Sextortion Scam Uses Recipient’s Hacked Passwords — Krebs on Security

Written by Randy on . Posted in Fraud, Phishing, Randy's Blog, Security, WebRoot

Don’t trust inbound e-mails, phone calls, texts, etc.  People will say anything to trick you out of your money.  As a rule, change your passwords often.  Protect your passwords.  Don’t share them with anyone and don’t use the same ones on different accounts.  Keep your AV up to date.  We recommend WebRoot (ask us about it).  Cover your camera when not in use as a rule of thumb too. Read more about this scam at the link below. Source: Sextortion Scam Uses Recipient’s Hacked Passwords — Krebs on Security

Intel and AMD CPU Vulnerability / Meltdown and Spectre

Written by Randy on . Posted in Android, Antivirus, Apple, Chrome, Google, iPhone, Linux, Microsoft, Randy's Blog, Safety, Security, Tech, WebRoot

Teams of software experts have discovered a bug in both Intel and AMD processors that can allow malicious code access to confidential information.  Some patches are currently available, but not all aspects are fixable at the moment.  This issue is serious and effects Microsoft Windows, Apple MacOS and Linux as well as as mobile devices Apple iOS and Google ChromeBooks.  Basically anything with an Intel or AMD effected CPU. Keep up to date on your patches, Retire old Out of Service Operating systems.  Yes people are still using XP, 2003, etc. It’s time for them to go away finally.  No patches will come out for older OS making them just huge targets. Keep your OS and AV up to date or just ask us about RMM and WebRoot. Read more in the links below. https://www.pcworld.com/article/3245606/security/intel-x86-cpu-kernel-bug-faq-how-it-affects-pc-mac.html http://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/  

Some new Mac Malware found in Eltima Software

Written by Randy on . Posted in Antivirus, Apple, Randy's Blog, Safety, Security, Tech, trojan, WebRoot

If you have any Eltima Software installed on your Mac, you may have some Malware along with it.  This is another legitimate piece of software that Hackers have managed to sneak in some malicious code.  Remember recently CCleaner suffered the same fate. Look for the existence of any of these files: /tmp/Updater.app/ /Library/LaunchAgents/com.Eltima.UpdaterAgent.plist /Library/.rand/ /Library/.rand/updateragent.app/ Read the full article on the Register (link below) http://www.theregister.co.uk/2017/10/20/mac_os_reinstall_eltima_elmedia_malware/ This proves that you can do everything as securely as possible and still get compromised from a “Trusted” source. Safe computing, and ALWAYS have a reliable trusted AntiVirus software installed.  We Recommend WebRoot.

Massive DDoS attacks today.

Written by Randy on . Posted in Randy's Blog, Security, Tech, WebRoot

Massive DDoS attack today.  Were you effected?  If you used Netflix, Twitter, getHub, Amazon, Spotify, Reddit, Tumbler, PlayStation Network or many others chances are you might have noticed. Just what is a DDoS attack you may ask.  It stands for Distributed Denial of Service (DDoS) and is generally a technique for denying service to a resource by overwhelming it with requests.  Imagine you have a phone (you know you do) and you’re waiting for a call from someone.  But they can’t get through because you are getting dozens of calls.  Chances are much harder for the one you want to get though.   It’s sort of like that, but in this case imagine thousands or even millions of requests all at the same time. But how do they get the thousands or millions of requests you might ask?  There are computers connected to the internet that are infected with Malware.  Many don’t even realize it.  Could be yours is one.  This Malware can sit dormant on a machine unnoticed until it receives the instruction to reach out to a site on the internet and just do something simple, like load a page, or download a file or even just lookup a domain name.  These individual requests are nothing unusual and happen all the time.  It’s when they are coordinated by an attacker that the trouble begins.  Imagine one drop of water.  This is easy enough if you are in Syracuse (where I am) as its rained all day.  So one drop, no problem, a quick storm?  Inconvenient maybe.  But a downpour that lasts hours and you have flooded basements, closed streets, etc.  You get the picture. So what can you do?  For starters, use a good antivirus like WebRoot.  If you don’t have one ask us.  Don’t think that just because you have Linux or a Mac that you are immune.  You’re not.  Every system should have a reliable AV program on it and scanned regularly.  AV (AntiVirus) is not enough though.  You NEED to do your updates.  Not just Windows either, Programs like Adobe, Silverlight, Java, etc.  ALL have vulnerabilities that can be used on your computer when you are just innocently surfing the web.  YES, Macs too.  Less likely but it does happen.  So, avoid questionable links, sites and downloading ANY program without knowing its from a trusted source.  Not sure?  Use a tool like URL/IP Lookup tool here.  If it’s suspicious, skip it. It is believed that many of the bots in the current attacks are IoT devices (Internet of Things) and could be anything from a DVR, to a router or even a security camera, etc.  Many of these are considered low risk and are seldom updated by users. You can read more about todays DDoS attacks below: Network World: Extensive DDoS attack.. PCGamer.com: Massive DDoS attack.. BreakingNews.com:  DDoS Attacks Oct, 21st

Hospital pays $17,000 ransom to get access back to its encrypted files

Written by Randy on . Posted in Antivirus, Randy's Blog, Security, Tech Tip, WebRoot

We encourage all our clients to use WebRoot on all their networked machines.  It only takes one unprotected computer to compromise your entire network.  Read below on what Not to do.
A Los Angeles hospital has paid a $17,000 to cyberattackers who crippled its network by encrypting its files, a payment that will likely rekindle a fierce debate over how to deal with a problem known as ransomware.
Source: Hospital pays $17,000 ransom to get access back to its encrypted files