News:

1st January 2026 - CTS Cybersecurity Support Site live

Main Menu

Recent posts

#1
Customers commonly fail to get PayPal refunds when their situation falls outside PayPal's formal protection rules or when PayPal classifies the activity as "authorised" or "not covered."

Main fraud/refund problem areas
Authorised-but-scammed payments (goods/services). If the buyer technically authorised the payment (clicked Pay, entered credentials) but was misled by a scammer, PayPal may treat it as a "buyer's remorse" or off‑platform scam and refuse a refund unless it fits their Purchase Protection criteria (item not received or significantly not as described from a merchant). Many investment, "money flipping," tech-support, romance, and spoof-site scams fall into this gap.

Payments sent as "Friends & Family." If a victim sends money using the personal/F&F option, the transaction is usually not covered by Purchase Protection, even if it was actually a scam. PayPal often denies refunds here because the product/service relationship is not formally recognised.

Late reporting beyond time limits. Buyers generally have 180 days to open a dispute for a PayPal transaction; card chargebacks often have around 120 days. If the victim discovers the fraud late (e.g., long-running subscriptions, slow-burn scams) and reports outside these windows, PayPal and the card issuer may both refuse refunds.


"Not unauthorised" decisions on account takeovers. Some customers report that even when they claim a transaction was unauthorised, PayPal's internal checks conclude that logins, devices, and IPs look consistent with normal use, so the case is closed as "authorised," leaving the victim without a PayPal refund. In those cases, customers are often advised to go via their bank or card issuer instead.

Scams exploiting seller protection rules. Certain refund/chargeback scams (e.g., "item not received" when the buyer actually got it, or "significantly not as described" abuse) can leave sellers without their money when a dispute or chargeback is decided against them, even if they believe it is fraud by the buyer. Gaps in proof of delivery, rerouted packages, or weak documentation can cause PayPal to side with the buyer or card issuer.

Overpayment and refund‑to‑different‑account scams. Fraudsters use stolen PayPal accounts or cards to buy goods, then trick merchants into "refunding" to a different account or method. When the real owner files a chargeback, PayPal reverses the original payment, and the merchant loses both the funds and the item, with no refund from PayPal to cover the loss.

Off‑platform / non‑PayPal delivery risk. If the transaction or communication moves outside of PayPal guidelines (e.g., paying a seller but shipping to an address that is not on the transaction detail, or agreeing to unusual return/refund methods), PayPal may deny protection because the seller or buyer did not follow the required process.

Typical reasons refund claims are rejected
Claim filed after 180 days or outside card chargeback windows.

Transaction classified as authorised with no clear evidence of account compromise.

Payment made via Friends & Family or as an ineligible transaction type.

Insufficient evidence for "item not received" or "significantly not as described" (no tracking, poor documentation, rerouted package, etc.).

Conflict between PayPal's policies and the card network's decision in a chargeback, where the merchant ultimately bears the loss.

Example scenario
A customer pays a supposed investment advisor via PayPal Friends & Family after being promised high returns. Months later, they realise it was a scam and ask PayPal for a refund. The request is denied because the payment was voluntary, sent as Friends & Family, and reported after the dispute window, so it does not qualify under Purchase Protection despite being fraudulent in substance.

If you tell me whether you're interested in consumer cases, seller cases, or regulatory/complaint angles (FCA, FOS, card scheme rules), I can break these issues down in a way that's directly usable for your purpose (e.g., internal risk report, legal case, or customer guidance).
#2
General Discussion Cybersecurity / O&O ShutUp++
Last post by AoD - Jan 16, 03:53, 2026, PM
Take control of your Windows privacy today with O&O ShutUp10++ – the free, portable tool trusted by millions to stop Microsoft from spying on you. This powerful antispy utility lets you disable telemetry, location tracking, Copilot+ Recall, and over 100 data-sharing features with just a few clicks, all without installation. [oo-software](https://www.oo-software.com/en/shutup10)

Why Choose O&O ShutUp10++?
Reclaim your data in seconds. No IT expertise needed – its intuitive interface color-codes settings (green for recommended privacy boosts) and offers one-click application of safe presets. Block keyboard logging, WLAN sharing with contacts, and unwanted updates while boosting PC performance by halting background services. [pcisdeadagain](https://www.pcisdeadagain.com/p/massively-improve-privacy-in-windows)

Key Features
- Zero-Cost Privacy Shield: Completely free for personal, business, or educational use; runs portably on Windows 10/11. [oo-software](https://www.oo-software.com/en/shutup10)
- Telemetry Terminator: Stops data sent to Microsoft, including Office telemetry and diagnostics. [oo-software](https://www.oo-software.com/en/protecting-your-security-securing-your-privacy)
- Security Enhancer: Disable app permissions, location services, and peer-to-peer networking risks. [oo-software](https://www.oo-software.com/en/shutup10)
- Safe & Reversible: Creates restore points automatically; export/import configs for easy management. [chipp](https://chipp.in/software/windows/oo-shutup10-review-tame-windows-data-hunger/)

