tracking, then the Apple Watch Series 8 might be more your speed.

For the truly adventurous at heart, the Apple Watch Ultra combines all of these features and more. While the 49mm titanium case is larger than the other models, it comes with larger, easier to manoeuvre buttons and a new Action button feature that gives the wearer quick access to app-specific commands. The Apple Watch Ultra also includes a brighter Always-On display, more reliable GPS (even in unfavourable conditions), longer battery life (up to 36 hours, soon to be 60 hours in a yet-to-be-released extended battery optimisation mode), and can even function as a dive computer thanks to its depth gauge and water temperature sensor.

As you can see, there’s a lot to consider when comparing the Apple Watch models. So make sure you know what you’re looking for before heading down to your local Apple Store!

Apple TV 4K

With its new A15 Bionic power processor, the new third-generation Apple TV 4K has a lot to offer. Its CPU is 50% faster than the previous generation, resulting in better audio and video, greater responsiveness, easier navigation and faster UI animations. Gamers will be happy to know that the GPU has also improved by 30%, ensuring smoother gameplay! Depending on your media streaming needs there are two options:

  1. Apple TV 4K (Wi-Fi) model with 64 GB of storage
  2. Apply TV 4K (Wi-Fi + Ethernet) model with 128 GB of storage

Both options also include a Siri Remote that’s charged via USB-C.

Apple One Subscription

Over the last few years we’ve seen Apple expand further into software services. A huge component of that has been their foray into streaming and gaming services – Apple Arcade, Apple Music, Apple TV+, etc. Now there’s another on the market – Apple One! Apple One bundles multiple Apple streaming subscriptions at a reduced cost. Both the individual and family plans include access to all aforementioned products, in addition to an expanded allocation of iCloud storage. The Premier tier adds even more iCloud storage to your account, as well as access to News+ and Fitness+ services.

 

Not sure which of these suggestions is the right fit for the Apple fan in your life? Why not consider an Apple gift card! A gift card is a great way to avoid gifting someone with a product they already have or have no use for. It also gives them the freedom to choose the exact model and colourway they have their heart set on!

Filed Under: Blog Tagged With: airpods, AirPods Pro, AirTags, apple accessories, apple Christmas gifts, apple gift guide, apple gifts, apple homepod, apple one, apple one subscription, apple original content, apple products, apple tv, Apple TV 4K, apple watch, Apple Watch SE, Apple Watch series 8, Apple Watch ultra, Christmas, holiday gift guide, holidays, homepod, HomePod mini, ipad, iPad air, iPad mini, iPad mini sixth generation, iPad ninth generation, iPad tenth generation, MagSafe charger, MagSafe duo charger

9 ways to stay safe while shopping online these holidays!

November 23, 2022 by eStormAus

The holiday season is upon us! If you’re like me and try to avoid the hustle and bustle of shopping centres this time of year, then you’ve probably already started doing some (or most) of your Christmas shopping online.

However, online scammers know this and are ready to take advantage of the buying frenzy that occurs during the holidays. Therefore, it’s important that you take necessary precautions when conducting online transactions.

Here are our tips to keep your financial and private information safe from cyber criminals this Christmas:

1. Only use up-to-date devices

Any devices operating on old software pose a serious threat to your online security. Hackers exploit the vulnerabilities found in older operating systems to gain access to both the device and the users private data. Software updates not only improve your device’s performance, but also include patches to fix these vulnerabilities and improve your cyber security. Although installing updates on your computer, tablet or smartphone may feel like a lengthy chore, it can drastically reduce your online risk. For this reason, we recommend that you only use up-to-date devices when shopping online.

2. Never visit websites from email links

This time of year you’re probably being inundated with promotional emails offering the latest products and exclusive offers. However, not all of these emails are going to be legitimate and, as cyber attacks become more sophisticated, it can be difficult to detect which emails are in fact phishing scams. Many of these phishing emails include seemingly innocuous links that, once clicked, lead the unsuspecting victim to a nefarious site that will begin to auto download malware onto their device. It’s better to be safe than sorry, so we recommend never clicking links found in an email. Instead, try navigating directly to the website yourself by typing the url into your web browser. We also recommend applying the same advice to links that have been texted to your phone.

3. Use a wallet app

Giving your financial information (such as debit and credit card details) always constitutes risk. However, during the holiday season, many of us find ourselves purchasing from online stores and retailers we haven’t dealt with before. Freely handing over your financial details to an unknown site exponentially increases the risk of cyber criminals accessing this information. That’s why we suggest that (whenever possible) you use a wallet app (such as PayPal) to facilitate your online purchases. Using these services circumvents this issue, as you only share your payment card details with the wallet app service (Apple Pay, Google Pay, PayPal, etc.), and keeps it out of the hands of the online merchant.

4. Remove all saved payment information after finalising your purchase

Many websites automatically save your payment card details after you finish checking out. While this may be convenient and save you time on your next purchase, it also puts you at risk for a number of reasons. For starters, anyone with access to your device or online account could easily rack up hundreds (or even thousands!) of dollars of purchases in your name. In addition, the online retailer may suffer an all-too-common data breach, which could likely result in your payment card details ending up in the hands of a cyber criminal. A general rule of thumb is the fewer databases you allow your financial details to be stored on, the better. Subsequently, it would be in your best interest to immediately remove your payment card information after checking out. You can usually do this through your account settings.

5. Only shop on secure websites

The new standard for URLs is no longer “HTTP” but “HTTPS”. Having the “S” on the end indicates that their websites encrypts any and all data transmitted through the site. This includes personal data such as your name, address and payment information. We cannot emphasise this enough, you should NEVER trust a website that doesn’t use HTTPS in the address bar. A small lock icon in front of the website address is also another indicator that a website is secure and should be safe to purchase from.

6. Double (and triple!) check the website URL

Mistakes happen and we’re all guilty of the occasional typo, especially when trying to use those tiny keyboards on small smartphone screens, am I right? However, if gone unchecked, one typo can lead you into a world of trouble. Cyber criminals often buy domain names that are very close to real ones used by popular and reputable online retailers (think Amaazon.com instead of Amazon.com). They then build a fake ‘copycat’ site designed to fool victims who’ve accidentally typed in the URL. Being vigilant and taking a few moments to double-check that you’ve navigated to the correct website before you start shopping can save you a world of hurt.

7. Never use public Wi-Fi to shop online

Connecting your device to public Wi-Fi is asking for trouble. Hackers know that this time of year people are more likely to use their portable devices to search for products and prices while out and about in public. They often station themselves around popular public Wi-Fi spots and use it to spy on the activities of any other devices that are also connected. In doing this, these hackers are privy to every website you visit, every word you type and every app you open. With this kind of uninhibited access, it won’t be long until they’re able to see (and steal) your online account passwords and payment card information. We strongly urge you to switch off Wi-Fi while out in public and rely only on your mobile carrier’s network. Or, if that’s not a viable option, wait until you’re safely at home to do any online shopping.

8. Watch out for scammers impersonating well-known brands

While phishing is a major concern year round, the holiday season sees a major spike in phishing and smashing attacks. During the 2021 holiday season alone there was a 397% increase in typo-squatting domains associated with phishing sites. Cyber criminals know that this time of year people receive hundreds of retailer marketing emails, order confirmations and shipping updates. These emails provide the perfect templates for them to impersonate well-known and trusted brands like Amazon, Target and JB Hi-Fi. Unsuspecting victims are then tricked into clicking on a nefarious link and/or logging in to malicious website. Even under the most intense scrutiny it can be hard to tell which email is real and which is fake, so it’s important that you remain on high alert. This is yet another reason why we recommend always visiting a website directly, instead of clicking on an email link.

9. Keep an eye on your bank accounts

Odds are that, during the holiday season, you’re probably making more purchases than you normally would. Therefore, if you’re not paying attention, it can be easy for unexplained transactions to slip through the cracks. That’s why we believe you should keep a close eye on your bank account. Catching suspicious charges early gives you a greater chance of recuperating the lost funds, while also helping you prevent any further breaches. You can even set up banking alerts to monitor your account for you, all through your online banking app. For example, you may choose to set up alerts for purchases over a specified amount or for purchases made outside the country.

