June 18, 2014

Police Log June 19: Phone scam in ChesCo, accidents, thefts and an overdose

• Chester County Sheriff Carolyn Bunny Welsh has issued a warning about a phone scam. In various parts of Chester County, residents are being targeted by bogus phone calls and threatened with arrest by deputy sheriffs on a bench warrant for failing to report for jury service in Chester County Court. Sometimes they identify themselves as a member of a “Warrant Department.” In the calls, threats are made that a bench warrant will be served unless the person answering the phone goes to a convenience store or pharmacy and purchases a greendot MoneyPak card in amounts ranging from $300 – $1,500, and then calls the caller back with the MoneyPak card numbers. This is a scam, the sheriff said. “All residents should be warned to never share sensitive information with anyone you don’t know. Unfortunately there are criminals who use many types of scams and frauds to take advantage of individuals and families. We need to provide all information possible to protect our citizens.”

PSP Logo• State police are investigating thefts at two different restaurants on June 16. Reports said someone stole electronic equipment from a shed at Pescatore’s on Route 202 and 30 minutes later, numerous items were stolen from an outdoor storage area at the Outback Steakhouse in the Concordville Town Centre.

• A 20-year-old man from Thornton was cited after his car left the proper lane of travel while negotiating a right hand curve on Kirk Road in Concord Township. The driver, identified as Joseph J. Clark, was not injured according to a report. Police said Clark was driving northbound but crossed into the southbound side of the street. He hit a wooded portion of the roadside before hitting a boulder. According to the report, he left the scene on foot, but witnesses called police who were later able to contact him by phone. Police said he denied being involved in a crash. The incident happened June 14 at 5:44 p.m.

• State police cited Jeanne A. Seeds, 68, of Media when she was involved in a one-car accident on Route 1 between Scott and Cheyney roads on June 13. A report said Seeds was distracted when her cell phone rang. She glanced at the phone and the car drifted off the road, according to police. No injuries were reported. The accident happened at 8:39 p.m.

• A Chester Springs woman was cited for driving at an unsafe speed after she rear-ended a vehicle on Route 202 in Chadds Ford Township. Police said both vehicles were traveling north near Dilworthtown Road when the lead car slowed down, but Maddison K. Vanluvanee, 23, was unable to stop before hitting the other vehicle.

• Police are investigating the theft of tools and electronic equipment from a work vehicle that was parked at the Wyndham Garden Hotel on Route 1 in Concord Township shortly before 8 a.m. on June 12. No other details were released.

• No injuries were reported in the aftermath of a two-vehicle accident on Route 202 near Carter Way in Concord Township on June 12. Police said the accident happed at 8:43 a.m. when Todd A. Hoernemann, 48, of Wilmington, failed to slow down in time when a vehicle in front of him slowed to make a right hand turn.

• State police filed drug charges after responding to a call about a heroin overdose. A report said Justin Ray Beardsley, 21, was found unresponsive at a property on Mill Race Place. Drugs and paraphernalia were in plain sight, the report said. Beardsley was transported to Riddle Hospital.

• Edward E. Gorrell, 35, of New Castle County, was arrested for DUI after a traffic stop on Naaman’s Creek Road, a police report said. The stop was made at 2:29 a.m. on June 9.

About CFLive Staff

See Contributors Page https://chaddsfordlive.com/writers/

Police Log June 19: Phone scam in ChesCo, accidents, thefts and an overdose Read More »

Antivirus and today’s security reality

It seems like a new virus or other security threat is being announced every day.  Heartbleed. Cryptolocker.  And they seem to keep coming back, bigger and badder than before.  It’s enough to want some of us to stop using the Internet altogether and to stay offline for good!  But that is probably unrealistic for many of us who depend on the Internet for day-to-day communication, such as email and social media, online banking, shopping, and more.  So what is the average computer user or business supposed to do?

DETECTION & PREVENTION, OR GHOST HUNTING?