Users rave: "Rock solid for hardening Windows privacy without breaking functionality." Download now from oo-software.com/en/shutup10 and decide what's "comfort" vs. your right to privacy. In a world of endless tracking, ShutUp10++ puts you in charge – secure your system today! [pcisdeadagain](https://www.pcisdeadagain.com/p/massively-improve-privacy-in-windows)

https://www.oo-software.com/en/shutup10
#3
Website that leaked thousands of ICE agents' personal information is down after huge 'Russian cyberattack,' founder says

A website dedicated to leaking personal information about Immigration and Customs Enforcement officers and Border Patrol agents was reportedly subject to a cyberattack that its founder believes may have originated in Russia.

Putin and Trump in partnership??? You decide!
#4
Eurail has confirmed customer information was stolen in a data breach, according to notification emails sent out this week. The European travel company, also known as Interrail to EU residents, initially posted the news on January 10, but affected customers, the number of whom was not disclosed, began receiving emails on January 13.

Passports, bank details compromised in Eurail data breach
https://www.theregister.com/2026/01/14/eurail_breach/
#5
A dataset claimed to originate from Instagram has been circulating on cybercrime forums in recent days. The breach, thought to date back to 2024, allegedly occurred as a result of an exposed API endpoint, which was abused to scrape data including usernames, full names, email addresses, phone numbers and partial physical addresses of 17 million users. After the leak appeared for free on a popular cybercrime forum last week, users began reporting a flood of password reset request notifications; however, Instagram later clarified that this was due to a bug in its password reset process and was seemingly unrelated to the leaked data.
#6
PrivaZer is a PC clean-up tool that rivals so many of the well known commercial solutions and best of all it is available for free.

So what exactly does it do?

The simplest answer is that it scans your hard drives for traces of files that can be harmful or that can slow your computer down. It then provides you with the option to remove some or all of those traces.

This is everything from cookies, to unwanted installation file leftovers:-

  • Traces of internet activity
  • residual traces of old files
  • traces of software use
  • cleans the registry
  • free's up drive space
  • keeps your PC fit and secure
  • removes invalid shortcuts

It does a lot more as well as that little lot!!

Best of all, you can schedule it to complete a clean-up anytime you like.
#7
General Discussion Cybersecurity / Firewalls
Last post by Administrator - Jan 14, 04:28, 2026, PM
Basic Questions

This section introduces the key ideas behind firewalls and explains why they're an essential part of keeping your computer and network secure.

What is a firewall?

A firewall monitors and controls network traffic—deciding what to allow and what to block based on rules you define. Think of it like a doorman at a nightclub, checking who's allowed in or out. 

Firewalls come in two main types: 
- Software firewalls – programs installed on your computer that filter traffic to and from that device.
- Hardware (or firmware) firewalls – standalone devices that sit between your network and the Internet, inspecting data before it reaches your system.

What are the benefits?

Connecting to the Internet can expose your computer to unwanted visitors and malicious activity. Without protection, an unguarded system can be compromised in minutes by automated attacks or hackers scanning for weaknesses. 

A firewall blocks these intrusions by filtering traffic and can also alert you to suspicious behaviour or automatically block further connections from attackers. 

Software firewalls provide extra control by managing which applications on your device can access the Internet. This helps in two key ways: 
- Protects privacy by preventing programs from sending data without your knowledge. 
- Alerts you to possible malware infections, as most malicious software attempts to reach external servers to operate effectively. 

Many software firewalls include extras like ad blocking, web content filtering, and parental controls. These features aren't essential—other tools can provide them—but they can add convenience or extra peace of mind.

Which firewall should I choose?

There's no single "best" firewall. The right choice depends on your priorities—simplicity, flexibility, performance, and how much control you want. More advanced firewalls offer detailed configuration and alerts, while others stay quietly in the background. 

Compatibility can also vary, so always check whether a firewall works well with your operating system and other security tools. Most vendors offer free trials, so it's wise to shortlist a few options, test them, and purchase only once you're confident they suit your system and comfort level.

How effective is the Windows firewall?

Microsoft's built-in firewall has improved significantly since its early days. Starting with Windows XP Service Pack 2, it became a capable tool for managing incoming traffic. Modern versions of Windows now offer much stronger protection and can monitor both inbound and outbound connections. 

(Older systems like Windows 95, 98, ME, and NT, however, include no firewall functionality at all.)

How can I test my firewall?

To check how well your firewall blocks external probes or attacks, try using an online security test service. Note that if you connect through a router, these tests usually measure the router's defences rather than any software firewall on your computer.
#8
SME Cybersecurity / Can you 100% trust your employ...
Last post by Administrator - Jan 13, 02:29, 2026, PM
While every employer would want to trust their employees, as your business organisation grows, it becomes harder to understand the motivations of that user.

