Microsoft Issues Excel Security Alert

A well-known hacking group called TA505 is weaponizing Microsoft Excel to spread a malware payload. Researchers from Microsoft Security Intelligence have this week taken to Twitter to warn users to be alert to the ongoing campaign.

Forbes.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your business from these attacks?Join the conversation on our Facebook Page!

Patch the top ten software flaws used by crooks

The most commonly exploited vulnerabilities – and the technology they target … patch these now!  Adobe Flash Player, Microsoft Internet Explorer, Microsoft Office, Adobe Flash Player, Microsoft WinRAR

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you patch your apps?Join the conversation on our Facebook Page!

Someone is uninstalling malware from infected PCs

A mysterious entity appears to have hijacked the backend infrastructure of the Phorpiex (Trik) botnet and is uninstalling the spam-bot malware from infected hosts, while also showing a popup telling users to install an antivirus and update their computers… “This is truly happening,” Yaniv Balmas, Head of Cyber Research at Check Point …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Who do you think is doing this?Join the conversation on our Facebook Page!

This simple malware still plagues one in 10 Mac users

A prolific trojan campaign that tries to trick macOS users into downloading malicious software remains the most common malware Mac users are likely to encounter.  The Shlayer malware first emerged in early 2018 and is predominantly used to install malicious adware on users’ systems, with the intention of generating revenue from pop-up adverts and links that relentlessly appear in the victim’s browser.  Now, two years on from Shlayer’s arrival, figures from Kaspersky Lab reveal that the malware has targeted over one in ten macOS users, making it the most widespread macOS malware threat.

ZDNet.com click the link to read the rest of the story. Get our free tools here.

How do you protect your Mac devices?Join the conversation on our Facebook Page!

Beware of this sneaky phishing technique now being used in more attacks

Security company researchers warn of a large increase in conversation-hijacking attacks. Here’s what they are and how to spot them.

ZDNet.com click the link to read the rest of the story. Get our free tools here.

Has your team received training in how to spot these attacks!Join the conversation on our Facebook Page!

600 million+ Android users continue to be charged for deleted apps

A new set of “fleeceware” apps appear to have been downloaded and installed by more than 600 million Android users. … “Fleeceware” are apps that abuse the ability for Android apps to run trial periods before a payment is charged to the user’s account. … Researchers discovered that some Android app developers didn’t cancel an app’s trial period once the app is uninstalled and they don’t receive a specific request from the user. …

ZDNet.com click the link to read the rest of the story.

Have you downloaded “fleeceware” on your Android phone!Join the conversation on our Facebook Page!

 

Iranian Hackers new attacks to breach the US Grid

Given the the threat of Iranian counterattacks, infrastructure owners should be aware of [these new campaigns] and they should consider not just new attempts to breach their networks but also the possibility that those systems have already been compromised. “My concern with the Iran situation is not that we’re going to see some new big operation spin up,” Lee says. “My concern is with access that groups might already have.” …

Wired.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing for this?

Join the conversation on our Facebook Page!

Hackers Demand Ransom From Medical Patients After Breach

In a troubling new ransomware twist, hackers are demanding patients of Florida provider Richard Davis, MD pay a ransom to prevent the release of their personal information following a breach of the clinic’s server. … Patients are urged to share the notification with any known patients of The Center…

ampproject.org click the link to read the rest of the story. Our FREE Tools can help!

If hackers did this to your business, could you survive it?

Join the conversation on our Facebook Page!

What will happen January 15, 2020 – to your Windows 7 PC

Microsoft has been warning Windows 7 users for the past year-plus that after January 14, 2020, they’ll get no more security updates to the operating system for free. Even though users will be able to continue to run Windows 7 after that date, they’ll be more susceptible to potential security problems. To hammer that point home, Microsoft is planning to deliver a new pop-up notification to Windows 7 users on January 15, 2020.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you need help with this?, Let us know!

Join the conversation on our Facebook Page!

Homeland Security Alert: All Users to update Firefox browsers Immediately

If you use Mozilla Firefox’s web browser, you’ll want to drop what you are doing right now and update it. Now.  Failure to do so, could allow an attacker to take control of a user’s entire operating system—whether they use Windows or Mac. More alarming, the vulnerability is already being exploited…

FastCompany.com click the link to read the rest of the story. Our FREE Tools can help!

Send this to your friends!Join the conversation on our Facebook Page!

Be Prepared: Iran can execute cyber-attacks against the US

Homeland Security Warning: Be prepared for cyber disruptions, suspicious emails, and network delays. … Implement basic cyber hygiene practices such as effecting data backups and employing multi factor authentication. Note: Make sure your business can function if there are interruptions to your internet service.

Department of Homeland Security click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing?

Join the conversation on our Facebook Page!

Chinese hackers get around two-factor authentication

Security researchers say they found evidence that a Chinese government-linked hacking group has been bypassing two-factor authentication (2FA) in a recent wave of attacks.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How would you deal with threats like this?

Join the conversation on our Facebook Page!

ALERT! TP-Link routers allow anyone to change your WiFi password

According to researchers in ethical hacking, if exploited, this vulnerability would allow a remote threat actor to take control of device settings via Telnet to connect to a File Transfer Protocol server (FTP) over LAN or WAN.  Exploiting this vulnerability would give the attacker administrator privileges…

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you own one of these?Join the conversation on our Facebook Page!

