508-909-5961 [email protected]

Trojan infects macOS version of HandBrake

If you’ve downloaded the macOS version of HandBreak, a popular video transcoding program that converts multimedia files into different formats, checking your computer’s safety right now would be wise. Users who downloaded the program between May 2 and May 6 have a 50 percent chance of being infected with an Apple Trojan, based on an announcement on HandBrake’s website.

The post Trojan infects macOS version of HandBrake appeared first on Complete Technology Resources, Inc..

Trojan infects macOS version of HandBrake

If you’ve downloaded the macOS version of HandBreak, a popular video transcoding program that converts multimedia files into different formats, checking your computer’s safety right now would be wise. Users who downloaded the program between May 2 and May 6 have a 50 percent chance of being infected with an Apple Trojan, based on an announcement on HandBrake’s website. Here’s everything you need to know.

How to know if your device was infected

HandBrake can be downloaded from its official website and via mirror sites, or sites that provide the same content as the primary site. Infected downloads came from the mirror site, download.handbrake.fr, where the installer file (HandBrake-1.0.7.dmg) was swapped with a Trojan file, OSX.PROTON. This malicious file managed to trick Apple's security approval system into deeming it as safe and legitimate.

One way to find out whether you’ve downloaded the Trojan is to look for an “activity_agent” process in the macOS by accessing the Activity Monitor application. Another way is by checking whether the installer file’s checksums match HandBreak’s public codes. You can do this by comparing your downloaded file’s codes with the ones found on HandBreak’s checksums page. If they don’t match, that means you’ve downloaded an infected installer file. This all might sound like a lot of tech gobbledygook, but these checks are essential to knowing whether or not your system has been infected.

The damage

The OSX.PROTON is considered one of the nastiest Trojans today because it can spy on computers from a remote location. It can monitor your activities, upload malicious files on your computer, steal your password and confidential information by detecting keystrokes or taking screenshots, and take over your entire system by hacking your admin settings.

Downloading an innocuous video transcoding application is not typically considered dangerous. However, downloading apps from unofficial sources definitely poses considerable risks. In such a scenario, a backed up data can save your malware-infected computer.

Precautionary measures

Fortunately, Apple has taken steps to block further infections by releasing an update. If your system has been infected, however, it’s not too late. Follow HandBreak’s suggested steps in removing infected files to mitigate any damage. You should also take additional security measures such as changing passwords from a different device. Better yet, get professional help from IT security experts.

Every time you download an app from an unauthorized source, know that there are risks. If you’re a Mac user, download apps only from the Apple Store; and for Android users, only from the Google Play Store. And to gauge the safety of the apps you want to download, it always helps to read their reviews beforehand.

The HandBreak macOS malware is just one of many that are attacking vulnerable systems. With the help of our network security experts, you can thwart cyber attackers’ attempts to steal your sensitive data, hold your files for ransom, or spy on your online activities. Call us now so we can recommend suitable protections.

Published with permission from TechAdvisory.org. Source.

The post Trojan infects macOS version of HandBrake appeared first on Complete Technology Resources, Inc..

Read More

How good is your web browser’s security?

Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start.

The post How good is your web browser’s security? appeared first on Complete Technology Resources, Inc..

How good is your web browser’s security?

Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start.

Microsoft Internet Explorer (IE)/Edge

Despite their nearly identical logos, Edge and IE are actually different browsers with vastly different security strategies. Microsoft’s legacy browser, IE, isn’t even fully supported anymore. The most recent version still gets occasional updates, but experts don’t expect that to last for long. If any website or services claims to require IE to run, consider that a possible red flag.

Windows 10’s default browser, Edge, is a different story. This browser uses a technology called virtualization to create safe spaces to open and test links before granting a website’s programming code full access to a computer and user. Edge is based on the same software as IE, and the majority of its security improvements come from scrapping the browser’s customizability. If you’re okay with a fairly inflexible browsing experience, Edge is a good option.

Apple Safari

Safari is to Macintosh computers what IE is to Windows machines. Safari comes pre-installed on OS X and it has a long history of battling malware. Its security programming has been bested a number of times, but usually in research settings. The commonly held belief is that Safari just doesn’t have enough users to make it a profitable target. Apple has a history of responding quickly to malware, but we don’t recommend leaving anything to chance.

Mozilla Firefox

One of the earlier third-party web browsers to gain popularity was Firefox. Unfortunately, it just can’t keep up with the competition. In just one example, all the data from browser plugins is stored in the same location, which means a compromised add-on could easily gain access to the data stored in a password manager.

One of the reasons that Firefox continues to stick around is its commitment to privacy. All the other browsers on this list profit from analyzing (and sometimes selling) your browsing habits, while Firefox has cornered the market on privacy. Security and privacy should never be confused, but if the latter is more important to you and you aren’t installing third-party plugins, Mozilla is an OK option.

Google Chrome

Chrome is used by almost two-thirds of all internet users, and for good reason. Like Edge, Chrome also uses virtualization to create a quarantined space between the internet and your computer. Additionally, Google issues routine security updates to its browser more frequently than any of the others on this list. There is near unanimous consent among experts that Chrome is the safest of all web browsers.

Privacy however, is a whole other ball game. Pretty much every action you take using the Chrome browser is tracked, stored and analyzed. That’s not to say that your email isn’t encrypted or your saved passwords aren’t safe, it just means you have much less control over your internet identity.

Being aware of how your web browser stacks up against its competitors is only a fraction of the battle. WannaCry spread to uninfected systems through a gap in the Windows security framework, and most other ransomware infections prey on human error. What your business needs is a comprehensive security audit. For more information, call us today.

