Some hackers are getting creative in getting into people’s system by leveraging USB cables that have a Wifi Card in them which hallway the hacker the ability to access remotely and be in your local system. Once in the hacker can browse the network and servers at their leisure to capture any intellectual property without anyone knowing. The only left over signature would be the local device the USB cable is plugged into. It’s important to be mindful of the USB devices your are leveraging in your business community to ensure a better degree of security. There are also system tools that can be installed on all systems to notify your local admin when a device of this nature is within the network.
Keep your computer healthy and your stress low, with an easy to manage antivirus software. A wealth of options exist, so with the help of researcher Neil Rubenking at PCMag, we have comprised a list of the top antivirus programs. Each product has been reviewed and lab tested in order to provide real results and data. In times of trouble no one wants a program that can’t handle the pressure.
Top 4 Commercial Antivirus Software on the Market
Both Bitdefender and Kaspersky performed at the top of the scale in independent Lab tests.
A single subscription of McAfee AntiVirus Plus allows you to install protection on all of your Windows, Android, Mac OS, and iOS devices.
Webroot SecureAnywhere Antivirus uses an unusual behavior based detection technology. This makes Webroot the tiniest antivirus on the market today. This is both good and bad. In theory this Antivirus can protection you from malware, but it can also flag legitimate behaviors made by legitimate users.
If you would like to educate yourself in more detail about the information presented in this blog post please visit:The Best Antivirus Utilities for 2016
If you recently installed the Transmission BitTorrent App, most likely you are one unhappy user.
The recently released version of Transmission BitTorrent for OS X contained the embedded KeRanger ransomware, the debilitating program designed to lock and encrypt files in order to extort money from consumers. In case you didn’t read our previous post about ransomware, this malware is extremely debilitating to consumers and business owners alike. It locks files and infiltrates all external hard drives and shared networks, making external hard drive back up prevention useless in protecting sensitive data.
The March 4th version 2.90 of the application contained the malware. The Transmission’s website is encouraging all users who have downloaded this version to upgrade to version 2.91 or at a bare minimum delete the 2.90 version from their computers. If you would rather, wiping and restoring your system to an earlier time period is also an option. Make sure if you utilize this option, that you restore your device to a period before the Transmission 2.90 installation.
Now if you find yourself infected, resist paying the $400 asked to restore your files. There is no guarantee that paying this fee will result in any data retrieval and could possibly be a complete waste of your money. If you decide to do nothing, at least remove the malware installed. Leaving the installation only allows the ransomware more opportunity to further exploit your system.
If you would like to do a little investigating of your own, a new blog post from Palo Alto Networks’ threat intelligence team lists the steps for finding out if you have been infected with the KeRanger ransomware.
If you would like to educate yourself in more detail about material presented in this blog post please visit:
The Best Security Suites for 2015
Malware, hacks, and data breaches are unquestionably possible if you do not tend to your security needs. Keep yourself and your computer protected from harmful intrusions by investing in top notch security. Take a look at the list compiled below as these are the leading security suites of 2015.
Bitdefender Total Security 2016 $69.95
Kaspersky Internet Security $79.99
Symantec Norton Security Deluxe $69.99
Bitdefender Internet Security 2016 $59.95
Comodo Internet Security Complete 8 $69.99
Trend Micro Internet Security 2016 $79.95
Webroot SecureAnywhere Internet Security Complete 2015 $79.99
Check Point ZoneAlarm PRO Antivirus $69.95
Problem: Antivirus and Hyper-V (Why can’t I start my virtual machine?)
A little while ago our support team ran into some problems starting virtual machines after they install antivirus software in the management operating system. The root cause of the problem is that a number of these programs monitor file access in a way that interferes with Hyper-V’s attempts to open virtual machine files. If you see this problem – you have two options:
Users always on the go? Having a hard time managing remote workstations? Need to ensure updates are installed on mobile workstations? Want to push apps to remote workstations? Well look no further, try Windows Intune. I recently came across a client that had many mobile users and we were having a very tough time managing them and ensuring they are up to date. What I came across was Windows Intune.
Windows Intune is essentially a cloud based management system for remote workstations. It gives you the ability to monitor antivirus activity using Windows Intune protection, as well as a web based update console that is much like WSUS on Windows server. It’s a very simple and easy project to use if you have many remote workstations. It literally took me about 10 minutes to get it setup and I was pushing agents out to the workstations. It even sent me an email alert when a computer detected malicious items on one of the PCs.
Furthermore if you sign up for Windows intune which is about $7 per workstation per month, you are given the ability to install Windows 7 Enterprise on your workstations. Microsoft essentially gives you a volume license key for the enterprise software for each pc using Windows Intune.
So if you are looking for an easy way to manage remote systems that never connect to the domain, I would recommend trying Windows Intune.
According to the Microsoft Security Intelligence Report apparently not all PC users that have anti-virus actually get protected for malicious viruses 100% of the time. There is a great article that a team member here at BVA found that explains your chances of being at risk along with ways to help minimize your chances of having issues. Click here to read the full article from the folks over at PC Mag.
On April 15th, Tech Republic ran an article of interest to those of you dealing with network security. Blogger Michael Kassner’s article “Dropsmack: Using Dropbox to steal files and deliver malware” detailed his discovery at this year’s European Black Hat convention of a presentation made by penetration tester Jacob Williams. Williams’ presentation was titled “Dropsmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless”. In it, he describes how he was able to spear-phish the CEO of a client company and access the CEO’s Dropbox account. From there, even though he could not read the files inside directly, he was able to install malware to them to be synchronized down to the CEO’s workstation, where they could cause damage or seek out data to send back out. The malware uses the Dropbox synchronization service as a “Command and Control” (C2) channel. Chilling reading!