Filed Under: Blog Tagged With: cyber security, cyber security tips, financial fraud, holiday shopping online, identity theft, online Christmas shopping, online shopping, online transactions, stay safe online, tips for online safety

Are You Infected? 8 Warning Signs That Your Device Has Malware

October 20, 2022 by eStormAus

Over 40 years ago the first computer virus was unleashed onto the world. Since then, cyber attacks have kept pace with technological advancements. There now exists a multitude of malware threats that can cause significant damage to your devices and IT systems. Despite the chaos these attacks can create, a malware infection isn’t always obvious. Cyber criminals are notoriously sneaky, disguising their work and burying malware deep within device systems until it’s nearly impossible to identify (let alone get rid of).

Nevertheless, there are a few warning signs that indicate your device may be infected with malware. Early detection and intervention can greatly reduce the risk of your data and accounts becoming compromised, so it’s of the utmost importance that you heed these warnings.

Warning Signs That Your Device Is Infected With Malware

1. Your Device is Running Slowly and/or Frequently Crashing

Devices may start operating slowly for a number of reasons and this doesn’t always necessarily point to a malware infection. Perhaps you’re running a memory-intensive program or application? Or have a number of internet browser tabs open at once? Maybe your device is just old and parts needs replacing? However, if your device begins acting sluggish, freezing or even crashing and you can’t pinpoint a reason…malware may be the culprit. Malware often runs in the background, eating up system resources and causing the operating system, applications, software and internet connection to slow down dramatically.

2. Pop Ups Won’t Stop Popping Up

One of the most nefarious versions of malware is spyware. Spyware is exactly what it sounds like: it spies on you in order to collect your personal information (such as passwords, financial details, location, browsing habits, etc), without your consent. Pop up ads and unexpected dialogue windows are often spyware in disguise. Spyware is known to mimic legitimate programs and businesses in order to deceive the intended victim. One of the most common examples is a fake virus or threat detection warning that urges you to click a link or call a customer service number. These pop ups are annoyingly relentless and difficult to close.

3. Your Internet Browser is Being Re-Directed

Has your browser’s homepage changed? Has an unfamiliar toolbar appeared? Are you being redirected to random webpages when surfing the web? If the answer to any of these questions is yes, then you might have malware. These strange happenings are usually indicative that you’ve unintentionally downloaded something nefarious or perhaps clicked on a pop up you shouldn’t have. Not every redirect will cause you harm. Accidental clicks on legitimate ads do happen after all. However, if you find that you’re entering a known website URL and being redirected to a completely foreign page, then odds are that you’ve got malware. Redirection may not be entirely obvious either. For example, a banking Trojan is a type of malware that redirects its victims from their banking institutions webpage to one that is indistinguishable, with the only notable difference being the URL in the address bar. The malware then records the individual’s login details, thus allowing cyber criminals to access their financial accounts. While this may seem scary, remember that redirection relies on browser extensions. So if you’re at all worried that you’ve been exposed to malware, all you have to do is open your browser settings and disable (or better yet delete) the extensions that you didn’t deliberately install.

4. Your Hard Drive Space Suddenly Changes Dramatically

Has your available disk space drastically increased or decreased? A sudden shift in your hard drive capacity can be an indication of a malware infection. For example, malware is known to ruthlessly delete files and software, therefore increasing the amount of unused hard drive space. On the other hand, malware (like any software) takes up hard drive space. Some malware may even copy existing files or introduce new ones into your device’s system. They are usually difficult to detect, using generic and seemingly innocuous file names. “Disk-bombs” are one such example. These self-replicating viruses and worms will devastate your device by rapidly filling the hard drive with copies of itself. In many cases, these copies are undetectable when using the default settings for file browsing.

5. Missing, Altered or Corrupted Files

As we’ve just pointed out, changes to your files can be one of the biggest red flags that malware has infected your device. If you notice that your files and/or folders are missing, corrupted or altered without explanation then you may have a serious issue on your hands. Ransomware (another type of malware program) encrypts your files (including pictures, documents, project files, etc) and, as the name suggests, holds them hostage until the victim pays to have them restored. Particularly nefarious ransomware may even encrypt your entire device, rendering it utterly useless until the cyber criminal’s demands are met. It’s important to remember that even if the ransom is paid, there is no guarantee that the hacker will restore your files or device.

6. Your Device is Making Strange Noises

By now you’re probably already familiar with that horrible whirring noise that happens when your machine is “thinking” too hard (ie. when processing something that requires a high amount of memory). However, this sound usually stops whenever the activity causing it is no longer in progress. If your computer is making this sound even when you’re not doing anything memory intensive, then malware may be operating in the background. In addition, even if the malware is running unbeknownst to you, your device will most likely alert you with some sort of audio signal. So if you’re regularly noticing chimes, bells and other alert sounds coming from your device (seemingly without cause), this could point towards a virus or malware infection.

7. Spam is Being Sent from Your Email and/or Social Media Accounts

Have any of your email contacts mentioned receiving a strange message from your account? If so, check your sent folder immediately. If you come across any unfamiliar emails that you definitely didn’t create, then you’ve most likely contracted a computer virus. Your best course of action is to immediately sign out any device logged into your email account, lest they also become infected. Next, change your password to something completely new, ideally with a mix of uppercase and lowercase letters, numbers and symbols. Avoid using the same password for multiple accounts. Setting up two-step authentication (also known as multi-factor authentication) will also reduce the chances of unauthorised persons accessing your account. It’s not just your email that malware may infiltrate either, your social media accounts are also at risk. Some malware will wreak havoc on your social media accounts (Facebook is the most popular target) by generating fake posts or direct messages with dubious links. Unfortunately, this malware infection can spread like wildfire, as any of your contacts who are tricked into clicking on the fake link will also become infected.

8. Your Antivirus Software Isn’t Working

Generally, a good antivirus software should be able to protect your device against most viruses. Even so, some malware is sophisticated enough to defend itself. If you find that your current antivirus software isn’t updating and you’re unable to download and install a new one, then this may be a sign that a virus is working to protect itself. Try closing and reopening the software, or restarting your device. If neither of these solves the problem then it’s time to call in the professionals.

I’m Infected…What Should I Do?

Any device exhibiting these warning signs should be looked at straight away. The longer you leave malware unchecked, the more damage it can do. Once your device is free from any malicious programs you should take steps to protect yourself against any future attacks. Maintaining an up-to-date antivirus software and using a virtual private network (VPN) when connecting to the internet can be two of the simplest (yet effective) ways to protect your device, accounts and data.

Filed Under: Blog Tagged With: adware, computer infection, how to spot malware, is there malware on your device, is your device infected?, malware, malware prevention, ransomware, spyware, warning signs

Optus Data Breach: How to protect your details

September 29, 2022 by eStormAus

On Thursday 22nd September, Australian telco giant Optus revealed they had been the target of a cyber attack that has compromised the personal details of potentially 9.8 million users. If you are an Optus customer, your name, date of birth, phone number, and email addresses may have been breached. Identity documents such as driver’s licences or passport numbers may also be in the hands of the cyber criminals, paving the way for potential identity theft.

While it is as yet unclear whether the attack was financially or politically motivated, if you are an Optus customer it’s important that you take immediate action to secure your details.

I’m an optus customer! What do I do about the breach? How do I protect my identity?

First of all, don’t panic! There are actionable steps you can take to secure your most important details, such as your bank or Medicare accounts. Follow the below steps to ensure you are protecting your details to the best of your ability.

Change your bank login details

Scamwatch has advised Optus customers to change their bank logins. Changing your password is crucial, however we also recommend updating your username or associated email for the ultimate protection.

Update your email password

We advise updating your email password and any other accounts that use the same email and password combination that you used for your Optus account. Choose a strong password with multiple lowercase, uppercase and special characters. You can use this free password generator to help you out!

