508-909-5961 [email protected]

Microsoft released security updates for all versions of Windows

Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of Windows.

The post Microsoft released security updates for all versions of Windows appeared first on Complete Technology Resources, Inc..

Microsoft released security updates for all versions of Windows

Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of Windows. Read on to find out more about the update.

Windows Search

Microsoft discovered a flaw that hackers could remotely exploit to take full control over an affected computer. The hacker could then install programs, view, change or delete data, and create new accounts with full user rights. The August security updates address the vulnerability by fixing how your computer's memory interacts with Windows Search objects.

Windows Hyper-V

Another critical vulnerability is tied to Windows Hyper-V, a virtualization program. This flaw can be exploited when a server fails to properly verify an authenticated user from a virtual desktop.

For example, cyber criminals could exploit the vulnerability by running a malicious application on a guest operating system and cause the server to malfunction. The latest patch plugs the hole by correcting how Hyper-V validates guest operating system user input.

Microsoft Edge

Microsoft security specialists revealed that the Edge browser is exposed to a remote memory-corruption vulnerability. Hackers can exploit this by luring an unsuspecting user to open a fake website that contains malicious programs. The new security update addresses the issue by modifying how Microsoft Edge handles objects in memory.

These are just a few examples of the critical vulnerabilities addressed in the August updates. In total, Microsoft patched 48 vulnerabilities in six of its main product categories, including Windows, Internet Explorer, Edge, SharePoint, Adobe Flash Player, and SQL Server. If you're interested in all the security updates, check out Microsoft's official Security Update Guide.

As a Windows user, you’re probably used to seeing pop-up messages that implore you to install a new Windows update. Take heed: These patches and updates cost you nothing and can be installed in a matter of minutes. All you need to do is give your consent with a couple of mouse clicks, so there really is no excuse for not updating.

It’s important to update to the latest Windows version to ensure your computer and data are safe from security threats. If you have any questions about Windows updates or need help scheduling them, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Microsoft released security updates for all versions of Windows appeared first on Complete Technology Resources, Inc..

Read More

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.

The post Beware of a new Locky-type ransomware appeared first on Complete Technology Resources, Inc..

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of its predecessor.

Quick facts

According to a threat intelligence report, the email-based ransomware attacks started on August 9 and were detected through 62,000 phishing emails in 133 countries in just three days. It also revealed that 11,625 IP addresses were used to carry out the attacks, with the IP range owners consisting mostly of internet service providers and telecom companies.

How it works

The malicious email contains an attachment named “E 2017-08-09 (580).vbs” and just one line of text. Like the original Locky authors, attackers responsible for the new variant deploy social engineering tactics to scam recipients into opening the attached .doc, zip, pdf, .jpg or tiff file, which installs the ransomware into their systems.

When an unsuspecting user downloads the file, the macros run a file that provides the encryption Trojan with an entry point into the system. The Trojan then encrypts the infected computer’s files.

Once encryption is completed, the user receives instructions to download the Tor browser so they can access the "dark web" for details on how to pay the ransom. To retrieve their encrypted files, users will be asked to pay from 0.5-1 Bitcoin.

What you need to do

This ransomware variant builds on the strengths of previous Trojans. In fact, the original Locky strain made it easy for cyber criminals to develop a formidable ransomware that could evade existing cyber security solutions. This is why adopting a "deny all" security stance, whereby all files are considered unsafe until proven otherwise, is the best way to avoid infection.

Here are other tips to avoid infection:

  • Don’t open unsolicited attachments in suspicious emails. Alert your IT staff, and most importantly disallow macros in Microsoft Office unless they’ve been verified by your IT team.
  • Performing regular backups guarantees you never have to pay cyber criminals a ransom. If all other security measures fail, you can always rely on your backups, which protect your business not just from cyber crime-related disasters, but also from natural and other unforeseen system failures.
  • Train your staff to identify online scams like phishing. This and other similar ransomware strains take advantage of users’ lack of cyber security training.
  • Update your operating systems as soon as updates become available to reduce, or eliminate, the chances of your system’s vulnerabilities being exploited.

