E-Cigarettes Take a Turn Hacking Into Your Computer

Image

You want to move to a less harmful method of smoking, or attempt to quit, so you go out and purchase an e-cigarette (e-cig). The joy of making an investment to save you money, and be nicer to your body, you take your first puff. The joy, ease, and sensation of making a good choice.

Using up all the battery, there is no power adapter in site, and your phone is already plugged into the wall. You think, why not plug it into your computer? The next day you find pop-ups raging on your machine and, all of the sudden, you have another health issue to worry about. This time, it’s your computer!


How


It makes sense, every electronic contains some sort of data; firmware, software and/or storage. E-cigs may be the last device you would think contains data, but it needs to in order to run. It can work in many different ways and has been around for many years. Back in 2008, Samsung had alerted their customers that malware came on their installation disc for photo frames. This concept is called “BadUSB” and it manipulates the device at the hardware level. So, what are you going to do?


Choose the Right Manufacturer


Everyone wants to save some money and nobody wants repercussions because of it. Research your manufacturer and find out where you are getting your e-cig from. Reputable retailers are always a good start because they tend to carry the name brand products, or reputable off-brands. If you do choose to go to someone, or look used, research the brand you are purchasing and make sure any serial numbers are still intact. Some of the high-profile manufacturers are:

V2 Cigs

Vapor Fi

Halo Cigs

Apollo E-Cigs

Aspire

KangerTech

Innokin

Protect Your Computers


Not only can malware infect and lock-up your entire computer, but it can move throughout your network, as well. It is protection you should already have, and doesn’t come loaded with many Internet security packages. Having good software for detecting your threats is key on any work or home computer. Malwarebytes is always a good choice.


Check for Authenticity


Just because some things are labeled a brand, doesn’t mean they are that brand. We all have come across a counterfeit product, at some point, and you need to make sure that you don’t get one of those. Check the box for labels that are peeling off or discolored and that all the right markings are on the product. If you are unsure of what you are looking for, research the brand you are looking for and ask the manufacturer for identifiers.


Is your computer running slow or having programs pop up? Maybe your home screen changed on your Internet browser? These could be signs of malware infection and your computer should be serviced. If you have this problem, or are worried about this happening, give us a call at (800) 478-8105 or email us at [email protected]. Don’t let this become a problem, contact Remote Technology Services immediately.

Tired Of Empty Promises?

Contact Us Today And Book Your

Free Technology Consultation

With The Region’s Top IT

Company

Step One

Listen To What Our Clients Say:

Step Two
Fill in Your Information Below
Privacy is our policy. We may contact you from time to time with special offers but we will never sell or provide your information to anyone outside of our company.

GET IN TOUCH

1293 Professional Drive

Myrtle Beach, SC 29577

(800) 478-8105

(843) 222-6198

Privacy is our policy. We may contact you from time to time with special offers but we will never sell or provide your information to anyone outside of our company.

CONNECT

Call (800) 478-8105 today to schedule your free technology assessment

Remote Tech Services provides IT Support & IT Services for businesses in Wilmington, Sunset Beach, Calabash, Little River, North Myrtle Beach, Myrtle Beach, Florence, Conway, Longs, Georgetown, Charleston and throughout the Grand Strand.

All contents © 2021 Remote Tech Services, LLC. All rights reserved. | Sitemap

Designed by ULISTIC