Enable multi or two factor authentication

Most apps and accounts provide the option to enable multi or two factor authentication. Check within your account or app for the option to enable it (this can usually be found within the Account, Password, or Security settings). Multi or two factor authentication provides an extra layer of password and login protection. With MFA or 2FA enabled, in order to successfully login and access your account you will need to supply a confirmation code/PIN that is generally sent to your personal device via text, email or both. It’s important to enable multi or two factor authentication because cyber criminals will not be able to proceed past the authentication method even if they have the stolen password and email combo for your account. Plus, you will also most likely receive a notification of the attempted login so you can track suspicious activity on your account!

Place limits on your bank account

Place smaller limits on your bank account until you can confirm your bank or login details were not compromised. This will prevent cyber criminals from moving large amounts of money out of your account.

Monitor for suspicious or unusual activity

Keep an eye out for suspicious purchases, login attempts, emails, or other unusual activity across your accounts.

Watch out for scams

Optus has advised customers to only contact the company via their app or official phone number. Scammers may impersonate Optus and target customers via email or text, so be wary of any correspondence that claims to be from Optus – particularly if they are asking you for money or to provide personal information.

Filed Under: Blog Tagged With: cyber attack, cyber criminals, cyber security breach, cyber security tips, cyber threat, data hack, data protection, data theft, hack, hackers, online safety, Optus breach, Optus data breach

11 Types of Phishing Attacks

August 3, 2022 by eStormAus

1. Spear Phishing

Spear phishing is an email or electronic communications scam targeted towards a specific individual, organisation, or business. It is a malicious tactic utilising emails, social media, instant messaging, and other platforms to get users to share personal information or perform actions that can cause network/system compromises or data/financial loss. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware or ransomware on a targeted user’s device.

Typically, spear phishing is used in targeted attack campaigns to gain access to an individual’s account or impersonate a specific individual, such as a ranking official or those involved in confidential processes within the company.

 

2. Whaling

A whaling attack is a method used by cybercriminals to masquerade as a senior official within an organisation and directly target other ranking or important individuals. The aim of whaling attacks is typically to steal money, gather sensitive information, or gain access to their computer systems for criminal purposes.

Also known as CEO fraud, whaling is similar to regular phishing attacks in that it uses methods such as email and website spoofing to trick targets into performing specific actions, such as revealing sensitive information or transferring funds.

Cybercriminals specifically choose to impersonate someone with senior or influential roles within the organisation. Think of them as the ‘big phish’ or ‘whales’ of the company (i.e., CEO or finance managers). Impersonating people in these roles adds an extra element of social engineering, as staff may be reluctant to refuse a request from someone they deem to be important.

 

3. Vishing

Voice phishing (shortened to ‘vishing’) is a form of phishing that uses phones to steal confidential information. Vishing relies on convincing victims they are doing the right thing by responding to the caller. Often the scammer will pretend to be calling from the government, tax department, police or the victim’s bank.

Using threats and persuasive language, cyber criminals will make their victims feel like they have no other option but to provide the information requested. Some scammers will use forceful language that suggests they are helping the victim avoid criminal charges, while other scare tactics involve leaving threatening voicemails requesting the victim call back immediately or risk arrest, loss of funds, or worse.

The cybercriminal may ask for bank account information, credit card details, mailing addresses, tax information, or medical records. They may also ask the victim to take action by transferring funds, emailing confidential work documents, or providing details about their employer.

Once the criminal has obtained this information, they may drain the victim’s bank account, commit identity theft, use the victim’s credit card to make unauthorised purchases, or access their email accounts to trick the victim’s colleagues into giving up confidential information.

 

4. Smishing

SMS phishing (also known as text phishing, or ‘smishing’) is a phishing attack carried out over mobile text messaging. Victims are deceived into giving sensitive information to a disguised attacker. It occurs across many mobile messaging platforms, including non-SMS channels like WhatsApp, Facebook, Instagram or other data-based mobile messaging apps.

Cybercriminals manipulate a victim’s decision-making through three driving factors:

  • Trust: by masquerading as a legitimate individual or organisations, cybercriminals lower their target’s scepticism.
  • Context: cybercriminals use a situation could be relevant to targets allows them to build an effective disguise. The message feels personalised, which helps it override any suspicion that it may be spam.
  • Emotion: by heightening a target’s emotions, attackers can override their target’s critical thinking and spur them into rapid action.

 

5. Angler Phishing

Angler phishing is a recent type of cyberattack that targets social media users. People disguise themselves as a customer service agent on social media in order to reach a disgruntled customer and obtain personal information or account credentials.

Fake accounts will answer people are airing complaints on social media, and will disguise themselves under a user handle or profile that includes the name of the financial institution with the hopes that upset victims won’t realise they are not a valid account.

Once they have baited their disgruntled victim, the fake account will offer a link they claim will take the victim directly to an agent to talk to them. However, that link will either install malware onto their computer, or lead them to a fake website that will try get information and money from them.

 

6. Pharming

Pharming is a type of cyberattack in which criminals redirect internet users trying to reach a specific website to a different, fake site. These fake (or ‘spoofed’) websites aim to capture a victim’s personally identifiable information (PII) and login credentials, such as passwords, social security numbers, account numbers and so on, or else they attempt to install pharming malware on their computer. Pharmers often target websites in the financial sector, including banks, online payment platforms, or ecommerce sites, usually with identity theft as their ultimate objective.

 

7. Pop-up Phishing

Pop-up phishing involves using fraudulent messages that pop up for users when they are surfing the web. Cybercriminals infect legitimate or otherwise trustworthy websites with malicious code that enables these pop-up messages to appear when people visit the website.

Often, these messages warn unsuspecting website visitors about the security of their computer and will prompt the visitor to either download a tool (such as an antivirus application) which is in fact malware, or to call a fraudulent number for support.

Example of successful pop-up phishing:

A potential victim was browsing the internet on his MacBook Pro, when he encountered a pop-up message alerting him to a problem with his computer. The scammers behind the pop-up provided a phone number to call for support.

The cybercriminal disguised as an ‘Apple support representative’ prompted the user to establish a remote connection so the ‘representative’ could diagnose the issue. The scammer showed the user his AppleCare had expired and required renewal for $499 and navigated the victim to a webpage requesting his credit card number for AppleCare renewal.

 

8. Clone Phishing

Clone phishing refers to an email that has been cloned from an original message sent by an authentic organisation. The cloned email appears to be legitimate and can trick the user into giving up information.

Clone phishing has evolved into a cyber threat that is often targeted at high-profile people such as individuals working in politics, banks, or large enterprises because clone phishing offers a way for attackers to extract sensitive, financial, confidential, or sensitive information.

Some clone phishing messages appear to be sent by a real person at the company the target works for or is involved with and is accompanied by copy and pasted content and information from a genuine message, with links or attachments that have been replaced by malware or fake website. Other spoofed emails include attachments claiming to contain important information such as invoices or shipping notices. Often, these attachments will contain malware or ransomware that compromise the victim’s device.

 

9. Evil Twin Phishing

An evil twin attack is a form of cyberattack that tricks a victim into connecting to a fake Wi-Fi access point that mimics a legitimate network. It is the wireless version of common phishing attacks. Once a user is connected to the ‘evil twin’ network, cybercriminals can inject malware or access the victim’s network traffic, sensitive data, and private login credentials.

The danger in evil twin attacks is that victims are often not aware they have been targeted by an evil twin attack because, for all intents and purposes, it feels no different from connecting to any other Wi-Fi network. The main difference is that once they have connected, everything they do online can be tracked and even controlled by the cybercriminal. If the victim logs into an unsecured bank or email account, the cybercriminal is able to intercept the login details and transactions.

Once the cybercriminal has identified a Wi-Fi network or hotspot to spoof, they will create a counterfeit wireless access point with the same name, one that closely resembled it or a name that could tempt users (e.g., Free Wi-Fi). Open networks are a prime target as users can connect automatically with requiring a password.

10. Watering Hole Phishing

Watering hole attacks compromise users within a specific industry by infecting websites they typically visit and luring them to a malicious site. Watering hole attacks are also known as strategic website compromise attacks.

Cybercriminals attempting attacks for financial or gain or to build their botnet can achieve this by compromising popular consumer websites. They will look for a known vulnerability in the website, compromise the site, and infect it with their malware before they lie in wait for baited users.

