Rombertik Malware Can Wreck Your PC

rombertikRombertik is a new password stealing malware product that works by copying everything you type into a web browser window, and basically works as a keylogger.  The goal is to steal your user credentials for online sites such as email, social network accounts, shopping accounts, and bank or other financial accounts.  This is a pretty scary bit of malicious software.  But there is more.

Rombertik has a revenge feature built into ...

Continue Reading →
0

Macs Need Security Too

The Mac platform has become a popular target of cyber-criminals, partly because they have increased their percentage of the personal computer marketplace from 3% to 7%, partly due to the popularity of the iPhone, and partly because the consumer demographics of Apple customers generally point to people with more money who willing spend more to get the “best.”  In any event, if you are an Apple user clinging to the belief that the Mac is invulnerable, you are wrong.  You ...

Continue Reading →
0

Sunday Funnies: I Shot The Gateway

(Sung to the Bob Marley/Eric Clapton tune “I Shot the Sheriff”)

dead-computer_550Ok, so the picture is a Dell, not a Gateway, but Dell doesn’t fit the lyric.  The story is about a man named Lucas Hitch of Colorado Springs, who found a new way to deal with the infamous Windows “Blue Screen of Death.”  He just carried the computer into the alley, whipped ...

Continue Reading →
0

Weakest Cybersecurity Link – It’s Your Staff

coworkersAll the expensive high-tech cybersecurity goodies cannot prevent someone in your employ from clicking a malicious link in an email and opening a gateway to further network exploitation.  That is the findings of ProofPoint in The Human Factor Report 2015.  The discouraging point for those of us who advocate employee training as an important part of an overall cybersecurity strategy is that in spite of training, people are still more ...

Continue Reading →
0

I’ve Been Hacked – Forensic Issues

forensicsWhen you discover that one or more computers in your business has been breached, it is easy to get very excited and try to eliminate your risk by taking systems offline, and having your computer support personnel wipe the hard drive and re-install a fresh operating system and set of applications.  This is the wrong course of action if you were hoping to take legal action against the perpetrators.

Most local ...

Continue Reading →
0

Cyber Attacker Using Fake “Updates”

updatesCyber criminals are using fake software “updates” to trick company employees into downloading Trojan horse malware to allow the attackers to gain access to the company network.

This is an especially nasty bit of trickery, as we advise our clients repeatedly to keep their software and operating systems updated to maintain the security and integrity of the software.

Once the malware is installed the cyber attackers are able to move around the ...

Continue Reading →
0
Page 1 of 2 12