508-909-5961 [email protected]

Malware targeting MacOS steals bank logins

Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers.

The post Malware targeting MacOS steals bank logins appeared first on Complete Technology Resources, Inc..

Malware targeting MacOS steals bank logins

Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers. Take a minute to find out how it works so you can avoid making a costly mistake.

OSX.Dok isn’t new, but it has been improved

Originally, this Mac-based malware looked very different. When OSX.Dok was first reported several months ago, it could infect only older versions of the Apple operating system. Besides being relegated to OS X, it didn’t do much more than simply spy on the internet history of its victims. More recently, however, OSX.Dok was updated to target the newer macOS and to steal banking information.

How does it work?

Like so many malware programs today, this particular threat is distributed via phishing emails. Because the end goal is to acquire private financial information, these emails pretend to have pressing information about taxes or bank statements stored in attachments that actually contain malicious software.

Once any of these attachments are opened, OSX.Dok secretly broadcasts information about the computer and its location to the malware’s authors. Based on that information, hackers can redirect victims that visit banking websites to copycat URLs tailored to their language and location. Almost everything on the copycat sites looks exactly the same, but when you submit your user ID and password, they go straight to hackers.

Worst of all, the latest version of this malware seems to be incredibly advanced. It actively changes the way it hides itself and even modifies system settings to keep the computer from checking for operating system and security updates.

What can I do?

Security experts are still working on a way to combat OSX.Dok, but believe that it will remain a problem for some time to come. For now there are a few things you can do:

Never open attachments from people you don’t know personally, and even then be wary of anything you weren’t expecting.
Pay attention to little details. For example, copyright dates at the bottom of fake banking sites only went to 2013.
Look closely at the lock to the left of URLs in your address bar. Fake websites may have security certificates with names slightly different from those of the sites they mimic.

The best way to stay ahead of threats like OSX.Dok is by partnering with a capable IT provider. That way you can be sure that you have all the latest software and hardware to keep you safe. Even if something managed to slip through, regular audits are sure to find infections sooner than an overburdened in-house team would. Call us today to find out how we can protect you!

Published with permission from TechAdvisory.org. Source.

The post Malware targeting MacOS steals bank logins appeared first on Complete Technology Resources, Inc..

Read More

Backup and Sync: Google’s new business tool

Businesses that store and process large volumes of data need a highly organized storage and backup system. Although there are various ways to do this -- like keeping them on multiple devices or putting them on external hard drives and memory cards -- these are not very efficient and can also be misplaced.

The post Backup and Sync: Google’s new business tool appeared first on Complete Technology Resources, Inc..

Backup and Sync: Google’s new business tool

Businesses that store and process large volumes of data need a highly organized storage and backup system. Although there are various ways to do this -- like keeping them on multiple devices or putting them on external hard drives and memory cards -- these are not very efficient and can also be misplaced. Google’s new application solves this dilemma.

Seamless backups and syncing

Google’s new application, Backup and Sync, allows both PC and Mac users to seamlessly back up files, photos, and video files from various devices, SD cards, and USB drives in Google Drive or Google Photos.

To use the app, download and install it on your Mac or your Windows computer, sign in with your Google account, select your sync settings, and choose the folders you wish to back up. If you’re uploading photos or videos, you can choose between High or Original quality upload size. And if you want to upload photos only, you have the option to upload to Google Photos.

Once you’re done setting up, a folder will be created on your computer where files can be saved and accessible anywhere via the cloud. Any file dropped into this folder will automatically sync to Google Drive.

Benefits and downside

Although Backup and Sync is free, you can store only up to 15 GB of data. But if you want to exceed the limit, simply upgrade your Google Drive storage. That said, this new tool is valuable because it simplifies the backup process.

The app is especially beneficial to businesses because it’s easy to set up and requires minimal effort from users. It’s also useful to companies with remote work policies; employees can simply drag and drop files into their computer’s folder and access them anywhere from any device.

Backup and Sync not only gives your business greater flexibility by providing anytime-anywhere access to your files, but it also helps keep them safe and sound in the cloud. If you want to explore other productivity tools for your business, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Backup and Sync: Google’s new business tool appeared first on Complete Technology Resources, Inc..

Read More

Steer your Android clear of CopyCat

The number of new malware being developed each day is alarming. If you think hundreds or thousands are a lot, try nearly one million. One that is extremely cunning goes by the name of CopyCat, which emerged in 2015 and has already infected millions of Android devices.

The post Steer your Android clear of CopyCat appeared first on Complete Technology Resources, Inc..