Antivirus is dead – said a Brian Dye, Symantec’s senior vice president for information security, for a The Wall Street Journal interview.  Today’s security reality is that antivirus (AV) programs are just one piece of the puzzle.  According to security provider FireEye, 82 percent of all malware it detects stays active for a mere hour, and 70 percent of all threats only surface once, as malware authors rapidly change their software to skirt detection from traditional antivirus solutions.  “The function signature-based AV serves has become more akin to ghost hunting than threat detection and prevention,” the firm says.

According to McAfee – a leading antivirus – 150,000 new pieces of malware are released every day around the world.  To understand how that affects you, you need to understand how antivirus programs work.  Typically, a new virus is released in the world.  Somebody will get infected.  The infection is then reported to the main antivirus companies and the virus payload is analyzed.  The antivirus companies then release security patches, which are pushed down to your computer – hopefully at least daily – but depending on your settings could be weekly or longer.  This delay causes traditional antiviruses to detect only 45% of all attacks, according to Symantec.

A good security program should comprise of a trusted antivirus program but, in addition, have tools that protect against spam and phishing attempts, malicious websites, and social media threats.  Many antivirus programs now have an internet security product that addresses those issues.  Does yours?

ANTIVIRUS OPTIONS

According to PC Magazine (April 2014), three products share the Editor’s Choice honor for best overall antivirus based on five important categories: 1. detection, 2. cleaning, 3. protection, 4. false positives, and 5. performance.: Bitdefender Antivirus Plus (2014), Norton AntiVirus (2014), and Webroot SecureAnywhere Antivirus (2014).  With its impressive sweep of the independent labs, Kaspersky Anti-Virus (2014) is another very good choice.

AVG AntiVirus FREE 2014 is PC Magazine’s current Editors’ Choice for free antivirus.  It shares the top score on malware blocking test with four others, among them Avira Free AntiVirus (2014) and FortiClient 5.0 (also free). If you can’t even get antivirus installed, give Malwarebytes Anti-Malware 2.0 a try. It’s PC Magazine’s Editors’ Choice for free, cleanup-only antivirus.  Source: http://www.pcmag.com/article2/0,2817,2372364,00.asp

In other words, antivirus isn’t quite dead, despite the bold words of Symantec’s VP—it’s still important to have AV protecting your PC.  Only now, AV is just one of many tools needed to keep your computer safe against increasingly savvy attackers.

EBERNIE RECOMMENDS WEBROOT

eBernie, Inc. recommends Webroot as a comprehensive security package, for consumers and businesses of all sizes.  Webroot SecureAnywhere® Business – Endpoint Protection offers a revolutionary approach to malware protection.  It brings together Webroot’s innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else.

Using the world’s lightest and fastest endpoint security Agent, scans are unbelievably fast (normally less than 30 seconds) and they never slow end-users down.  And, because detection is truly real-time it is always up-to-date, and provides protection against all the latest threats and attacks without any of the hassles of managing daily signature or definition file updates.

Don’t depend on definition files.  Your computer actively checks the program’s cloud database every time you got to a website or open a file.  That means that all Webroot users are contributing in identify new viruses almost instantly.  Also, when a new suspicious file is detected the Webroot client on your computer monitors everything that process is doing. If it is determined that it is malicious, Webroot will automatically roll back any files affected.  For e.g., if a client is infected with a new variant of Cryptolocker and the virus encrypts your documents, Webroot will restore your computer to before the encryption occurred – including files, registry settings, etc.

WHAT ABOUT APPLE COMPUTERS?

It’s true that malware attacks are less common on the Mac® OS X platform than on the PC, but that doesn’t necessarily mean that PCs are more susceptible than their counterparts, according to Webroot.  Tony Bradley, a writer for PCWorld, argued in May 2011 that “the real reason that Macs aren’t plagued by more malware is that the platform represents such negligible market share that it’s not worth the effort for malware developers.”  However, Mac-targeted attacks are occurring , perhaps even on the rise, as the popularity of Apple grows.  Many of the AV programs mentioned in this article also support Macs.