Windows Hack Attackers! Microsoft Responds With Powerful Counterpunch

It has been confirmed that the Microsoft Digital Crimes Unit (DCU) has been tracking a hacking campaign against Windows users. … The threat group behind these cyber-attacks is thought to be based in North Korea and has been named as “Thallium” by Microsoft and is also known as APT37. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What else should be done to stop these hackers?Join the conversation on our Facebook Page!

The PC is dead. Long live the cloud PC.

Microsoft is giving up on Windows on the PC. In its place, Microsoft is rolling out its Windows Virtual Desktop (WVD). The Windows Virtual Desktop client is available across Windows, Android, Mac, iOS, and HTML 5. In other words, if you have a browser and a PC, you’ll be able to run Windows as a DaaS.  Microsoft is promoting this not just as a Windows desktop alternative, but as a path forward for die-hard Windows 7 users.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will your business be affected by this!

Join the conversation on our Facebook Page!

New ransomware strain is now stealing data before encrypting it

The data theft takes place before the execution of the actual ransomware binary that encrypts the data. It is part of a recent trend in the ransomware scene.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How does your business deal with these never ending threats!

Join the conversation on our Facebook Page!

New Orleans city computers offline after cyberattack

The NOLA.gov website was still down for “unplanned maintenance” Sunday, but emergency services such as 911 and the fire department are still operational, the New Orleans’ Office of Homeland Security & Emergency Preparedness said. The FBI and Secret Service are assisting with the investigation, the city said. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business survive attacks like this?Join the conversation on our Facebook Page!

 

New Ransomware overcomes PC security by rebooting into Safe Mode

SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process. The attackers may be using this technique to circumvent endpoint protection, which often won’t run in Safe Mode. …

Sophos.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if your computers were encrypted by ransomware?Join the conversation on our Facebook Page!

Microsoft: 44 million user accounts have a serious security problem

After analyzing a database containing 3 billion leaked credentials from security breaches, the Microsoft threat research team determined more than 44 million user accounts had a serious security problem. Here’s what you need to know.

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you protect your online accounts?Join the conversation on our Facebook Page!

Top 5 things to know about open source and the cloud

Cloud software is impeding open source software companies from making a profit. Tom Merritt explains the five things you need to know about open source and the cloud….

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Are you thinking of using open source software? What are your greatest concerns?

Join the conversation on our Facebook Page!

FBI recommends that you keep your IoT devices on a separate network

The FBI also recommends changing factory-set (default) passwords and not allowing an IoT device’s accompanying mobile app to gain access to too many smartphone permissions. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your network from IOT vulnerabilities?

Join the conversation on our Facebook Page!

New ransomware attacks target your NAS devices, backup storage

The number of ransomware strains targeting NAS and backup storage devices is growing, with users “unprepared” for the threat, researchers say. … Once deployed on a system, the malware will usually encrypt files or full drives, issue its victim with a ransom note, and demand payment in return for a way to decrypt and restore access to locked content. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your backups from ransomware?

Join the conversation on our Facebook Page!

Ransomware devastated cities this year. Officials hope to prevent a repeat in 2020

Security experts expect ransomware attacks against local governments to ramp up in 2020. But government officials hope that if they can properly protect cities and stop paying the hackers, ransomware will eventually die off. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your business?Join the conversation on our Facebook Page!

New trojan is stealing doctors passwords and spreading ransomware

A newly discovered hacking campaign by a ‘sophisticated cyber criminal operation’ is targeting healthcare and education organisations with custom-built…  trojan malware which gives attackers… control of Windows systems with the ability to monitor actions and steal sensitive data. The malicious functions of the remote access trojan , dubbed PyXie RAT, include keylogging, credential harvesting, recording video, cookie theft, the ability to perform man-in-the-middle attacks and the capability to deploy other forms of malware onto infected systems.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What are you doing to keep ahead of these attacks?

Join the conversation on our Facebook Page!

Microsoft: New Dexphot malware has infected 80,000+ computers

Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers.  Named Dexphot, this… botnet reached almost 80,000 infected computers. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have any of your computers been part of a botnet?

Join the conversation on our Facebook Page!

SIM-Swapping Is the Biggest Security Threat You Face and Almost No One Is Trying to Fix It. Here’s Why It Matters.

Imagine you try to log into your bank account one day to setup a payment on your mortgage. You realize that something’s wrong when the bank’s website tells you you’ve entered the wrong password. That’s strange, you think as you click the link to “reset your password.” It’s an easy process, but first, the bank requires that you prove you’re actually you, by sending a simple text message with a six-digit code to the mobile phone number on file. But when you request your code, the text never comes. …

inc.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep ahead of all of these threats?

Join the conversation on our Facebook Page!

 

 

fake software update downloads malware when you click ‘later’

The hacking campaign has two variations, according to tech security company Zscaler, which has been tracking it. In the first version, the crooks hack into insecure WordPress sites using the theme plugin vulnerability and inject malicious redirect scripts into the compromised site. This allows them to display a fake Flash Player update alert to the user over the compromised site, which aims to trick website visitors into starting a software update. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you determine whether an update is real or not?

Join the conversation on our Facebook Page!