Apple has finally acknowledge and has promised an update for Mac OS X that will find and remove the MacDefender fake security software, and warn uninfected users when they download the infectious program.
The announcement — part of a new support document that the company posted late Tuesday — was the company’s first public recognition of the threat posed by what security experts call “scareware” or “rogueware.”
Apple has taken criticism for not publicly responding to the MacDefender threat.
“In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants,” Apple said in the document. “The update will also help protect users by providing an explicit warning if they download this malware.”
Apple also outlined steps that users with infected Macs can take to remove the scareware.
Andrew Storms, director of security operations with nCircle Security, was surprised that Apple said it would embed a malware cleaning tool in Mac OS X.
Read More……
Tags: antivirus, apple, applications, apps, blogging, bots, cleaning tools, Computers, Computing, data, deleting, detection mechanisms, digital, downloads, fake security tool, files, French security, Hackers, hardware, Intego, internet, laptops, Mac Defender, Mac OS X, Mac OS X 10.6, MacProtector, MacSeucirty, malware, malware detection, nCircle Security, netowkrs, Online, PC's, phishing, postings, quarantine, removing, rogueware, scareware, Security, security threats, Snow Leopard, Software, Steve Jobs, technology, threats, tools, viral, warnings, web
Google is finally taking privacy seriously to a degree by offering its users a secure form of searching while using Google Search. Moving forward users will have the opportunity to enable SSL (Secure Socket Layer) for added security. Be advised, the service will only cover the Google search and clicks made through Google to other non-secured sites will be visible.
Read More……
Tags: 3DES, algorithms, anti-download approach, App Rep, apple, attacks, browsers, Chrome, Chrome 12, competitors, content, contents, dev, digital certificates, downloads, emails, exe, executables, files, Firefox, Google, Google Search, Google SSL Beta, hardware, has, identifies suspicious sites, IE, IE9, internet, Internet Explorer, labels, legitimate software, malicious code, malware, malware door, Microsoft, Mozilla, operating systems, OS, pages, pre-approved list, production-quality version, releases, run a file, Safari, Safe Browsing, Safe List, Security, security features, sites, SmartScreen Application Reputation, Software, SSL, unsafe sites, URL, users, vector, versions, warnings, web, whitelist, Windows
Hackers have found a way to exploit Adobe Flash Player by using a zero-day vulnerability by using Microsoft Excel documents that was confirmed by Adobe yesterday. Adobe representatives that they will not be able to patch Flash until next week. Therefore, if you use Flash you are on your own until next week. Read More….
Tags: Adobe Flash exploit, advantages of using a consultant, android, Android 2.2.2, Android Market Place, Android Market Security Tool, Apache License, apps, best Internet Phone Service, CA, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, China, cloud computing, Cloud Computing Chicago, code, command-and-control server, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, CVE-2011-0609, cybercriminals, data centers, Desktop Services, devices, DroidDream, email services, exploid, Freemont, Google, Hackers, handsets, hardware, Help Desk Services, hosted exchange, IMEI, IMSI, infected devices, International Mobile Equipment Identity, International Mobile Subscriber Identity, IT Audits, IT Outsourcing, IT support services, linksys routers, malicious code, malware, managed IT services, Microsoft Excel Exploited, mobile OS, mobiles, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, online data backup, operating systems, owners, patches, PC repairs, phones, projects, rageagainstthecage, Routers, Security, security specialists, security tools, Server Management, servers, SIM cards, SMS, Software, stolen information, Symantec, technical support, technology, Telcom Audits, telephone auditing review, text messaging, The Syber Group, third-party applications, tools, USA, users, vendors, version, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, Windows Technician, Wireless Internet, Zero Day
It is being reported that hackers have been able to exploit holes in Windows and Microsoft new of the issue since January of 2011.
The exploit deals with the Windows protocol handler in Windows for MHTML. Be advised the exploit can only be done if the user is running Internet Explorer. Apparently, hackers are using cross-site scripting attacks are intercepting and collecting peoples information, spoofing the content that is displayed to the browser, or interfering with the user’s browsing activities. Read More….
