Windows Hack Attackers! Microsoft Responds With Powerful Counterpunch

It has been confirmed that the Microsoft Digital Crimes Unit (DCU) has been tracking a hacking campaign against Windows users. … The threat group behind these cyber-attacks is thought to be based in North Korea and has been named as “Thallium” by Microsoft and is also known as APT37. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What else should be done to stop these hackers?Join the conversation on our Facebook Page!

Cyber security 101: Protect your privacy from hackers, spies, and the government

Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How do you protect your online security & privacy?

Join the conversation on our Facebook Page!

California Consumer Privacy Act: Everything you need to know about the CCPA

California’s new privacy bill is one strict piece of legislation. Whether you are a consumer curious about your new rights or a business worried about compliance, here is a guide to the new rules.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will your business be affected by CCPA?

Join the conversation on our Facebook Page!

The PC is dead. Long live the cloud PC.

Microsoft is giving up on Windows on the PC. In its place, Microsoft is rolling out its Windows Virtual Desktop (WVD). The Windows Virtual Desktop client is available across Windows, Android, Mac, iOS, and HTML 5. In other words, if you have a browser and a PC, you’ll be able to run Windows as a DaaS.  Microsoft is promoting this not just as a Windows desktop alternative, but as a path forward for die-hard Windows 7 users.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will your business be affected by this!

Join the conversation on our Facebook Page!

New ransomware strain is now stealing data before encrypting it

The data theft takes place before the execution of the actual ransomware binary that encrypts the data. It is part of a recent trend in the ransomware scene.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How does your business deal with these never ending threats!

Join the conversation on our Facebook Page!

So you want to keep running Windows 7? Good luck with that, small businesses

The end of Windows 7 support is weeks away. Microsoft says small businesses can pay for extended security updates just like their enterprise cousins. … Support for Windows 7 ends in just a few weeks. After Jan. 14, 2020, Microsoft will no longer provide free security updates and bug fixes for the venerable operating system to the general public.  The … upgrade tools still work, and the end result is an apparently valid digital license. But those offers could end soon.  Those updates will be available, however, to Microsoft customers who are willing to pay for the privilege.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

We can sell you updates, if you wait!

Join the conversation on our Facebook Page!

New Orleans city computers offline after cyberattack

The NOLA.gov website was still down for “unplanned maintenance” Sunday, but emergency services such as 911 and the fire department are still operational, the New Orleans’ Office of Homeland Security & Emergency Preparedness said. The FBI and Secret Service are assisting with the investigation, the city said. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business survive attacks like this?Join the conversation on our Facebook Page!

 

New Ransomware overcomes PC security by rebooting into Safe Mode

SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process. The attackers may be using this technique to circumvent endpoint protection, which often won’t run in Safe Mode. …

Sophos.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if your computers were encrypted by ransomware?Join the conversation on our Facebook Page!

Microsoft: 44 million user accounts have a serious security problem

After analyzing a database containing 3 billion leaked credentials from security breaches, the Microsoft threat research team determined more than 44 million user accounts had a serious security problem. Here’s what you need to know.

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you protect your online accounts?Join the conversation on our Facebook Page!

Top 5 things to know about open source and the cloud

Cloud software is impeding open source software companies from making a profit. Tom Merritt explains the five things you need to know about open source and the cloud….

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Are you thinking of using open source software? What are your greatest concerns?

Join the conversation on our Facebook Page!

FBI recommends that you keep your IoT devices on a separate network

The FBI also recommends changing factory-set (default) passwords and not allowing an IoT device’s accompanying mobile app to gain access to too many smartphone permissions. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your network from IOT vulnerabilities?

Join the conversation on our Facebook Page!

New ransomware attacks target your NAS devices, backup storage

The number of ransomware strains targeting NAS and backup storage devices is growing, with users “unprepared” for the threat, researchers say. … Once deployed on a system, the malware will usually encrypt files or full drives, issue its victim with a ransom note, and demand payment in return for a way to decrypt and restore access to locked content. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your backups from ransomware?

Join the conversation on our Facebook Page!

Ransomware devastated cities this year. Officials hope to prevent a repeat in 2020

Security experts expect ransomware attacks against local governments to ramp up in 2020. But government officials hope that if they can properly protect cities and stop paying the hackers, ransomware will eventually die off. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your business?Join the conversation on our Facebook Page!

New trojan is stealing doctors passwords and spreading ransomware

A newly discovered hacking campaign by a ‘sophisticated cyber criminal operation’ is targeting healthcare and education organisations with custom-built…  trojan malware which gives attackers… control of Windows systems with the ability to monitor actions and steal sensitive data. The malicious functions of the remote access trojan , dubbed PyXie RAT, include keylogging, credential harvesting, recording video, cookie theft, the ability to perform man-in-the-middle attacks and the capability to deploy other forms of malware onto infected systems.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What are you doing to keep ahead of these attacks?

Join the conversation on our Facebook Page!

Microsoft: New Dexphot malware has infected 80,000+ computers

Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers.  Named Dexphot, this… botnet reached almost 80,000 infected computers. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have any of your computers been part of a botnet?

Join the conversation on our Facebook Page!

SIM-Swapping Is the Biggest Security Threat You Face and Almost No One Is Trying to Fix It. Here’s Why It Matters.

Imagine you try to log into your bank account one day to setup a payment on your mortgage. You realize that something’s wrong when the bank’s website tells you you’ve entered the wrong password. That’s strange, you think as you click the link to “reset your password.” It’s an easy process, but first, the bank requires that you prove you’re actually you, by sending a simple text message with a six-digit code to the mobile phone number on file. But when you request your code, the text never comes. …

inc.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep ahead of all of these threats?