Steer your Android clear of CopyCat

The number of new malware being developed each day is alarming. If you think hundreds or thousands are a lot, try nearly one million. One that is extremely cunning goes by the name of CopyCat, which emerged in 2015 and has already infected millions of Android devices. That said, here’s everything you need to know to steer clear of its attacks.

What is it?

CopyCat is a strain of malware that pretends to be a popular app on third-party app stores. Alarmingly, it has already infected more than 14 million Android devices around the world, with the majority of victims in Asia. However, users in the U.S. aren’t in the clear as 280,000 Android devices have been hit since 2015.

Why is it dangerous?

Once downloaded, CopyCat collects data from the infected device and downloads rootkits that cut off the device’s security system. From there, it can download fake apps and hijack your device’s Zygote, the launcher for every app on your phone.

With control over your Zygote, CopyCat will know about every new app you’ve downloaded and opened. This allows it to replace the Referrer ID on your apps with its own and send revenues for every ad that pops up on the app to hackers instead of the app’s creators. Sometimes it even throws in its own ads to increase fraudulent ad revenues, too. So far, there have been nearly 4.9 million fake apps installed on infected devices, estimated to make CopyCat hackers more than $1.5 million.

And while it’s mainly after ad revenues, it could easily compromise confidential data collected from your Android device.

How to protect your Android device?

The malware spreads through five exploits that hit devices running Android 5.0 and earlier versions. Luckily, Google was able to track down this malware to update Google Play so all exploits have been discovered and patched.

However, Android users on older devices should avoid downloading apps from third-party vendors just to be safe. And even if you’re using newer versions of the Android OS, we recommend you ensure your Play Protect function -- Google’s security system which consists of application scanning, browser protection, and anti-theft measures -- is activated. It should be on by default on your Android device, but you can check its status by opening Google Play Store app > Tap Menu > Play Protect.

In an ideal world, you’ll no longer have to worry about cyber attacks and all the damage they can cause. But for now, staying knowledgeable and informed is the best way to protect yourself. If you’d like to learn more about how to keep your Android devices safe, just give us a call. We’ll be happy to help.

Published with permission from Why SMBs should use Google Posts. Source.

The post Steer your Android clear of CopyCat appeared first on Complete Technology Resources, Inc..

Read More

Faster Amazon Web Services virtual desktops

Amazon Web Services (AWS) is one of the biggest names in virtualization and cloud computing. Its global network and intuitive platform have made it easier for customers to get more mileage out of their existing technology, and now AWS is offering even more powerful services.

The post Faster Amazon Web Services virtual desktops appeared first on Complete Technology Resources, Inc..

Faster Amazon Web Services virtual desktops

Amazon Web Services (AWS) is one of the biggest names in virtualization and cloud computing. Its global network and intuitive platform have made it easier for customers to get more mileage out of their existing technology, and now AWS is offering even more powerful services.

What are AWS virtual desktops?

If you have employees who need occasional access to lightning-fast workstations, hardware costs add up quickly. One way to tackle this problem is by providing users with low-end hardware that connects to a cloud service provider that delivers virtual desktops. These full-fledged desktops can be accessed over the internet and are far more cost efficient.

For quite some time, AWS’s “Standard” package has offered 24-hour access to virtual desktops with dual CPUs, 4+ GB of RAM and 130 GB of data storage for $43 per month. As long as you have a computer with an internet connection and are able to pay the subscription fee, you can run programs on an AWS virtual desktop that greatly exceeds your local machine’s capacity.

The WorkSpaces Power bundle

In June 2017, AWS introduced a new virtual desktop service for businesses that need a bit more capacity. The WorkSpaces Power bundle grants users access to machines with the power of four CPUs, with 16+ GB of RAM and 275 GB of storage.

Obviously, anything that requires such high-end hardware is going to be pretty technical work, but with the help of an experienced IT provider, you too can profit from the Big Data movement. AWS is advertising the Power bundle to developers, but it’s also great for businesses that want profitable insights from their huge databases.

The Power bundle virtual desktops have tremendous capacity, and that does come at a higher cost. The WorkSpaces Power bundle costs $78 per month for unlimited usage, or if you need it for only a couple days, $19 per month plus 68 cents per hour.

Faster data access for Standard and Power bundles

Regardless of whether you need the Standard or Power bundle, all AWS virtual desktops benefit from excellent data access speeds. The servers that host AWS cloud storage and AWS virtual desktops are in the same physical location, which means you don’t need to worry about lag when connecting the two.

Even if you’re “just a small-scale eCommerce site,” or a single-location office, every business can benefit from more affordable computing power. To find out what virtualization can do for your organization, call us today.

Published with permission from TechAdvisory.org. Source.

The post Faster Amazon Web Services virtual desktops appeared first on Complete Technology Resources, Inc..

Read More