Phoenix Consultants Group is a software development firm specializing in creating data-driven software applications and websites.  Phoenix creates superior custom software products that deliver the tools necessary for business managers and owners to make informed decisions and manage their important data.

To learn more about the services we offer and our extensive client portfolio visit the tabs below.

Category: Application Development

American Privacy For Sale – 3 Ways to Protect your Internet Privacy – Allison Woolbert


Internet Privacy

Yesterday’s repeal of the FCC landmark Internet privacy protections law has opened a chasm that will now expose the privacy of every person on the web.  As the article in the Washington Post stated today –[The removal of the law] “freed Internet service providers such as Verizon, AT&T and Comcast of protections approved just last year that had sought to limit what companies could do with information such as customer browsing habits, app usage history, location data and Social Security numbers. The rules also had required providers to strengthen safeguards for customer data against hackers and thieves.”  

Why this is so important for each individual:

Imagine you are surfing the web trying to determine what medical illness you have.  As we know, thousands of people search Dr. Google each and every day to determine private medical matters.  Although Google tracks this information routinely, now your neighborhood ISP will have the power to record that search and begin accumulating potentially embarrassing information on you.   Let us say the condition is something you don’t want too many people knowing about.  A hostile individual or company then buys the information from the ISP “for marketing purposes” and then promptly tries to blackmail you, or exposes all the information all on the Internet.

There are many vulnerable populations that are now legally able to prey using your purchased privacy histories.  One of these populations could be individuals exploring if they are LGBT.  Another population would be the elderly.  Worse yet, the data is now will be stored in database repositories that can be data mined by anyone with access or who hacks into the databases.  This opens up an entire new world of personal espionage and data mining against an unsuspecting public.

The repeal of this law opens up an entire new angle of corruption and a deep invasion of every person’s privacy. Allison Woolbert stated “Internet Privacy laws and the protection for United States Citizens were just gutted by the Trump Administration and Congress.   An individual’s right to surf the web independently and anonymously has now become a commodity to sell to companies (even overseas companies in Russia, China, etc), Additionally, the protections that ISP providers were required to safeguard their customers has now been eliminated opening up your private information to hackers and thieves on the internet. “

The situation is not hopeless! Things you can do to maintain your privacy and safeguard your personal information.

Change your DNS Server

So, what is a DNS server?  In simple terms a DNS Server translates your IP Address ( is  The server has a name that is assigned to a specific IP address.  The entire internet works through DNS servers across the country.  When you go into a browser and type the name translates on the worlds DNS servers to the proper address and traffic is routed to that server.  If you are using your ISP provider’s DNS, you are giving them every address you visit .  Changing your DNS will give you more privacy for your online surfing.  You can find information on how to change your system’s DNS here. We recommend using OpenDNS or SafeDNS that does not give your information to your ISP so easily.

Use an anonymous browser like TOR.

So, what is a TOR browser and why would you want to use it?  The best answer to that question is found right on the TOR website.

“Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.”

In short, TOR allows you to block ISP’s from gaining the information to sell regarding your web surfing.

On smart phones change to Orbot (a TOR browser for phones)

TOR is also available for your phone via an application called Orbot.  Orbot is a smart phone version that stops your phone carriers from tracking your browsing history as well.


Who is Allison Woolbert

Allison Woolbert is the CEO of Phoenix Consultants Group.  With over 34 years of experience as an Information Technology systems innovator, Ms. Woolbert has demonstrated expertise in server management, disaster recovery planning, regulatory compliance, business analysis, client interactions, system architecture, technical writing, analysis, programming, database development, and support. Her unique abilities to bring cutting-edge technical expertise to each and every project–as well as her outstanding customer support–provides her clients with meaningful project outcomes, as well as the great service they deserve. Learn more about Allison Woolbert at



Stop Christmas Season Account Thieves- Keep your money safe!

Phishing scamsAs the holiday season has ramped up, so has the online hacking/phishing of accounts that are connected to your bank accounts, credit cards and debit cards.  Reports of the latest phishing for Amazon and Paypal are just two of the ongoing attempts that are used to steal money from your account.  Here are a few tips of how to avoid these phishing scams that you get in an email or text message.

In this day of information overload, consumers often quickly scan an article and make a quick decision.  Phishing scams target those users that don’t take special care or slow down to read the actual email.  The more advanced the email, the more text in the email, the more likely the internet user will simply not read what is in it increasing the chance that the user will click on the phishing link.

1. Do not click the link in the message at all costs.  Go to the actual website (, and log in through your normal login procedure.  Then verify the information that the email sent you is true or false.

2. NEVER put in your user id or password into a site that you are not absolutely certain is the actual site.  Short url’s / links are often used and are SIMILAR to the address as well as the page looks very similar to real site.

3. Slow down, verify that the address is correct, then put in your user id and password.

4.  Make sure you have solid virus protection installed.. Quite often, your virus protection can catch that a page is false and alert you that it is an unsafe page.  We recommend F-Secure Safe as a virus protection/web protection program to catch unwanted or hostile pages right in the browsers and email.

Multiple news outlets are reporting various twists on the latest phishing scams.  Here are a few stories to check out if you need some validation.

Phishing scams are easy to prevent if you stick with the simple 3 rules above.  Good luck and Happy Holidays!

Importance of a Webcam / Phonecam Cover – Security Alert

Hackers Phone Webcam HackI recently was reminded through the movie Snowden of the critical need to cover your webcams.  Most people leave their cameras open and running on their computers, laptops and phones.  In today’s world, this gives the perfect opening for a hacker or person who does not have your best interests at heart to see and hear what is going on in your life.  With the escalation of the cyber-war on the United States and abroad, it’s best to use every precaution that you can to protect yourself where easy and reasonable to do so.