Even with a trained staff and the latest protections installed, your IT infrastructure may still have unidentified security holes. Cyber security experts can better evaluate your entire infrastructure and recommend the necessary patches for your business’s specific threats. To secure your systems, get in touch with our experts now.

Published with permission from TechAdvisory.org. Source.

The post Beware of a new Locky-type ransomware appeared first on Complete Technology Resources, Inc..

Read More

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.

The post Fruitfly spyware targets Mac computers appeared first on Complete Technology Resources, Inc..

Fruitfly spyware targets Mac computers

Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years.

Fruitfly spyware
The spyware, known as Fruitfly, was first discovered in January 2017, but Synack chief security expert, Patrick Wardle, discovered a more cunning variant last month.

Along with being able to track the victims’ names and locations, the spyware reportedly gives the hacker control over webcams, mice, microphones, keyboards, and notifies hackers any time the computer is in use. This enables hackers to take non-consensual photos, capture screenshots, track keystrokes, and record audio.

What’s surprising is this type of spyware is not built for financial gain or designed to steal government secrets. It’s used to spy on regular people. According to experts, the hacker developed the spyware for voyeuristic reasons. Collecting private data from users also suggests that hackers planned to set up more targeted social engineering scams.

So far, there have been only 400 confirmed Fruitfly infections, but considering how it has remained hidden for nearly decade, that number could be much larger.

While experts are still not sure who created the malware and how it is delivered, it’s best to follow security best practices like avoiding pop-up ads, banners and suspicious file attachments, using extreme caution when downloading free software, and update applications frequently.

Users should also install anti-malware software with spyware detection capabilities and perform full system scans as often as possible. New security patches have been released to detect and block Fruitfly variants, so you should keep your security software up to date at all times, too.

Surge in Mac Malware
Windows PCs are targeted more frequently, but a recent threat intelligence report by McAfee found that the Mac malware incidents have grown by 53% over the first quarter of 2017.

Hackers will likely uncover new vulnerabilities in the future, which means Mac users can no longer afford to think that their device doesn’t need strong security software and support from managed services providers.

If you’re worried about the security of your Mac, talk to us today. We offer comprehensive solutions that can defend against the new Fruitfly strain and a host of other cyberattacks.

Published with permission from TechAdvisory.org. Source.

The post Fruitfly spyware targets Mac computers appeared first on Complete Technology Resources, Inc..

Read More

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day.

The post Are all hackers out to do harm? Not so fast appeared first on Complete Technology Resources, Inc..

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat hackers.

A complicated history

Since all the way back in the 1950s, the term hacker has been vaguely defined. As computers and the people who worked with them became more accessible, the word was used to describe someone who explored the details and limits of technology by testing them from a variety of angles.

But by the 1980s, hackers became associated with teenagers who were being caught breaking into government computer systems. Partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it.

Today, several of those pioneering hackers run multimillion-dollar cyber security consulting businesses. So what should you call someone who uses their knowledge for good?

“White hat” hackers

Sometimes referred to as ethical hackers, or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck.

Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system.

“Black hat” hackers

Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns solely for causing damage. This may be anything from financial harm in the form of ransomware to digital vandalism.

Albert Gonzalez is one of the many poster children for black hat hacking. In 2005, he organized a group of individuals to compromise poorly secured wireless networks and steal information. He is most famous for stealing over 90 million credit and debit card numbers from TJ Maxx over the course of two years.

“Gray hat” hackers

Whether someone is a security specialist or a cyber criminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking.

Today, there are quite a few headlines making the rounds describing Marcus Hutchins as a gray hat hacker. Hutchins became an overnight superstar earlier this year when he poked and prodded the WannaCry ransomware until he found a way to stop it.

During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has been arrested and branded a “gray hat” hacker.

The world of cyber security is far more complicated than the stylized hacking in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t give small businesses a pass. If you need a team of experienced professionals to help you tackle the complexities of modern cyber security, call us today.

Published with permission from TechAdvisory.org. Source.

The post Are all hackers out to do harm? Not so fast appeared first on Complete Technology Resources, Inc..

Read More