CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …

Stolen computer from Greenwood hospital may contain unencrypted patient data

Here we are in 2014, with operating systems which feature built-in data encryption, and in the news today over on WYFF’s site is a story titled “Hospital: Patient info at risk after laptop is stolen“.  It was just a couple years ago that I wrote on this blog about a similar incident HERE. The long and short of today’s story …

Holiday Hours for Computer / Network Service & Sales

Homeland Secure IT is closing in observance of Independence Day 2014 and so we can spend time with our families! We’re walking out the door on July 3rd at 2pm and will return on Monday, July 7th ready to tackle any project you may have. Should you have an emergency such as your server go down over this holiday weekend, …

Apple iCloud ransomware is a real threat

People are being locked out of their iPhones and iPads due to an attack that is taking place where the devices are locked and you can only gain access to your files if you pay a “ransom”. This is mainly in Australia but it has been reported in other locations. You should backup your data so that in the event …

Internet Explorer being actively targeted – Why are you using IE?

This is from our partners at WatchGuard, taken in its entirety from their blog for your reading enjoyment: Advanced Attackers Exploit IE & Flash 0days in the Wild by Corey Nachreiner Over the weekend, Microsoft released a critical security advisory warning customers of a serious new zero day vulnerability in Internet Explorer (IE), which attackers are exploiting in the wild. Around the same time, …

Kevin Mitnick demonstrates a Microsoft Word document exploit

Did you know that most successful computer exploits that we encounter are because the user simply clicked a link, or opened a document without giving it a second thought? I think we’re all guilty of receiving an email from someone we know, or assume we know, then opening the email and following that link. I know I have done it, …

1

And the winner of our Jabra Freeway giveaway is….

We have a winner in our giveaway!  Olga Bannister, simply for being awesome and subscribing to the Homeland Secure IT blog, you have won this cool device that may keep you from getting a ticket in the City of Greenville. Stop by and pick it up most any weekday between 8:30 and 5:30.  You might call ahead to make sure …

2

Internet Spring Cleaning Day 2014 is upon us! Read Immediately!

It’s that time of year again when ISPs (Internet Service Providers) from around the globe perform their yearly scheduled maintenance. This is dubbed “Internet Spring Cleaning”. In case you have missed the stories on the news and the countless emails flying around for the last week or so, then this may come as a total surprise to you. Newcomers to …

1

Don’t risk a ticket – get a hands-free system for your car (Win a JABRA here)

Agree with it or not, Greenville South Carolina has a new law that states that if you even appear to be using a hand-held device while behind the wheel, you risk a $100 ticket. Not only that, as the old saying goes, “third time’s the charm” applies here because your device can be confiscated and destroyed if so ordered by a …

Microsoft FixIt for Word / Office should be applied without hesitation

Yesterday’s Microsoft Security Advisory announced a vulnerability in Microsoft Word which could permit remote code execution. The summary of this advisory simply states that people are being exploited due to a vulnerability. It happens when someone opens, or even previews an RTF in email using Microsoft Word as the email viewer. While Microsoft has not released a full patch at …