Published with permission from TechAdvisory.org. Source.

The post How good is your web browser’s security? appeared first on Complete Technology Resources, Inc..

Read More

Containers in Windows Server 2016

If you’re a business owner interested in utilizing virtualization technology, you have a lot of options for how to go about that. However, there is one virtualization vendor you’re probably already comfortable with: Microsoft. Read on for more information on the new and exciting features packaged with the Windows operating system.

The post Containers in Windows Server 2016 appeared first on Complete Technology Resources, Inc..

Containers in Windows Server 2016

If you’re a business owner interested in utilizing virtualization technology, you have a lot of options for how to go about that. However, there is one virtualization vendor you’re probably already comfortable with: Microsoft. Read on for more information on the new and exciting features packaged with the Windows operating system.

A brief history of Windows Server

The Windows Server operating system has been around for decades. As an advanced option for onsite servers, this operating system grants access to high-level access management settings, DNS customizations, and network configuration management. In fact, it’s such a complicated solution that Microsoft offers certification courses for each version of the operating system.

The most recent iteration of this operating system is Windows Server 2016 (WS16). Released on October 12th, 2016, Microsoft’s latest server software included countless improvements to its networking and user management features. Where it really shines however, is in the ways it handles virtualized computing.

Virtualization in Windows Server 2016

As with just about anything in the virtualization world, containers dominate the WS16 conversation. Containers use software to aggregate the bare minimum requirements that one application needs to run -- hardware, software and operating system -- and deliver that package across a network to computers that lack one or more of those requirements. For example, if you want to run a Mac application that requires a huge amount of processing power on a bare-bones Windows workstation, you can create a container with the necessary components on your server and let the workstation access it remotely.

WS16 users have access to two types of container deployments: Hyper-V and Windows Server containers. To the average business owner, the differences between these two options is minute, but what is important is Microsoft’s commitment to compatibility. If virtualization is important to you, choosing WS16 is a great way to ensure that you’ll be ready for whatever develops among the disparate providers.

Another great virtualization feature in WS16 is software-defined storage (SDS). It’s a complicated solution, but it essentially allows you to create hard drive partitions outside of the confines of hardware limitations. You can create a single drive by pooling storage space from three different servers, or you can create several separate drives for virtualized workstations to access.

Obviously, managing a server is no easy task -- regardless of whether or not you implement a virtualized infrastructure. That complexity comes with some compatibility issues; if your business relies on old software, it may not have been updated to run with WS16. For everything from creating a transition plan to managing your virtualized framework, give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Containers in Windows Server 2016 appeared first on Complete Technology Resources, Inc..

Read More

If an IT consultant told you that backing up data is one of the most important things for your technical team to do well, you’d probably nod in agreement. But what if they suggested that your dirty data requires cleaning prior to utilization? One simple adjective like “dirty” may give you pause, and there’s a […]

2016July20_BusinessContinuity_BIf an IT consultant told you that backing up data is one of the most important things for your technical team to do well, you’d probably nod in agreement. But what if they suggested that your dirty data requires cleaning prior to utilization? One simple adjective like “dirty” may give you pause, and there’s a handful of other terms about “data” that you may not recognize either.

Data is the lifeblood of the information age. It gets observed, collected, organized, and analyzed, and it allows businesses to compete for profit and prosperity. And it takes many forms, each one unique and often vividly-named by the addition of a simple descriptive word.

As such, we thought a short glossary was in order to help keep you current on a handful of new data buzzwords and how they might impact your business.

Small Data

If “big data” is about powerful machines, huge databases, and sophisticated analytics, its little brother “small data” is about people. Small data takes a scaled-down approach to data mining that relies on things like social media to acquire important information. Archiving it is also simpler since a complex central data warehouse isn’t necessary.

Slow Data

The notion of “slow data” may seem a bit counterintuitive since processing ones and zeroes means things are happening fast. Some information, however, is actually acquired more slowly. Take, for example, the polar ice caps, where things literally move at a glacial pace. Since this kind of data doesn’t require frequent analysis it is suitable for back-up in its native format in a secure data lake.

Fast Data

We’re guessing you knew this buzzword was coming next, and it’s probably exactly what you thought it would be. “Fast data” refers to data events that happen fast - as in thousands of times per second - such as financial tickers or electrical sensors. Being able to act on it without delay is critical, so storing it immediately in a stable, easy to access location is a must.

Dark Data

Put simply, “dark data” is nothing more than day-to-day operational data that’s not getting used. It often refers to unanalyzed information in the form of customer call records, competitors’ price fluctuations, or website visitor trends. It can also include data that’s no longer accessible, such as when a storage device becomes obsolete. Your business can bring some of this redundant, out-of-date, or hidden data into the light with software designed to tidy things up.

Dirty Data

And speaking of tidying, here we finally have “dirty data.” While not quite as provocative as, say, dirty dancing or a dirty martini, it does have a tendency to arouse anxiety. But it’s actually not harmful to your data warehouse; it merely refers to a data set prior to its being “cleaned,” such as a leads list that contains duplicates, spelling mistakes, or formatting errors. The key is ensuring it gets spruced up before moving it into production.

If this index of buzzwords has left you wondering about the ways that different types of information affect your specific business, we’ve got answers. Setting up and managing your databases, super-secure backup strategies, and a thorough understanding of information technology are what we provide, so call or message us today.

Published with permission from TechAdvisory.org. Source.

Read More