Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

and

APTs Targeting IT Service Provider Customers

10/03/2018 10:56 AM EDT  Original release date: October 03, 2018

The National Cybersecurity and Communications Integration Center (NCCIC) has received multiple reports of advanced persistent threat (APT) actors actively exploiting trust relationships in information ...

Continue Reading →
0

The Swiss Army Knife of Hacker-ware

Have you ever wondered just what an attacker can do once they gain access to your computer?  A 21 year old software coder is facing prison time for developing the ultimate Swiss Army knife of an “administrators'” tool-kit.  This tool was sold to over 6,000 people through an extensive affiliate marketing network.  Many of his customers were cyber-criminals who used ...

Continue Reading →
0

Malware Remediation Comparison – Malwarebytes vs. Hitman Pro

Often, when I am dealing with a malware-infected computer, I find that the malware has compromised the currently installed anti-malware product, and simply scanning the computer with the installed software does not work.  When that happens, my go-to choice for malware remediation has been to download and install a copy of Malwarebytes, and run scans until the Malwarebytes reports the system is clean.

In the course of research for another article, ...

Continue Reading →
0

Multi-Platform Malware

This comes under the heading of “it was inevitable.”  There is a new malware product that runs effectively on both Windows and Linux systems.  Since OSx looks a lot like Linux under the hood, can a Win/Lin/Mac triple-threat be far away?  Called “WellMess,” this malware takes advantage of the dual platform capabilities of Google’s Golang programming language to work.

WellMess malware ...

Continue Reading →
0

Six Simple Malware Removal Tips Anyone Can Use

You think you just got a malware infection on your computer, but you’re not sure, and you aren’t sure what to do.  Take it to the Geek Squad or another qualified IT shop?  If only there were simple things you could try on your own.  The good news is there are, and we will show you some of them today.

  • So it seems you might have a malware issue.  These are ...
Continue Reading →
0

Ten Signs of a Malware Infection

I just finished helping a client with a strange issue that I thought might be malware related, and we successfully fixed his issue by email, without having to meet or even set up a remote support session.  And it occurred to me that I have not covered the issue of malware remediation in ages.  Since this can be a fairly easy DIY project for most computer users, I thought a ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  ...

Continue Reading →
0

How to Block Malware on Small Business Networks

Most of the small business clients I work with do not have a huge budget for a cybersecurity program, and something like a managed security service program (MSSP) is beyond their reach.  They have money for a firewall, and endpoint security, but that is about it.  Sound like your business?  Then read  on.

There are eight simple, free or low-cost things that small business IT professionals or IT support providers can ...

Continue Reading →
0

Why Would Someone Hijack My Website?

If you own a small business, you have a website.  Would you be surprised to learn that your site is a top target of cyber-criminals?  Most people believe their business is too small and insignificant to be interesting to attackers, but your website is valuable to them precisely because it is small.

What makes a small business website an attractive ...

Continue Reading →
0
Page 6 of 13 «...45678...»