On top of this, attackers will prompt victims to visit the sites by sending them seemingly harmless and highly contextual emails directing them to specific parts of the compromised website. Often these emails seem completely legitimate, as they are sent through the website’s automatic email notifications and newsletters that go out to their client or subscription base.

As with most cyberattacks, the user’s machine may be compromised by a drive-by-download that provides no clues to the victim that their machine has been attacked and compromised by the site.

 

11. HTTPS Phishing

HTTPS phishing refers to the landing page or watering hole site that a user arrives at. SSL certificates have in the past been a way to ‘prove’ that a website is trustworthy. However, now it has become relatively easy for scammers to encrypt SSL on their fake or spoofed websites. Cybercriminals can now get their own SSL certificates to secure pages used in their phishing campaigns, and can often do so without having to reveal much information about who they really are. Other criminals may abuse pages hosted on cloud services, which sometimes allow them to automatically inherit the security certificate.

Filed Under: Blog Tagged With: angler phishing, clone phishing, cyber security, cyber threats, cybersafe, evil twin phising, fraud, hack, hackers, how to spot phishing, HTTPS phishing, pharming, phishing, phishing attacks, phishing explained, pop-up phishing, smishing, spear phishing, types of phishing attacks, vishing, water hole phishing, whaling, what is phishing?

Phishing Attack Prevention: How You Can Avoid Becoming the Catch of the Day

July 19, 2022 by eStormAus

Over 50% of IT professionals agree that phishing attacks are one of the biggest cybersecurity concerns currently affecting both individuals and businesses. Lapses in cybersecurity protocols and weak infrastructure allow phishing attacks to access highly sensitive information, including passwords, financial details and personal information. Criminals are using every communication method at their disposal, including email, social media and phone calls, to ensure their victims. Their deceptions have also become sneakier and more convincing over time, pretending to be trusted friends, coworkers, institutions and even governments. Unfortunately, one click can be all that stands between your private data and a hacker. With over 90% of data breaches being attributed to phishing attacks, it’s only a matter of time before you or your organisation becomes an unwitting target. Therefore, it’s important to know how to prevent, identify and manage any phishing attempts.

How Does Phishing Work?

A phishing scam will attempt to persuade the intended target to undertake an action (such as open an attachment, click on a link, fill out a form, or reveal personal information), by posing as a trustworthy individual or reputable organisation. Once the action is completed, a number of consequences may result. A cybercriminal will most likely use a phishing scam to try to:

  • Gain total control of your device and its contents by infecting it with malware
  • Access private information that can be used to steal your money and/or identity
  • Obtain log in details for your online profiles including email, social media, banking, online shopping and other platform accounts
  • Trick you into willingly sending money or other valuables through deception

Phishing attacks can take many forms. Some are swift and encourage you to urgently complete a specific action, while others can be a long drawn out process, building a connection with the intended victim over an extended period of time. Only after a trusting relationship has been established (and the victim is lulled into a false sense of security) does the scammer take advantage of the situation.

Unfortunately, even if you exercise extreme caution, it can be the people closest to you who pose the most danger. If someone close to you has their email, contact list or social media compromised by a phishing attack, then the hacker may hijack their account. From there, it’s an easy feat for the hacker to spam friends, family and coworkers with phishing messages seemingly from an account they know and trust.

Types of Phishing Attacks

The sad truth is that cybercriminals who use phishing attacks are good at what they do. They’re savvy liars, who know how to craft believable stories and design legitimate appearing communications. They’re so good that over 40% of employees have admitted to not following best practice guidelines and engaged in some for of dangerous action while online (ie. clicking on an unfamiliar link, downloading a file or exposing personal data). If you’re an act first and think later kind of person, then you’re an easy target for phishing scams.

The good news is that phishing is much easier to recognise once you know what to look for. Although phishing attacks can take many forms, they most commonly fall into one of the following categories:

  • Phishing emails are carefully designed to resemble a valid email address, individual, company or organisation. It may include personal information the cybercriminal has gathered about you (such as your name, employer or geographical location), in order to appear more legitimate. It will likely also include a request to follow a link, open an attachment, change a password, send a payment or reply with private information.
  • Phone/Voice phishing (vishing) occurs when a scammer impersonates a person or company over the phone. They may use a number of methods to call your number directly, such as Voice over Internet Protocol (VoIP) technology. In other cases, a fisher might try to mask their own phone number by sending out an automated message that redirects the intended victim. In any case, the visher will say and do everything they can to keep you on the phone. The longer you talk to them, the more likely you are to fall into their trap.
  • SMS phishing (smishing) is very similar to vishing, but will take place over text exchanges and messaging apps.
  • Social media phishing involves cybercriminals either posting or directly messaging phishing links on social media platforms. The links can take a variety of forms: fake news articles, free giveaways or sketchy “official” charitable organisations with urgent requests. Referred to as “clickbait”, the links will be as sensationalised and dramatic as possible in order to entice people. If any of your social media contacts fall for the trap, then the scammer can then impersonate them and use their account to spread the nefarious link.
  • Clone phishing takes place when an existing message from a legitimate contact is duplicated, with all of the original attachments and links replaced by the scammer. While this method most commonly appears in email attacks, it has also been used by social media and SMS phishing scams.
  • Domain spoofing is a popular technique used to impersonate brands, businesses and organisations. Cybercriminals will mimic valid email addresses by using a domain that very closely resembles the one used by the real company. For instance @netflix.com may be modified to @netflix-support.com in order to fool Netflix subscribers. Alas, people who fall for this scheme may not realise their mistake until it’s too late.
  • Email account takeover takes place when a cybercriminal acquires the email credentials of an executive member of an organisation. They use this to impersonate them and target any colleagues, team members, clients and customers who have dealings with this individual. The scammer capitalises on their high profile and position of authority, sending out phishing emails to other targets who report to and/or trust the original email account holder.

How to Spot a Phishing Email

Approximately 3.4 billion spam emails are sent out every day! While spam filters may stop many phishing attempts from reaching your inbox, there are bound to be some that slip through. Scammers are also continually updating their tactics, doing everything they can to disguise themselves and their intentions. Below are some red flags that can help you spot any phishing emails that have managed to slip into your inbox:

  • Warnings of suspicious activity and/or log-in attempts that have been noticed on your account
  • Claims that you have an outstanding payment and/or that you need to rectify your payment information
  • Requests to confirm your account by disclosing personal information
  • Attachments/downloads (such as fake invoices or receipts)
  • Statements that you’re eligible for some form of government refund and/or scheme
  • Offers coupons/vouchers for free items/services to be redeemed
  • Spelling errors and poor grammar
  • Unprofessional or amateur looking graphics
  • Generic greetings instead of your name (such as Dear Customer or Dear Sir/Madam) 
  • Unfamiliar links

What To Do If You Receive a Phishing Email

Unfortunately, many of us don’t think twice when opening emails in our inboxes. In fact, one third of all phishing emails are opened by their recipients! While simply opening the email may not have any ill consequences, it drastically increases the probability that you’ll click on a malicious link or download, whether unintentionally or because curiosity got the better of you. For this reason, if you come across a suspicious looking email than we recommend you follow these simple steps:

  1. Delete the email immediately without opening it. Not all phishing emails require you to click on or download something, some can infect your device just by being opened! It’s better to be safe than sorry.
  2. Block the sender of the email. If your email provider allows you to manually block incoming emails from specific accounts/domains then be sure to add the sender to your blocked list. If you are using a shared account or someone else has access to your inbox, then this is especially important.
  3. Consider purchasing extra security to help monitor for phishing emails, such as antivirus software.

Tips To Protect Yourself From Phishing Attacks

Even for the most cautious person can still fall victim to a phishing attack. As cybercriminals employ more sophisticated tactics and find new ways to create increasingly convincing communications, it’s more important than ever to take preventative steps to avoid becoming the catch of the day.