Join the conversation on our Facebook Page!

 

 

fake software update downloads malware when you click ‘later’

The hacking campaign has two variations, according to tech security company Zscaler, which has been tracking it. In the first version, the crooks hack into insecure WordPress sites using the theme plugin vulnerability and inject malicious redirect scripts into the compromised site. This allows them to display a fake Flash Player update alert to the user over the compromised site, which aims to trick website visitors into starting a software update. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you determine whether an update is real or not?

Join the conversation on our Facebook Page!

How SMS Works—and Why You Shouldn’t Use It Anymore

Text messages are sent in a multi-step process. While your message might be encrypted from your phone to the first cell tower, it’s not encrypted after that. And your SMSC may keep the message even if both the sender and recipient delete it. ..

popularmechanics. com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use sms?

Join the conversation on our Facebook Page!

Beware of public USB charging stations

Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use public charging stations?

Join the conversation on our Facebook Page!

Here’s how you can still get a free Windows 10 upgrade

Microsoft’s much-hyped free upgrade offer for Windows 10 ended in 2016, right? Not exactly. The GWX tool may be gone, but all the other upgrade tools still work. The end result is an apparently valid digital license, and there’s no evidence that the free upgrades will end any time soon. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Ready to finally do this?

Join the conversation on our Facebook Page!

Brave browser reaches v1.0, its first stable version

Brave, a privacy-first browser, rolls out its first stable release, complete with innovative features such as its own private ad platform and a users and websites rewards initiative. …  Developed from the ground up to be a privacy-first alternative to modern-day browsers, Brave 1.0 comes with many features not present in any other competitor’s software. This includes: Brave blocks all ads by default, and instead uses its own private ad platform, designed to work right inside the browser, and with a focus on preserving users’ privacy. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you ready to try a new browser?

Join the conversation on our Facebook Page!

Microsoft to apply California’s privacy law for all US users

Microsoft‘s chief privacy officer promises to apply the CCPA to all US users, not just Californians. … The California Consumer Privacy Act, or CCPA, is currently set to go into effect on January 1, 2020. The upcoming law is considered one of the most restrictive privacy legislations in the world world. … Under the CCPA, companies must be transparent about the type of data they collect from users and how they use it. In addition, companies must also provide users with the option to prevent their personal information from being sold.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business be compliant in time?

Join the conversation on our Facebook Page!

Google keeps a staggering amount of information about you. Here’s how to manage it

Google collects a staggering amount of information about you — maybe even more than you realize. Google remembers every search you perform and every YouTube video you watch. Whether you have an iPhone ($699 at Amazon) or Android phone, Google Maps logs everywhere you go, the route you take to get there, when you arrive and what time you leave — even if you never open the app. When you really take a look at everything Google knows about you, the results can be shocking — maybe even a little frightening. Thankfully, there are a few things you can do about it. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you reviewed your Google data, yet?

Join the conversation on our Facebook Page!

Tech Giants Have Hijacked the Web. It’s Time for a Reboot.

While Washington looks to combat online monopolies, some innovators are developing new internet platforms to prevent monopolies from forming in the future… While lawmakers try to combat the concerns by talking about antitrust and regulation, a cottage industry of true decentralizers is emerging in the computer space. They want to recapture the original promise of the web, to create a platform where information isn’t siloed by private companies or monitored by police states.

WSJ.com click the link to read the rest of the story. Our FREE Tools can help!

Do you think these startup technologies have a real chance to change things?

Join the conversation on our Facebook Page!

Firefox New Privacy Protections Lets You Track the Trackers

Firefox is taking the guesswork out of how to give yourself more privacy online providing always-on features like blocking third-party tracking cookies and cryptominers also known as Enhanced Tracking Protection.

Mozilla.org click the link to read the rest of the story. Our FREE Tools can help!

Will you use their new privacy features?

Join the conversation on our Facebook Page!

Do businesses really know how much their data is worth?

DocAuthority‘s new report states that IT security departments are incorrectly estimating the value of business information they have in their possession. This leads to poor investment into the availability, protection and security of the data that is commercially most valuable.  … the poll uncovered that the majority was undervalued, including research and development, as well as financial reports. On the other hand, personally identifiable data (PII), which was less sensitive, was highly prioritised.

itproportal.com click the link to read the rest of the story. Our FREE Tools can help!

Do you know the value of your data?

Join the conversation on our Facebook Page!

New ‘unremovable’ xHelper malware has infected 45,000 Android devices

Over the past few months, many users have complained about xHelper’s near “unremovable” state… While the trojan is currently engaging in spam and ad revenue, it also possesses other, more dangerous features. xHelper can download and install other apps, a function that the xHelper could at any point to deploy second-stage malware payloads, such as ransomware, banking trojans, DDoS bots, or password stealers.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you safe using an Android phone?

Join the conversation on our Facebook Page!

New IoT botnet army targeting small office and home routers

Tens of thousands of Wi-Fi routers are potentially vulnerable to an updated form of malware that takes advantage of known vulnerabilities to rope these devices into a botnet for the purposes of selling distributed denial of service (DDoS) attack capabilities to cyber criminals.  A new variant of Gafgyt malware – which first emerged in 2014 – targets small office and home routers from well-known brands

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using one of these routers?

Join the conversation on our Facebook Page!