While it is general accepted that employees work to receive a salary, the culture of the best companies, where employees feel valued, can be destroyed by one persons bad judgement.

Your employees are your first line of defence in the world of cybersecurity threats, but a mistake, or bad judgement can cause issues. Some, although rarely, are due to poor financial management resulting in an employee becoming compromised.

No matter the reason for unauthorised network traffic, stopping critical data from leaving your company and identifying dangerous events is a serious consideration.

Network Intrusion Detection System (NIDS) monitors networks for unusual traffic patterns, including suspicious internal user activity, by analysing deviations from established baselines.

How It Works
NIDS deploys at key network points to inspect all passing traffic in real time, comparing it against known threat signatures or behavioural norms to flag anomalies like unauthorized internal data exfiltration or policy violations. Anomaly-based variants use machine learning to detect unusual user behaviors, such as atypical access patterns from inside the network, distinguishing them from normal operations.

Key Distinctions
- Signature-based: Matches traffic to predefined attack patterns, effective for known threats.
- Anomaly-based: Profiles normal internal user traffic (e.g., volume, protocols, destinations) and alerts on deviations, ideal for insider threats or zero-days.

This approach provides visibility into internal threats without blocking traffic, unlike IPS systems.
#9
Cyber Essentials and Cyber Essentials Plus offer UK micro businesses a government-backed framework to strengthen cybersecurity affordably and effectively. These certifications protect against common threats like phishing and malware while building credibility with clients.

Core Benefits
Cyber Essentials provides basic controls—firewalls, secure configurations, access management, malware protection, and patching—that block up to 80% of common attacks, ideal for resource-limited micro businesses. Certification enhances trust, aids GDPR compliance, and can lower insurance premiums by demonstrating proactive security. It also unlocks contracts with public sector or larger firms requiring supplier certification.

Cyber Essentials Plus Advantages
This builds on the basics with an independent technical audit to verify controls are properly implemented, suiting micro businesses handling sensitive data or in regulated sectors. The audit offers higher assurance for tenders and stakeholders, with costs starting at £1,499 + VAT for micro firms (0-9 employees). Annual renewal keeps defences current against evolving threats.
#10
Home Users Cybersecurity / Removing Spyware and Malware
Last post by Administrator - Jan 13, 02:15, 2026, PM
For a typical home user on Windows, the easiest safe route is: run a reputable antivirus/anti‑malware scan (Defender or a trusted tool like Malwarebytes), remove what it finds, then reset browsers and change passwords; if problems persist, back up files and reinstall Windows.

Below is a simple, low‑faff workflow you can pass on to non‑technical family/friends; as a power user you can skip or harden steps as you like.

First actions

- Disconnect from the internet (pull Ethernet, toggle Wi‑Fi) to limit data exfiltration while cleaning.
- Note obvious symptoms (pop‑ups, redirects, unknown programs, AV disabled); this helps decide later if a full reinstall is needed.

Easy cleaning path (Windows 10/11)

- Uninstall junk: Control Panel → Programs and Features → remove toolbars, "optimizer/booster" apps, and anything recently installed that is not recognised.
- Empty Recycle Bin and reboot once to clear locked files and finish uninstalls.

- Run Microsoft Defender: 
  - Open Windows Security → Virus & threat protection → Quick scan, then a Full scan.
  - If malware persists or is "severe", run Microsoft Defender Offline (same menu → Scan options → Microsoft Defender Offline → Scan now), which reboots and scans before Windows loads.

- Run a second‑opinion malware scanner (one‑off, on‑demand): 
  - Malwarebytes Free for general malware/spyware and PUPs; install, run a Threat Scan, quarantine, reboot.
  - Optionally add "AdwCleaner" for adware and browser hijackers; it is lightweight and purpose‑built.

Browser and account clean-up

- In each browser: 
  - Remove unknown extensions; reset homepage, default search, and new‑tab settings.
  - Clear cookies/site data to kill tracking and adware sessions.

- Change passwords from a **known‑clean device** (PC/phone that is not misbehaving): 
  - Prioritise email, banking, shopping, social accounts, and anything reused.
  - Enable 2FA where possible to blunt any stolen credentials.

When to stop and reinstall

- Recommend a full Windows reset ("Reset this PC" → remove apps, keep files; or full wipe) if: 
  - AV/Defender will not run, or malware reappears after cleaning.
  - There are signs of rootkits or very persistent backdoors (drivers/services that keep returning).

- For a non‑technical home user, a clean reinstall with backups is often the **safest** way to be confident the system is trustworthy again.

If you say what OS/devices you specifically care about (Windows box, Android, iPhone, etc.), a more tailored, step‑by‑step flow can be laid out for each.