Today, covering your webcam / phone cam is as important as locking your car door and your house.  With the ability of virtually any nefarious person being able to find your cam and spy on you is easily done with hacker software today.

A recent article on a hacker forum in September 2016 had the following to say when the FBI DIRECTOR was asked about his cam.

“During a conference at the Center for Strategic and International Studies, when Comey was asked that he still put tape over his cameras at home, he replied:

“Heck yeah, heck yeah. And also, I get mocked for a lot of things, and I am much mocked for that, but I hope people lock their cars… lock your doors at night. I have an alarm system. If you have an alarm system you should use it, I use mine.”

Comey went on to explain that it was common practice at the FBI and other government offices to cover computers and laptops’ webcams with tape or any physical cover.

“It’s not crazy that the FBI Director cares about personal security as well,” he continued. “If you go into any government office, we all have our little camera things that sit on top of the screen, they all have a little lid that closes down on them, you do that, so people who do not have authority don’t look at you, I think that’s a good thing.”

Comey believes that putting a cover over webcams is one of the “sensible things” that everyone should be doing to “take responsibility for their own safety and security.”"

So, where do I get a cover?

It’s not hard to get a cover.  They are available on Amazon for 10 dollars or often are sold in computer stores.  The other option is a simple piece of tape. I would recommend Painters Tape if you want to use a base style of tape.  This will block the camera and not leave a sticky residue when you need to remove it.

So why cover my phone camera?

Phones are the second easiest product to get into.  They are roaming around in a hostile world where routers, wifi and other equipment can intercept the information.  Many apps today open up the camera port without your knowledge or by fooling you into thinking it’s necessary when you install the application.  this makes it easy for hackers and government NSA types to simply turn it on and off when they need a look.

In the ever changing landscape of a cyber-war, simple things such as a small piece of tape might protect you or just make it harder to become a victim.

The new rule for 2016 – Lock your doors, secure your electronics.

CryptoLocker – Ransomware Virus Information

CryptoLocker (Trojan:Win32/Crilock.A)

Postby Fabian Wosar » Tue Sep 10, 2013 9:29 am

Hi everyone,Looks like there has been a new crypto malware on the loose for the past 2 – 3 days. The malware is referred to by its author as “CryptoLocker”. Microsoft adopted the name Crilock. Sample is attached. Here are a few notes that I gathered so far. I am currently sick with the flu so take these information with a grain of salt:

  • Connection with the C&C server is established through either a hardcoded IP (, which is down now) or if that fails through a domain generation algorithm located at 0x40FDD0 and seeded by GetSystemTime. At this time I found that and are both active and point to
  • The communication channel uses POST to the /home/ directory of the C&C server. The data is encrypted using RSA. The public key can be found at offset 0x00010da0 inside the malware file.
  • On first contact the malware will send in an information string containing the malware version, the system language, as well as an id and a group id. In return it receives a RSA public key. In my case this has been:
    -----BEGIN PUBLIC KEY-----

    The key is saved inside the HKCU\Software\CryptoLocker. If you want to capture the key on your system, the easiest way to do so is to break on CryptStringtoBinaryA.

  • The malware targets files using the following search masks:
    *.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai, *.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c

    The encryption used to encrypt files matching these masks is a mix of RSA and AES. Essentially the malware will generate a new AES 256 key for each file it is going to encrypt. The key is then used to encrypt the content of the file. The AES key itself is then encrypted using the public RSA key obtained from the server. The RSA encrypted blob is then stored together with the encrypted file content inside the encrypted file. As a result encrypted files are slightly larger than their originals. Last but not least the malware records the file it encrypted inside the HKCU\Software\CryptoLocker\Files key. Value names are the file paths where “\” has been replaced with “?”. I haven’t looked into the meaning of the DWORD value yet.

Feel free to add anything you find that I haven’t covered in my notes yet. At least from what I can tell so far, decryption without paying the ransom is not feasible.

VirusTotal results: … /analysis/

Emergency Virus Press Release – Ransomware Virus Alert

Phoenix Consultants Group

For Immediate Release – URGENT PRESS RELEASE



There is a new form of a virus going around called RANSOMWARE.  One of the Ransomwares is being called CryptoLocker(Trojan: Win32/Crilock.A) among other names  and comes in most cases through email as if you are receiving an INVOICE or a PAYMENT from UPS/FEDEX, from someone you know or a company you know. 

This type of virus specifically encrypts your local drive files and then puts half the encryption key in your computer in the registry, and the other half of the key is transmitted to a server that is offshore.  The malware then quickly encrypts files on your local drive(s) or shared drives/mapped drives.  THEN THE RANSOM IS DEMANDED!  Between $100 – $300 dollars is demanded that you remit OR a few weeks later, the files encryption key is destroyed.

There is NO possibility to decrypt your files without the key.  If the key is destroyed or the malware removed, then the files are lost forever.

Numerous individuals are having the problem and I have personally just witnessed a company that has lost over 6500 files due to this encryption Ransomware. 

It is imperative that if you should receive an email like this that you delete the email WITHOUT OPENING IT.  If for some reason you trigger the virus- IMMEDIATELY POWER OFF YOUR MACHINE.   DO NOT SHUTDOWN – TURN THE POWER OFF THE MACHINE!

More information about this Ransomware can be found at:

CryptoLcoker – Ransomware Virus Information –>


Please alert others by copying and pasting one of THESE LINKS: