October 2016

Blocking Ransomware Scripts with Exchange Transport Rules

One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts. These scripts are often VBScript (.vbs), Windows Script Files (wsf), or JavaScript (.js) files, and when executed, will download a DLL or EXE to spawn the infection. An example JavaScript which downloads and executes

Blocking Ransomware Scripts with Exchange Transport Rules Read More »

ALERT: Latest Round of Phishing Campaigns Targeting Businesses

Hackers are currently targeting business of all sizes in the latest round of phishing campaigns. The way the social engineering attack works is emails are sent to employees with PDF attachments, claiming to have “secure or protected documentations”. Unlike many cases in the past, these PDFs do not have malware embedded in them. Instead, they

ALERT: Latest Round of Phishing Campaigns Targeting Businesses Read More »

Internet Security System

88% of Employees Lack Cyber Security Awareness

MediaPro recently conducted a survey focusing on cyber security, which included eight specific security scenarios.  The survey was completed by 1,000 U.S. employees.  After completion of the survey, it was determined only 12% of the respondents have enough cyber security awareness to prevent privacy issues or a cyber attack.  It was also determined, based on the

88% of Employees Lack Cyber Security Awareness Read More »

cpu64bit

64-bit vs. 32-bit Processing Architecture- What does it all mean?

In 1995, Windows 95 operating system came out with 32-bit  as a replacement for the 16-bit processing.  In the early 2000’s Microsoft introduced a version of XP operating system that was designed to run using the Intel Itanium 64-bit processor.  All the versions of Microsoft’s operating systems since then have been available in both 32-bit

64-bit vs. 32-bit Processing Architecture- What does it all mean? Read More »

Internet Safety & Security

80% IT Pros Believe Internet Security is Everyone’s Responsibility

In the wake of the Distributed Denial of Service (DDoS) attack last week on the Internet performance management company, Dyn, we’ve learned of some unsettling security vulnerabilities for millions of Internet of Things (IoT) devices. It was discovered the DDoS attack utilized the Mirai botnet to hack thousands of IoT devices and to take down

80% IT Pros Believe Internet Security is Everyone’s Responsibility Read More »

Hackers Boost Sophistication With Fake Microsoft Security Essentials BSoD Attack

Hackers are now using advanced methods to distribute malware… Hackers have found new ways to copy notifications from what users would consider safe programs.  The latest example of this is the blue screen of death (BSoD) that appears after users attempt to download a fraudulent version of Microsoft Security Essentials.  Microsoft does have a BSoD alert that

Hackers Boost Sophistication With Fake Microsoft Security Essentials BSoD Attack Read More »