Here are some basic measures you can use to avoid being scammed:

Be cautious when giving out personal information

A good general rule is never give out your information to a person or website you don’t 100% trust. Be sure to thoroughly verify that every website and/or company you give your information to is both genuine and secure. If the URL of the website doesn’t start with “http” or have a closed padlock icon nest to it, then under no circumstances should you enter your details.

Never trust alarming messages

Phishing scammers are known for trying to scare their victims into handing over their information. No matter what a communication says, it’s important to remember that most reputable organisations (such as governments, banks, insurance companies, etc) will never request account or other sensitive information via email. If you receive a worrying email, delete it and contact the company directly to confirm whether they sent it.

Avoid clicking on embedded links

It’s generally not a good idea to click embedded links in emails, even when you know the sender. At the very least you should hover over the link to see if the destination is what it claims to be. However, in some cases the attack is so sophisticated that the destination URL is indistinguishable from the genuine site. Rather than click on the link, visit the site directly through use your search engine to find the site and visit it directly.

Don’t download any attachments

Never open an attachment from a suspicious or strange email. Many will be mislabelled as Word, Excel, PowerPoint or PDF file types in order to trick you into downloading malware or something else nefarious.

Install anti-phishing add ons

Most internet browsers these days have add-ons available that can discern malicious websites and alert users to known phishing sites.

Install firewalls

Firewalls act as a shield between your device and a cyberattack. A combination of desktop and network firewalls is one of the most effective ways to reduce the chances of a phishing attacks infiltrating your environment.

Regularly update your software and operating systems

Look, we’re all guilty of ignoring update notifications at some point or another. However, patches and updates are necessary to ensure your device can withstand the latest cyberattack methods. Older operating systems and internet browsers some of the most common targets for phishing attacks, so make sure you update, update, update!

Filed Under: Blog Tagged With: angler phishing, avoid scams, clone phishing, cyber security, cyber threats, cybersafe, evil twin phising, fraud, hack, hackers, how to spot phishing, HTTPS phishing, online scams, pharming, phishing, phishing attack prevention, phishing attacks, phishing explained, pop-up phishing, smishing, spear phishing, types of phishing attacks, vishing, water hole phishing, whaling, what is phishing?

What Is a VPN? An Introduction To Virtual Private Networks

June 22, 2022 by eStormAus

What is a VPN?

A virtual private network (better known as a VPN), is one of the easiest and most effective ways of protecting your anonymity online. Connecting to a secure VPN server masks your internet protocol (IP), as it encrypts your internet traffic in real time. This ensures that your identity and online activities are virtually untraceable from third parties, including hackers, governments and internet service providers (ISPs). VPN services protect your network connection when using public networks, providing greater privacy for your personal data and information.

Why should you use a VPN?

If you value online privacy and security, then you should strongly consider employing a VPN every time your device is connected to the internet. Using an unsecured internet connection (whether it’s one set up by an ISP or a public Wi-Fi network), exposes your personal information, private data and browsing habits to cyber criminals.

When utilising an internet connection provided by an ISP, your network traffic is routed through your ISP’s servers. This tracks your IP address and catalogues everything you do online. While your ISP might not seem nefarious, they could very well be sharing  your browsing preferences with advertisers, law enforcers, governmental bodies and other third parties. Furthermore, if your ISP falls victim to a cyberattack, then your personal and private data will likely be compromised as well.

Public Wi-Fi networks that don’t require a password to access are even more dubious, as any strangers using the same network can snoop on your online session. You never know who could be eavesdropping and you may inadvertently give them the perfect opportunity to steal your passwords, personal data, banking and payment details, etc. Even just the smallest bit of information is all cyber criminals need to commit identity theft and/or financial fraud.

This is where a VPN comes in. VPNs hide your IP address, while also scrambling your data so that no one else can read it. This maintains your anonymity when web surfing, downloading files and commenting on forums. It also ensures that your private activities stays private, including sending emails, online shopping, paying bills, accessing medical records, etc. VPN apps also run in the background of your device, giving you peace of mind without disrupting your online activities.

How does a VPN work?

When you connect to the internet via a VPN, the network redirects your IP address through a remote server run by the VPN host. This creates a data ‘tunnel’, wherein your local network is the entrance and exits through a node in a location which could potentially be thousands of miles away. This means that the VPN server now becomes the source of your data, so the websites you visit can only see the IP address of the VPN server and not the IP address of your device. So while your internet traffic still passes through your ISP, your internet activity will appear to originate from VPN’s server IP address, which safeguards your browsing history from both your ISP as well as any websites who record search histories and track locations. VPN service providers typically have servers across the globe that are shared amongst multiple users and are frequently changed for security reasons. In addition, VPNs also work as a filter, encrypting your data and making it incomprehensible. This renders it entirely useless to your ISP, as well as any third parties who may seek to steal it. While this is a basic overview of how VPNs operate, a comprehensive VPN solution should perform all of the following tasks to protect itself (and you) from being compromised.

  • Encryption of IP address: a VPNs number-one job is to conceal your IP address from any and all third parties. This guarantees all information you send and receive online can only be seen by you and your VPN service provider.
  • Encryption of protocols: a VPN should also prevent you from leaving a digital footprint. Encrypting cookies, as well as your browser and search history, stops unwanted third parties from accessing your confidential and personal information.
  • Kill switch: a sudden interruption to your VPN connection results in an interruption to your secure connection. A VPN that can automatically detect sudden downtime is able to reduce the risk of your data being compromised by terminating preselected programs.
  • Two-factor authentication: a VPN that requires multiple authentication methods increases the difficulty for third parties to trespass on your network connection. This may include a combination of multiple passwords, verification codes and/or authenticator apps.

What are the benefits of using a VPN?

Using a VPN comes with a number of benefits, which include (but are not limited to) the following:

Protecting Your Devices

Keep your devices safe from cyber attacks by using a VPN. Anything that can be used to access the internet including desktop computers, laptops, tablets and even smart phones, can be exploited by cyber criminals looking to profit off your personal information. A VPN can shield your data and keep it away from prying eyes.

Protecting Your Browsing History

It’s no secret that everything you do on the internet is being watched. ISPs, websites and internet browsers keep track of everything you do and tie that information back to your IP address. Your data is then qualified, quantified and exploited. Beyond feeling violated that others may be privy to potentially embarrassing private information (such as medical conditions), it’s just plain annoying. Targeted ads are everywhere these days and they often lead to consumers being scammed, ripped off or worse.

Disguising Your Whereabouts

Your IP address links everything you’ve searched, clicked on, posted, watched and downloaded on the internet to your location and device. Think of it as the return address you’d put on the back of a letter. VPNs allow you to do all these online activities anonymously, by disguising your own IP address with that of the VPN server. Not only does this protect your privacy, but it halts the viewing, collection and sale of your search history.

Secure Transfer of Data

When working away from the office you may still need to access important files on your organisation’s network. Depending on the work you do, these files may contain sensitive information that must be protected at all costs. To access them, you’ll need a fast, reliable and secure VPN connection. Using a VPN that connects to private servers and uses encryption methods can minimise the risk of data leakage.

Get Access to Geo-blocked and Regional Content

As we’ve discussed, your IP address is a unique number that identifies you, your device and geographical location. You can customise your VPN connection to make it appear as if you’re in any one of the countries the VPN service provider has servers in. Streaming services such as Netflix often have different catalogues of content depending on your region. Using a VPN to change your location enables you to access a wider range of titles. Furthermore, some websites may geo-block their products and content, prohibiting certain countries or restricting access to specific locations. With VPN location spoofing, you’ll never again have to miss out because of where in the world you call home.

Prevent Price Discrimination

Price discrimination refers to the practice of varying the price of products or services based on the consumer’s location, previous purchases on the platform (first-time vs repeat customers, etc), and online shopping preferences (reseller websites like eBay, fast fashion brands, luxury and designer labels, etc). These factors are considered by automated algorithms, who then determine the pricing. By inhibiting these algorithms from accessing your internet history and cookies, VPNs can save consumers from being grossly overcharged.

Avoid Censorship

Certain countries restrict (or even prohibit) their citizens ability to freely explore the internet and easily access information. For tourists trying to find their way around, search for recommendations, and get in touch with friends and family back home, this can cause a lot of frustration. However, a VPN can circumvent censorship and internet blocks, giving you access to all the resources you may need while abroad. It is important to remember that it is the user’s responsibility to carefully research the country’s laws, as using a VPN may not always be legal.