Tags: 4Chan, account numbers, address, advantages of using a consultant, anti-virus, applications, attacks, backdoor, best Internet Phone Service, beta, Blog site, Brooklyn, browsers, bug, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, commands, computer, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, cross-site scripting, CSS, data, data centers, DEP, Desktop Services, download, Email, email services, FedComp, format, Gawker sites Hacked, Hackers, hacking, Help Desk Services, hosted exchange, IE, IE6, IE7, IE8, internet, Internet Explorer, Internet Explorer security issues, IT Audits, IT Outsourcing, IT support services, Laptop, link, linksys routers, machine, malware, managed IT services, MHTML, Microsoft, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, networks, online data backup, payments, PC repairs, PC's, processor, production servers, prosecution, Routers, Security Issues Windows, sell, Server Management, servers, site, Software, Spam, Symantec, systems, technical support, Telcom Audits, telephone auditing review, test computers, test system, The Syber Group, US Secret Service, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, website, Windows, Windows Technician, Wireless Internet
We found out Bloggers using the WordPress platform was shutdown by a DDos attack yesterday that apparently affected many blog sites.
The DDos hostilities began in the morning and lasted for a couple of hours. The estimates on the DDos attack was thought to be “multiple Gigabits per second and tens of millions of packets per second”, according to sources, WordPress is working with their providers to prevent such acts from ever taking place again.WordPress the attack is over, though in Chicago, Dallas and San Antonio. The good news is that the site is back up. However, while the attack was in progress sources say it was on of the “largest” the organization has ever seen. Even centersThe attack unfortunately hit main three data. Read More…..
Tags: 60606, Adobe, advantages of using a consultant, android, Android applications, apple, apps, attacks, best Internet Phone Service, Blog sites, Bloggers, blogs, botnet, botnets, bots, cellphones, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, control, crime, crimes, criminals, cybercrime, cybercrimes, cybercriminals, Darkness Botnet, data centers, DDoS, DDos Attack, Defender, devices, domains, DOS Attacks, email services, emails, Essentials, flash, games, Google, hack attack, Hackers, Hackers Attack WordPress with DDOS, hacking, Help Desk Services, hi-tech, infections, internet, internet tv, internet-enabled, investment accounts, IP addresses, ipad, iPhone, IT Audits, IT Outsourcing, linksys routers, malicious code, malware, MCAfee, Microsoft, mobile devices, Network routers, news, Nokia, Non English Blog sites, Non English Bloggers, Operating System, OS, patches, PC repairs, PC's, PDF, PDF documents, phishing, politically motivated hacking, research, Routers, Russia, Security, Security Analyst, security software, security threats, smart phones, smartphone software, smartphones, Software Agents, Spam, spamware, tablets, Telcom Audits, telephone auditing review, The Syber Group, transfer malware, trojan horses, USA, Virtual Computers, Virtualization, viruses, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, web-based threas, websites, Wikileaks, Windows, Windows Technician, Wireless Internet, Wordpress, WordPress Shut down for two hours, Zeus, Zeus Botnet, Zeus Trojan, Zombie Computers
As if we don’t have enough to worry about when it comes to potential attacks of all kinds. First there were reports about the social media site Facebook and its highly infected news feeds now there appears to be yet another mischief seeking internet fiend sending out infected Goo.gl links via Twitter. Users are being warned not to click these suspicious links as they might direct you to malicious sites.
Read More….
Tags: 60606, advantages of using a consultant, attacks, best Internet Phone Service, blogs, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, click, cloud computing, Cloud Computing Chicago, comments, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, configurations, data, data centers, direct, email services, Facebook, feeds, followers, furniture, goo.gl, Help Desk Services, infected, internet, IT Audits, IT Outsourcing, links, linksys routers, malware, Network routers, Next Web, PC repairs, postings, R7f68, Routers, scripts, sites, social media, Spam, Telcom Audits, telephone auditing review, The Syber Group, tracking, tweets, Twitter, unfollow, updates, users, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows Technician, Wireless Internet
A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.
“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.
Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.
To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said. Read More….