“If you are running your computer without an antivirus program, it’s like driving a car without a seat belt,” stated Bernie Orglmeister, President and Senior Project Engineer, eBernie, Inc.  “With no AV, you are essentially exposing all your data – including customer data or your personal banking or credit card information — to a variety of threats.  In addition, if your business is held to a higher standard by regulatory bodies which require compliance by HIPAA or SOX, for example, then you need to stay on top of these security issues – for your benefit and for the benefit of your customers.”

Please note, there are many good AV programs available but none will keep your computer or device 100% safe.  Just because your program of choice may not be included in this article, does not mean it’s not a good program.  In fact, we encourage you to comment below on your experiences – what’s worked, what hasn’t?  If you would like to review the AV option(s) for your business environment, or are currently experiencing a security threat, please contact eBernie, Inc. or your favorite IT provider.  Subscribe to Webroot by contacting eBernie, Inc. by June 30, 2014, and receive discounted rates.  Call 610.590.5006 x1 or email info@ebernieinc.com.

ABOUT US 

eBernie, Inc. is an Information Technology (I.T.) consulting firm dedicated to providing professional services or strategic solutions for businesses and organizations, from one to 100 employees, since 2007. You can trust us to deliver the level of managed services your business needs, ensuring a stable and secure I.T. environment.  Our proactive services model will eliminate business disruptions and give you peace of mind knowing that your networks are secure and operational. As a result, you get to focus on your core business while we handle the technology challenges and opportunities.

Contact Us Today:  Bernie Orglmeister, President & Senior Project Engineer: 610.590.5006 x1 or info@ebernieinc.com “My name is in the company name, so it’s important that our clients – no matter how big or small – receive the top-notch service that I’m proud to put my name behind.”

 

 

 

About Bernie Orglmeister

Bernie Orglmeister is President & Senior Project Engineer at SkyViewTek An Information Technology (I.T.) consulting firm, SkyViewTek is dedicated to providing professional services or strategic solutions for businesses and organizations, from one to 100 employees, since 2007. You can trust us to deliver the level of managed services your business needs, ensuring a stable and secure I.T. environment. Our proactive services model will eliminate business disruptions and give you peace of mind knowing that your networks are secure and operational. As a result, you get to focus on your core business while we handle the technology challenges and opportunities. Contact us at 610.590.5006 or info@skyviewtek.com.

Antivirus and today’s security reality Read More »

College bound, college grads and dean’s lists

College Bound

• Thomas Jackson II, of Chadds Ford, has been accepted to and plans to attend Lycoming College for the fall 2014 semester. Jackson is the son of Dawn and Jon Jackson. A student at Unionville High School, he is on the men’s lacrosse team. He is the recipient of the Applestone Foundation Scholarship, the Lycoming College Third Century Scholarship and the Lycoming PFEW Scholarship.

College Grads

• Chadds Ford Resident Ciara Pigliacampi Graduates from Messiah College. She graduated magna cum laude with a degree in psychology.

• Lauren Sasso of Chadds Ford graduates from James Madison University. She graduated with a degree in sociology

• Four Chadds Ford residents graduated from Widener University in May. Salvatore Faia earned a bachelor of science degree in mechanical engineering; Joanna Sirusas a bachelor of science degree in nursing; Morgan Dougherty earned a doctoral degree in physical therapy and Kristin Quillen received a master of science degree in taxation and financial planning.

• Danielle Nicole Robinson of Chadds Ford Summa Cum Laude with a degree in accounting from James Madison University.

Dean’s Lists 

• Alexandra Dougherty of Chadds Ford, a senior majoring in psychology, excelled during the Spring 2014 semester, earning a spot on the Dean’s List at Hofstra University.

• Seven Chadds Ford residents made the Dean’s’ List at the University of Delaware during the last semester. They are Dakin Bond, Samantha DiSabatino, Kenneth Eland, Jonathan Ellsworth, Julie Henk, Robert Lyons  and Nicolas Taylor.

• Peter Brookes and Kris Urdaneta of Chadds Ford  made the Dean’s List at Widener University.

About CFLive Staff

See Contributors Page https://chaddsfordlive.com/writers/

College bound, college grads and dean’s lists Read More »

Scroll to Top