CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …

Stolen computer from Greenwood hospital may contain unencrypted patient data

Here we are in 2014, with operating systems which feature built-in data encryption, and in the news today over on WYFF’s site is a story titled “Hospital: Patient info at risk after laptop is stolen“.  It was just a couple years ago that I wrote on this blog about a similar incident HERE. The long and short of today’s story …

Apple iCloud ransomware is a real threat

People are being locked out of their iPhones and iPads due to an attack that is taking place where the devices are locked and you can only gain access to your files if you pay a “ransom”. This is mainly in Australia but it has been reported in other locations. You should backup your data so that in the event …

Internet Explorer being actively targeted – Why are you using IE?

This is from our partners at WatchGuard, taken in its entirety from their blog for your reading enjoyment: Advanced Attackers Exploit IE & Flash 0days in the Wild by Corey Nachreiner Over the weekend, Microsoft released a critical security advisory warning customers of a serious new zero day vulnerability in Internet Explorer (IE), which attackers are exploiting in the wild. Around the same time, …

Kevin Mitnick demonstrates a Microsoft Word document exploit

Did you know that most successful computer exploits that we encounter are because the user simply clicked a link, or opened a document without giving it a second thought? I think we’re all guilty of receiving an email from someone we know, or assume we know, then opening the email and following that link. I know I have done it, …

Microsoft FixIt for Word / Office should be applied without hesitation

Yesterday’s Microsoft Security Advisory announced a vulnerability in Microsoft Word which could permit remote code execution. The summary of this advisory simply states that people are being exploited due to a vulnerability. It happens when someone opens, or even previews an RTF in email using Microsoft Word as the email viewer. While Microsoft has not released a full patch at …

5

Credit card compromised? Maybe it was from a local establishment not Target…

Surely by now you’ve heard all about the Target breach, where credit cards were compromised… Maybe you were one of the bazillion who were affected, and you might have already replaced your card and moved on and put that out of your mind. But, here’s a story about what appears to be a local breach, though we do not know …

Zero Day Fixes for Microsoft IE and Adobe Flash Should be Applied Immediately

In case you have been wondering, there’s a very good reason for the most recent updates from Microsoft and Adobe… The vulnerabilities are being exploited and today I have heard of two people being affected. It is our recommendation that you apply the fixes immediately in order to avoid this type of issue…. If you require any assistance or have …

Zero Day Vulnerabilities addressed by Adobe and Microsoft – Get it while it’s hot!

It’s time for updates to come out from from your favorite software vendors, and whether you are using a Windows based PC or a Mac, there’s something for you this month! Applying these updates is VERY IMPORTANT – your machines are vulnerable unless you take steps to secure them. Up for your patching pleasure are the following (as listed by …

Windows users being exploited due to a TIFF issue

You need to be aware of this… Reposting from one of our partner’s blogs…  WatchGuard:   Attackers Exploiting a Zero Day in Windows, Office, and Lync by Corey Nachreiner Today, Microsoft released a critical security advisory warning customers of a serious new zero day vulnerability that affects Windows, Office, and Lync. In a nutshell, the vulnerability has to do with how certain versions …