Prevent Data Throttling

Some ISPs include ‘data caps’ in their terms and services. This means that once you’ve consumed a predetermined amount of your available data, your ISP will slow your internet service down. This is known as ‘data throttling’. VPNs can help you avoid reaching data caps altogether, as it bars your ISP from determining how much data you’re using.

Avoid Bandwidth Throttling

Similarly, ‘bandwidth throttling’ refers to an intentional slowing down of your internet speed by your ISP, or by anyone else who has control over your Wi-Fi network’s performance. Bandwidth throttling is often triggered by visiting certain websites or engaging in specific internet activity. Once again, a VPN encrypts the internet traffic coming from your device, so your ISP will be unable to see the data going to and from your device. This means that they will not be alerted to either of these scenarios and you can avoid having your bandwidth throttled.

Network Scalability

It’s not just everyday users who can benefit from employing a VPN, but businesses as well. VPNs can provide flexible network scalability for companies struggling with the costs of expanding their operations. For example, a VPN server can provide a number of remote employees simultaneous access to on-site information, devices and applications. Adding additional employees is simple, all you need is the bandwidth and login credentials.

Reduce Support Costs

A VPN set up that also incorporates cloud computing architecture can save businesses considerable time and money on support services. For example, when businesses outsource their server needs to a VPN service provider, that provider then becomes responsible for optimising the server’s performance, ongoing maintenance and cybersecurity measures. As VPN service providers support a large number of clients, the cost per client is relatively low and are generally more cost-effective than placing the burden on an internal IT support team. However, businesses should still be sure to find a VPN service provider who suits their individual needs. This may include carefully checking the level of service they offer, as well as what kind of hardware they use.

What to look for in a VPN service provider

There’s a lot to consider when choosing a VPN service provider. Although there are many great VPN choices that can help protect your security, privacy and anonymity online, it’s important to do your homework and find one that caters to your specific needs. Here’s a few questions to help you determine which VPN service provider is right for you:

Will they respect your privacy?

If you want a VPN that values your privacy, then you should ensure that your VPN service provider has a no-log policy. A no-log policy guarantees that your online activities will never be monitored and recorded, not even from your VPN service provider.

Are their cybersecurity protocols up-to-date?

Some VPN service providers have stronger, more current security protocols in place. It’s important to know how well equipped your VPN service provider is to defend against cyberattacks and how often they perform cybersecurity risk assessments.

Do they set data limits?

Bandwidth is often the deciding factor for a lot of users searching for a VPN service provider. Their services need to match your needs, so if you spend a lot of time and data on the internet then make sure you’re going to get full, unmetered bandwidth without data caps.

Where are the servers located?

This ones a no-brainer. If your IP address to appears as if it’s located in a specific country, then you need to make sure the VPN service provider has a server in that country.

Do they enable VPN access on multiple devices?

The average consumer typically accesses the internet from multiple personal devices and all of them need to be able to use the VPN at the same time.

What’s the bottom dollar?

If cost is an issue then the good news is that there are free VPNs out there. However, it’s good to keep in mind the old adage, “you get what you pay for.” While you might not be handing over cold, hard cash, you’ll most likely endure frequent advertisements or may even have your personal information sold to third parties. Typically, free VPNs don’t offer the best cybersecurity protocols, variety of server locations, highest bandwidths, fastest connection speeds or support. If you’re going the free route, make sure you’re extra vigilant when choosing a VPN service provider.

Filed Under: Blog Tagged With: do I need a VPN?, how to use VPN, IP address encryption, should you use a VPN?, understanding viral private networks, virtual private network, VPN, VPNs explained, what do VPNs do?, what is a VPN?

Our favourite WWDC22 Apple Announcements

June 9, 2022 by eStormAus

In June Apple announced a host of new products – check out our favourite announcements below!

iOS 16

The newest operating system for iPhone introduces a huge update to the lock screen, and new sharing, communication and intelligence features that change the way users experience iPhones.

The lock screen becomes more personal, customisable and helpful with iOS 16. With a new multi-layered effect, the subjects of photos are set in front of the on the lock screen, creating a sense of depth. Users can also change the look of the date and time with expressive type stiles and colour choices. The lock screen also features widgets similar to Apple Watch faces, making it easier to get information at a glance (such as calendar events, weather, battery, alarms, and more).

Live activities has been introduced to help users stay on top of things that are happening in real time, such as sports games, workouts, ride shares, or food deliveries. Notifications have also been redesigned to roll up from the bottom screen so users have a clear view of their personalised lock screen.

iOS 16 also introduces updates to messages. Users can recall recently sent messages, recover recently deleted messages, and mark conversation as unread.

Wallet updates includes the introduction of Apple Pay Later, which provides US users with a secure way to split the cost of an Apple pay purchase into four equal payments spread over 6 weeks with zero interest or fees.

 

iPadOS 16

Major updates to iPadOS makes the iPad experience even more versatile and enjoyable. New features in Messages make it easy to begin collaborating and managing content across files, keynote, numbers, pages, notes, reminders and Safari, as well as third party apps. When changes are made to shared files, everyone can see updates at the top of the Messages thread. Similar to iOS 16, users can also edit or recall recently sent messages, recover recently deleted messages, and mark conversations as unread. Furthermore, users can begin a SharePlay session via messages so they can choose a SharePlay activity (like movies, TV shows, workouts, or games) and enjoy it together in sync while chatting via messages.

iPadOS 16 introduces Freeform, a new collaboration app with a flexible canvas, and gives users the ability to see, share and collaborate all in one place without worrying about layouts and page sizes.

Stage Manager: stage manager is the new multi-tasking experience that automatically organises apps and windows, making it easy to switch between tasks. Available on iPads enables with the M1 chip.

Notes: Notes allows users to create neater handwritten notes with the ability to automatically straighten handwriting, use iCloud passwords to lock personal notes, add screenshots in Quick Note, and use Smart Folders with filtering capabilities.

 

macOS Ventura

The latest version of the mac operation system has been dubbed ‘macOS Ventura’. The highlight in macOS Ventura is Stage Manager – a feature which gives Mac users an all-new way to stay focussed on tasks while seamlessly switching between apps and windows. Continuity Camera has also been introduced in the latest update, which uses iPhone as the webcam on Mac.

Updates to Spotlight includes a new design that makes navigation easier, with new features such as Quick Look for quickly previewing files. Live text allows users to search for photos by text inside images. To increase productivity, users can now take actions from Spotlight, starting a timer, creating new documents or running shortcuts.

Live text: Live text utilises device intelligence to recognise text in images across the system.

Accessibility tools: New accessibility tools include Live Captions for all audio content, type to speak on calls, text checker to support proofreading for voice over users, and more.

System Preferences: System Preferences will be called ‘System Settings’, and comes with a refreshed design that is easier to navigate

Security: macOS security introduces new tools make Mac more resistant to attack, including rapid security response that works in between normal updates to keep security up to date without the need to reboot.

 

watchOS 9

The latest version of watchOS introduces new watch faces to personalise and customise your Apple watch, plus a new health feature that allows users to track how long an instance of atrial fibrillation lasts. Workout App updates include richer metrics for measuring performance, Custom Workouts to create a structured workout that can include work and rest intervals.

New running metrics include stride length, ground contact time, and vertical oscillation can all be added as metrics on workout views.

 

Macbook Air

The all-new MacBook Air has been completely redesigned around the M2 chip. Measuring just 11.3mm thin and 1.2 kilograms, it features a durable aluminium unibody enclose that is built to last. The newest MacBook air has a 13.6inch Liquid Retina display, a 1080p FaceTime HD camera, a four-speaker sound system and up to 18 hours of battery life with MagSafe charging.

The MacBook Air also features two Thunderbolt ports, and a 3.5mm audio jack with support for high-impedance headphones. Furthermore, the Magic Keyboard features a full-height function row with Touch ID and a spacious industry-leading Force Touch trackpad.