Tags: 60606, alogorithm, antivirus software, applications, attackers, attacks, AV, backgrounds, best Internet Phone Service, blogging, Bootlock Trojan, bypass technique, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, data centers, decrypt, demand money, desktop access, desktops, disable hard drives, documents, email services, file extensions, GPCoder.G, hard drives, Help Desk Services, images, infectiions, innovative technology, internet, IT Audits, IT Outsourcing, malware, master boot, Microsoft, Mobile, Music, offensive viruses, Online, PC repairs, pornographic images, premium-rate mobile phone number, private key, public key, random key, ransomware, recovery tools, restore desktop, restoring, RSA encryption, sensitive information, Stuxnet, Symantec, symmetric keys, technical help, Telcom Audits, video files, Virtual Computers, Virtualization, viruses, VoIP MPLS, Windows Technician, Wireless Internet
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software. Read more….
Tags: 60606, antivirus, antivirus software, applications, attacker, attackers, backdoor, bandwidth, best Internet Phone Service, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, component, Computer Consultants, Computer Help Desk, Computer Install, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Conflicker Worm, Conflicker Worm still infecting computers, control center, critical data, data centers, databases, detection, developed, dll, email services, emails, encryption, espionage, Explorer, explorer.exe, extensions, files, FTP, GET, Google, Hackers, Help Desk Services, information, internet, IT Audits, IT Outsourcing, malware, monitor phone calls, netconf32.dll, Network, networks, number recognition, Operating System, operating systems, OS, overlay, PC repairs, PC's, PDF, phones, private, processes, remote server, researchers, screenshots, Security, sensitive data, server, settings, spying, stolen data, system32, Telcom Audits, threats, transmit data, Trojan horse, Trojan.Spy.Yek, upload data, users, Virtual Computers, Virtualization, VoIP MPLS, Windows, Windows 7, Windows 95, Windows Technician, Wireless Internet
Mobile phone security threats rose sharply last year as the growing popularity of Internet-enabled mobile devices like smartphones and tablets provided new opportunities for cybercriminals, security software maker McAfee said.
In its fourth-quarter threat report, released on today, McAfee said the number of pieces of new cellphone malware it found in 2010 rose 46 percent over 2009’s level.
“As more users access the Internet from an ever-expanding pool of devices -computer, tablet, smartphone or Internet TV- web-based threats will continue to grow in size and sophistication,” it said.
McAfee, which is being acquired by Intel for $7.68 billion, said it expected PDF and Flash maker Adobe to remain a favorite of cybercriminals this year, after it surpassed Microsoft in popularity as a target in 2010.
It attributed the trend to Adobe’s greater popularity in mobile devices and non-Microsoft environments, coupled with the ongoing widespread use of PDF document files to transfer malware. Read More….
Tags: Adobe, android, Android applications, apple, apps, botnets, cellphones, Cellular, Computer Consulting 60606, Computer Technician, Computers, cybercriminals, devices, flash, games, Google, hacking, Help Desk Support Chicago, High Speed Internet, High Speed Internet Chicago, internet, internet tv, internet-enabled, ipad, iPhone, IT Outsourcing, IT Outsourcing Chicago, malware, MCAfee, Microsoft, mobile devices, Network Support, Nokia, Operating System, OS, PC, PC Technician, PC Technician Chicago, PDF, PDF documents, politically motivated hacking, Security, security threats, smart phones, smartphone software, smartphones, Spam, spamware, tablets, transfer malware, trojan horses, viruses, VPN, web, web-based threas, websites, Wikileaks
According to sources Microsoft will release the first service pack update for Windows 7 on February 22nd. The service pack has reached the RTM stage and sent to OEMs earlier this week.
The service pack is said to be a hefty 1.2GB download will feature all prior updates and fixes and Microsoft stated the update will improve networking, security and mobility. Read More….
Tags: 720p, anti-virus, Bill Gates, Business Continuity, Computers, Computing, Data Center, Dell, electronics, Email, Email Messaging, Gaming, Help Desk Support, High Speed Internet, HP, internet, laptops, Lenovo, Mainframes, malware, Microprocessors, Microsoft, Microsoft Exchange, MPLS, Network Security, Network Services, networks, Operating System, OS, PC, PC Hardware, PC's, RAID, Release Candidate, Security, Service Pack 1, super computers, technology, The Syber Group, Virus, VoIP, VoIP Service, VPN Security, web, WiFi, Windows 7, Windows 7 SP1, Windows Phone 7, Windows Server 2008, Windows Service Pack 1 coming February 22nd, Wireless
« Previous Page — Next Page »