The latest news in the IT security industry is all about Ransomware-as-a-Service (RaaS for short) which is a strain of malware designed to be easy to use, deploy, and infect victims. Ultimately, the goal of these viruses is to collect a ransom in exchange for decrypting the victims files. With RaaS, the host of the malware (where the servers live and are maintained) gets a percentage of the ransom – usually around 5% to 20% – and the remaining cash goes to the RaaS subscriber who actually deployed the virus.
There is a new Phishing scam that is impacting many Gmail users. This is a highly effective technique used to garner the victims account login information and then use their compromised account to further spread the scam to others in your contact book. There is no sure fire way to verify if your account has been compromised but if you are unsure, change your password immediately. Since there is no programatical way to prevent this sophisticated attack I ask that you spread the word, and share this article around to alert as many people as possible.
Just when you thought ransomware couldn????????t possibly get any worse, it has. A new ransomware has popped up called popcorn time. Popcorn time works the same as every other forms of ransomware with a twist. You can pay to have your files decrypted or you can decrypt it for free by infecting two other users. The required payment for this type of ransomware is usually 1 bit coin. Today, this equates to $810. That????????s quite a steep payment for your data and the hackers know this, so they offer you the chance to infect 2 other users.
In the wake of criticism and security concerns over Yahoo’s 2014 breach, the internet giant came forward in a statement yesterday revealing that they had been victims of an aparent hack that impacted over 1 billion user accounts. They go on to state that,
“For potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.
With the holidays rolling approaching it is not surprising to see people taking vacation days and running around town but hackers never take the day off. It is especially dangerous around the holiday season when it comes to public WiFi networks. Ensure you stay protected by following these tips to stay safe during the holidays. Be careful connecting to that WiFi network in the mall or airport this season since that network might not be legitimate. With the advent of mobile hotspots hackers are now taking advantage of the popular practice of retail stores providing open WiFi networks to their customers.
We’ve all seen this pop-up scam at one time or another. We are going to show you how to recognize a scam such as this. These days, with technology everywhere and information at your fingertips it’s much easier for scammers to play upon people’s behavioral patterns. This is the exact purpose of the, “Your PC is infected” pop-up scam where your screen gets frozen and a pop-up tells you that the only way to fix it is to call a phone number for support. This is so successful because people’s natural inclination is to call and get this fixed immediately. Whatever you do – DO NOT CALL THIS PHONE NUMBER! This actually happened to my uncle a while back and he made the mistake of calling the phone number. The fake support technician then installed a remote access tool on his computer after my uncle let him in. Long story short, they stole about $2500.00 from his bank accounts (since he saved his passwords in his browser) and the cost of reloading his workstation. Below is an example of this scam in action:
In business computing there are two standards when using Windows: Domain vs Workgroup environments. As a business owner or IT manager, it is critical to understand the benefits and drawbacks of both types of IT environments so that you can make the best possible decision about your company’s IT future. This is especially important when capacity planning, when expanding your workforce, or when planning major IT upgrades to your environment. You can end up spending more time and money in the long run without the correct IT infrastructure in-place.
If you don????????t know what BYOD is, don’t be concerned because you are not alone. BYOD stands for bring your own device. Many companies face the decision whether to allow employees to bring and use their own personal devices for corporate purposes. There are many benefits of a BYOD solution for your organization beyond enabling your mobile workforce.
What is The Quad Rooter Android Vulnerability?
A security flaw called the Quad Rooter has recently been discovered on android phones using the Qualcomm snap dragon chipset. Check point has found a set of 4 vulnerabilities collectively referred to as the Quad Rooter Android Vulnerability is estimated to affect 900 million android devices. A check point blog lists some of the most common devices that are subject to these vulnerabilities as the Black Berry Priv, Google Nexus 5X, 6, 6P, Samsung galaxy S7, S7 edge, LG G4, LG G5, LG V10, and many more. For your device to be exploited you would have to install a malicious application. Once you install the app, it then gains root access in order to hijack your device. With root access this app will steal all of your personal data, work data, and gain access to your camera or microphone. They can even track your location using the GPS. Pretty frightening stuff quite frankly!!