The M2 chip takes the performance of MacBook air even further. For extensive workloads like editing complex timelines in Final Cut Pro, performance is nearly 40% faster than previous generations; applying filters and effects in apps like Adobe Photoshop is up to 20% faster than before, and even with a larger display and increased performance, MacBook air delivers the same great, all-day battery life MacBook Air fans have come to enjoy, with up to 18 hours of video playback.

Available in silver, space grey, midnight and starlight.

Filed Under: Blog Tagged With: apple, apple announcements, apple event 2022, apple keynote 2022, apple watch, apple watchOS, apple WWDC, apple WWDC22, iOS, iOS 16, iPadOS, iPadOS 16, M2, M2 chip, M2 processor, macbook air, macOS, macOS Ventura, Ventura, Worldwide Developers Conference, Worldwide Developers Conference 2022

iPads in Schools: What are the Benefits?

May 12, 2022 by eStormAus

Technological advancements impact the way we do a lot of things, including how we learn. Whether we like it or not, classrooms are embracing the digital era, replacing blackboards with smart boards and books with tablets. A favourite amongst educators and students, iPads are becoming increasingly integral to school curriculums. They boost student engagement, foster better learning outcomes and improve digital literacy skills. With over 15,000 education apps in the Apple App Store that cater to students of all ages and encompass knowledge across a variety of academic disciplines, iPads are a valuable resource that augment the learning experience. The iPad is now an essential tool in modern teaching, and it’s not hard to see why.

11 Benefits of Using iPads in Schools

1. No Student Left Behind

Every student is unique, learning at different paces and in different ways. It can be challenging, if not impossible, for educators to craft lessons that cater to each students individual needs. iPads can help bridge this gap, so no child is left behind. Through the use of iPad devices, students can engage with the content at their own pace, in a way that makes sense for them. For instance, visual learners may prefer to watch instructional videos, while others may choose to work through practice scenarios for a learn by doing approach. iPads are also designed for versatility, whether you choose to use the touch screen, or connect an external keyboard for a more traditional laptop setup. This allows students to work in a way that is comfortable for them, making it a great learning tool for students with special accommodations. The ability to customise the learning experience is one of the greatest advantages of using iPads in the classroom, as it ensures that each student has the support, tools and resources they need to succeed.

2. Easy to Use

iPads are one of the easiest technological devices to pilot. The operating system is far more simplistic and straightforward than laptops and desktop computers. They’re so intuitive that even toddlers can use them! The interactive multitouch display and all-in-one components make it easier for students to take a hands-on approach with their learning. For children who lack motor skills, this is particularly advantageous as they often have difficulty manoeuvring between a keyboard, mouse and screen.

3. A Library of Resources

Who needs the library when you have one at your fingertips? The days of digging through hundreds of books for information are over! Thanks to the internet, all it takes is a couple of taps and students have access to a plethora of Open Educational Resources (OER) including books, journals, videos and websites. The iPad itself enables students to download thousands of educational apps from the Apple App Store. Calculators, atlases, foreign languages…there’s an app for everything! Apple will even offer schools a generous discount on bulk purchases. A review of studies in the Journals of Computer Assisted Learning determined that the overwhelming majority of students who used digital tools showed positive gains in “literacy development, mathematics, science, problem-solving.” iPads are making it easier than ever for students to grasp challenging material, thanks to the never-ending fountain of knowledge in the palm of their hand.

4. Boosting Student Engagement

One of the greatest challenges educators face is delivering learning content in a way that engages their pupils. Thankfully, most students in this day and age are technologically savvy. Incorporating devices like iPads in the classroom can be a great technique in capturing their attention and bolstering student participation. In addition, instructional apps often ‘gamify’ education, mixing elements of learning, interactivity and fun together to create a more enjoyable educational experience. One study in Northern Ireland even discovered that children who used digital tools referred to learning as “play”. iPads also help support independent study, as students can test their knowledge through interactive quizzes and virtual flashcards.

5. Encourages Creativity

iPads have all the bells and whistles to help students unlock their creative potential. Filming and editing videos, designing graphic presentations, composing music, experiencing virtual field trips through augmented reality – iPads can facilitate new and innovating ways to complete educational tasks. The tablet design encourages students to take an active role in their learning, while also providing endless opportunities to express themselves creatively. The next generation of artists, designers and entrepreneurs might have learned it all on an iPad!

6. Portability

iPads are lightweight, compact and less cumbersome than the majority of other learning devices. Their streamline design make them particularly well suited to learning environments, as students can easily transport them between classes, to outdoor excursions or even on field trips! Beyond offering a truly mobile learning experience, iPads can also be used to encourage students to interact with their environment. There is a host of features that allow students to digitally capture, record and document their surroundings. Many educational facilities such as zoos, aquariums and museums also offer facility-specific content that may be accessed through iPads via an app or QR code.

7. Learning Digital Literacy

Digital literacy is becoming an essential part of our everyday lives. It is estimated that 87% of jobs in Australia now require some degree of digital skills. Exposing children to intuitive devices like iPads at any early age can help them build a foundational knowledge, allowing computing technology to become second nature and helping them adapt to any new technological innovations. While students may not have to worry about their careers quite yet, schools can still set them up for success. The next Steve Jobs might even be sitting in your classroom!

8. No More Paper

Looking to reduce your schools carbon footprint? Switching to a paperless, digital format is a great way for schools to help the environment. Every year over 4 million tonnes of paper is used in Australia, nearly half of which isn’t recycled. iPads eliminate the need for paper in the classroom, even art classes can be conducted on them thanks to the touch screen display! Going paperless can have a huge impact on the environment and help make our world cleaner and more sustainable for future generations.

9. Economical

Did you know that schools in Australia spend over $20,000 each year on paper? iPads can often be a more economical purchase, as they reduce the need to print, photocopy and file documents. Using less paper also saves time, as teachers spent up to 10% of their administrative time managing paperwork, with only 1% devoted to lesson planning, fundraising and professional development. Furthermore, digital versions of learning assets are often much better value for money. For example, e-textbooks are usually far cheaper than their physical counterparts and aren’t subject to wear and tear.

10. Better Organisation

Whether they’re in kindy or university, many students struggle with keeping their assignments, books and learning materials organised. Messy folders, lost sheets and forgotten homework are a nightmare for teachers to deal with. Thankfully, iPads can help consolidate all important documents, schoolwork, books and other learning materials into one place. Any lost files can also be located by simply using the iPads search bar. iPads also support a number of apps designed for note-taking, studying and keeping on track of assessment due dates. In addition, iPads can minimise the amount of manual grading and reporting required of teachers. Apps like Khan Academy and Kahoot offer a variety of lessons and quizzes for all ages on subjects like math, history, science and English. It records students results in real time, offering instant grades and feedback.

11. Direct Communication

Let’s face it, when it comes to communication a lot can get lost in translation. How many notes from teachers never make it home to parents? Whether intentional or accidental, the bottom line is that important communication can often be misplaced or overlooked. This is almost never the case with digital data. iPads can connect students, teachers and parents to ensure that all important communications are properly sent and received. The ‘I forgot’ excuse will simply no longer do! Teachers now have the ability to track their students progress and email any feedback, congratulations or concerns to parents in real time. Better access to grades and reports also helps parents get more involved in their children’s schoolwork. A study named “Parental Involvement in Education” found that when parents engaged more with their child’s education, it lead to reduced absences and better academic performance.

Conclusion

iPads are not only a great vehicle of education, but they help students gain confidence and skills that will help them thrive in all areas of life. They offer a diverse scope of learning structures and can support children who struggle with traditional teaching methods. Teachers also benefit from iPads, saving time, money and energy that could better be spent elsewhere. iPad devices can also lead to improved communication channels, better organisation and less time devoted to administrative duties. In addition, the wide range of apps, creative tools and easily accessible information aid children in developing interests, discovering new talents and following their dreams.

