How Did They Take Over My Computer?

Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails.  Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal marketplaces.  Or sometimes you are tricked into giving them up on clever fake websites.  Phishing is one way that credentials are stolen.  The links in phishing emails often will direct the unwary user to the fake web page with the helpful web ...

Continue Reading →
0

The Growing Threat of Ransomware

The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes.  These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key.  I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.

ransomeware-infographic

What ...

Continue Reading →
0

Google Says: Bet You Can’t Hack A Chromebook

google-logoWe have been recommending the Google Chromebook to our clients for use as a dedicated online banking system.  The reason we like this platform even more than a Linux LiveCD boot disk is that because the Chrome operating system simply supports the operation of the notebook itself, and the Chrome browser.  That’s it.  There is not a way to install any programs to a ...

Continue Reading →
0

Windows Defender Gets Muscles

Windows10Tired of cyber-creeps kicking sand in your face at the virtual beach?  Microsoft wants to pump you up!!.  Businesses using the Enterprise version of Windows 10 will have the option of using Microsoft’s new enhanced Windows Defender Advanced Threat Protection.  In addition to providing end point security through Windows Defender, Defender ATP will connect with a cloud services based SIEM (security Information and Event Management) that will provide more protection, ...

Continue Reading →
0

Crypto-Ransomware Round-Up

cryptolockerSome of the nastiest exploits going around are the many variants of the CryptoLocker and CryptoWall malware that encrypt all your personal files and hold them for ransom.  Payment in bitcoin is required, in amounts starting at $200 and ranging upward to the $17,000 (400 BTC) that Hollywood Presbyterian Hospital just paid to unlock their files.  Or even more.  The amount will be whatever the attackers think they can extract from the victim.

  • The latest ...
Continue Reading →
0

OpenDNS Umbrella – Web Filtering and Security for SMBs

OpenDNSA great product for quickly and easily adding web site filtering to your organization is OpenDNS Umbrella.  OpenDNS was recently purchased by Cisco Systems.  OpenDNS is another featured security product that is part of the Managed Services program here at CIT.

The way OpenDNS works is that all of your traffic to and from the Internet is run through the proxy server cloud at OpenDNS.  In addition to protecting your organization ...

Continue Reading →
0

Bitdefender Rated Best Business AV

bitdefenderAV-Test rated Bitdefender Endpoint Security 5.3 the best anti-virus software for Windows client business users in its December 2015 test.  I mention this because this is the product that we deploy here at CIT for our managed service customers.  They rated a nearly perfect score.  Here are the particulars:

  • 100% effective against zero-day malware out of 140 samples used
  • 100% detection of 14,658 pervalent malware samples
  • Bitdefender affected performance negliably, adding a ...
Continue Reading →
0

If Only We Could Block Traffic From the Dark Web…

penetration_testTry to imagine how much bad stuff we could keep off our computers and networks if we could figure out a way to filter incoming traffic from the Dark Web.  Well maybe we can.

First, my apology in advance to my non-technical followers, this article may be a bit high level for the average user.

A post in Spiceworks from “Born2Frag”  goes ...

Continue Reading →
0

Phishing and Spearphishing – Don’t Take The Bait!

Phishing HookHere’s a provocative statement:  If you could just prevent your staff for clicking on links or opening attachments in phishing emails, 95% of your cybersecurity problems would be prevented.

As perimeter defenses and anti-malware software products have become more effective, cyber-attackers have turned to the phishing email approach as their number one favorite method for acquiring user names and passwords or gaining unauthorized access to computers on your network.   The spearphishing ...

Continue Reading →
0

Malwarebytes Tackles Cryptoware

th-paypage-quick-480This is hot off the press.  Yesterday Malwarebytes announced a beta of a new anti-crypto software product designed to stop CryptoWall4, CryptoLocker, Tesla, and CTB-Locker.  You can download the beta here.

According to Malwarebytes:

“Malwarebytes Anti-Ransomware monitors all activity in the computer and identifies actions which are typical of ransomware activity. It keeps track of all activity and, once it has enough ...

Continue Reading →
0
Page 3 of 5 12345