Filed Under: Blog Tagged With: apple classroom, apple education, apple educator, apple learning, apple school, apple teacher, benefits of apple, benefits of iPads, digital learning, digital skills, edu tech, education, education technology, iPads, learning, teacher

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

eStorm Service Centre Google Reviews

eStorm Service Centre
eStorm Service Centre
4.8
Based on 82 reviews
powered by Google
review us on
Beatrice Ndebele
Beatrice Ndebele
07:36 22 Sep 22
Fantastic service, was referred by Apple after MacBook developed a dark screen and wouldn’t turn off. I was informed of possibility to pay for diagnostic fee and expect to leave it for a fee days. I found the gentlemen friendly and accommodating. The service was prompt, fair subsequent charges. My MacBook had storage issues, I got a new laptop and they helped transferring my data. I will certainly be going back to them in future and I strongly recommend these professionals to anyone having issues with their devices.
julie farrell
julie farrell
06:28 02 Sep 22
2 nd time I have used this service. Needed new battery for my iphone 6 s in 2020. Then 2022 had a battery replaced in my iphone 7. Both times have been brilliant. Such a smooth and well organised service. The fellas at the counter on every occassion have been very patient and helpful. Thanks again, highly recommended
Gary wylie
Gary wylie
09:28 01 Sep 22
Quick service. Reasonable pricing .Would recommend for apple repairs
Joel Berry
Joel Berry
10:08 23 Aug 22
Awesome service, with a quick turn over. Genuine apple product dealers, most issues under warranty and or insurance will be covered free of charge or for a small cost.Highly recommended.
John Florez
John Florez
00:27 11 Jul 22
Very knowledgeable, friendly and 100% helpful. They explained all the options and their pros and cons to improve my iMac's performance. My computer is now running much faster with these upgrades. Great Work! Highly recommended!
Melissa Moana
Melissa Moana
05:16 13 Jun 22
i had no idea they were here awesome service way better than having to travel to carindale
Desiree S
Desiree S
07:52 27 May 22
I discovered this apple repairer by chance and now I recommend them to everyone. Great service and reasonable prices.
Emily Martin
Emily Martin
04:45 22 Feb 22
Dropped my MacBook in just shy of 3 years old with a battery issue. The team were very prompt in email response and with the computer. Dropped Saturday, said it would be ready Wednesday. To my surprise it was ready today (Tuesday) a whole day early. Even better they covered the replacement of the battery under warranty. Highly recommended!
Kyle PM
Kyle PM
07:59 01 Feb 22
Great and easy service. Much simpler to deal with than an Apple store for repairs. As an IT professional, will definitely be back if a staff member breaks their phone. (Let's be honest, they will).
Ricardo Sé Cestari
Ricardo Sé Cestari
23:30 02 Jun 20
Good professional service. Job well done and in a better than expected timeframe.
Kathryn Chee
Kathryn Chee
06:38 15 May 20
Phone came back good as new after a nasty cracked screen. Service was efficient although I did have to come back 24hours later as they didn’t have my colour iphone Instock - so maybe call ahead the day before if you want same day screen repair?
Stevan Kostantinovic
Stevan Kostantinovic
23:01 05 May 20
Very helpful and professional staff as they are Apple certified and did a great job replacing my sisters broken macbook pro screen.Always remember, you get what you pay for.
Ivan ZiHao Tan
Ivan ZiHao Tan
10:12 29 Apr 20
Effective and honest! It’s a nice and not busy place to get your IT stuff fixed. It is a bit out of the way but if you’re around west side, just go there. Traffic is smooth too!
Oliver Baumeister
Oliver Baumeister
21:38 06 Mar 20
Good service, quick repair of my MacBook Pro under warranty. 3 days to replace ‘top case’ (keyboard, trackpad, etc). Very satisfied.
Bradley Witham
Bradley Witham
01:43 03 Feb 20
Great shop. Highly recommended. Professional and very helpful staff. Did a great job for me. Will be back for sure - even though it’s over 1hr drive from my home!
Evan g
Evan g
01:49 07 Jan 20
Friendly and knowledgeable staff coupled with quick service even during a busy period.
Jaidyn Somerville
Jaidyn Somerville
22:59 01 Nov 19
Quick and professional service, I was told my MacBook would be ready in 2/3 business days and received a text to confirm it was ready two days later. Kept me informed with updates too. Defiently recommend these guys.
Mike C
Mike C
09:09 23 Oct 19
Friendly, professional staff. Perfect job replacing Macbook keyboard and screen, all with a very quick turnaround. Best Apple experience yet - highly recommended.
Mark Schulz
Mark Schulz
01:15 04 Sep 19
My second time using the service - first for an iPhone battery replacement and this time to replace the battery in a Macbook Air. Service is great. Will continue to use them into the future.
Jason O'Connor
Jason O'Connor
01:25 28 Aug 19
What a terrible experience dealing with eStorm in Springfield Lakes. After spending an hour on live chat with Apple last night they said that there was an issue with phone and to take it to one of their retail stores or to an authorised service centre. The closest to us was eStrom Service Centre in Springfield Lakes. We were booked in there by Apple who were 100% aware of the phone being out of warranty but due to the issue they were happy for it to be taken in. When my wife got there she was greeted by someone called Dallas who then proceeded to ask her for $40 as a diagnosis fee. At no stage were we made aware that there would be a fee even though Apple were aware of the phone being out of warranty. When my wife made him aware of that he said that it was their policy and there was nothing they could do about it. My wife turned around and walked out. I called to ask what the story was and Dallas said exactly what I have written above. No consideration about the fee, it was internal policy and not their problem that Apple didn't tell us about it. So disappointed at this experience and will never be using them again or would ever recommend them to anyone.
Kelley Knudsen
Kelley Knudsen
07:58 16 Aug 19
Great customer service, professional and polite, great results and fast turnaround!
Theticus _
Theticus _
00:08 30 Jul 19
Great service for Apple repair
Michael Bischa
Michael Bischa
03:27 31 May 19
Great service, let us know our options up front, found the solution and ordered parts in and completed the job in just 48 hours to get am important computer back up running. They are great!
Rob & Rebecca Ketelaars
Rob & Rebecca Ketelaars
19:43 20 May 19
Friendly staff. Fast service. Replaced the battery in my iPhone 6 in about 1.5 hours while I was shopping at Orion just across the road. Perfect.
Valentin Despa
Valentin Despa
08:33 09 May 19
Very professional, friendly and fast. I liked a lot that you get text messages with the status of your job. Thank you guys!
Anthony
Anthony
05:33 05 Feb 19
Staff was very friendly and professional, only took 2 business days for my keyboard to be repaired; excellent service and absolutely no hassle.
Kazi Nazmul Haque Shezan
Kazi Nazmul Haque Shezan
00:46 01 Dec 18
Just awesome experience. My apple watch 4 was not charging. I got a new apple watch in 3 days. They are very fast at resolving problem. The staffs are very helpfull
Helena Stibbard
Helena Stibbard
23:12 11 Sep 18
Exceptional service; Explained everything and was very helpful with advice for backing up files; MacBook Pro full keyboard replacement done in 2 days; very little downtime which was really appreciated. Highly Recommended
Tom Parke
Tom Parke
11:41 05 Sep 18
This is an easy five stars. I came into the store, explained my issue (I needed to have the entire screen of my laptop replaced). They told me they'd need to order in some parts, and the entire repair was finished in less than 24 hours. Superb team.
Sam D
Sam D
22:38 19 Apr 18
I took my MacBook Pro in to get the screen diagnosed and replaced through apple warrenty, it was completed very quickly and estorm did an excellent job. It was so much easier going to estorm over an apple shop, no wait time, plenty of appointment times and no pushing your way through noisy crowds. Will definitely be going back to them for any issues. Thanks!
James C
James C
02:50 22 Mar 18
Liam Sorensen
Liam Sorensen
21:18 31 Jan 18
Excellent service and very professional atmosphere. I had a couple of apple devices that needed fixing and to my surprise were covered under warranty and were replaced free of charge!! The team there are an awesome crew very welcoming and very understanding.Look forward to requiring your service again.
Dallas Rankin
Dallas Rankin
01:20 17 Oct 17
Wade
Wade
04:43 16 Oct 17
See All Reviews
js_loader

© 2023 · eStorm Service Centre