Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: Ransomware’s New Dangerous Tactics

October 30, 2014 by The T By D Team Leave a Comment

Cryptolocker

ALERT:  Ransomeware’s New Dangerous Tactics

 

 

 

CryptoWall V2.0 is now using “poisoned ads” on major sites like Yahoo, AOL and Match.com to infect unsuspecting victims’ networks.  

Malicious ads are nothing new, but the second-generation ransomware using them is worrisome.

Poisoned Ads

Proofpoint says “The sites themselves were not compromised; rather, the advertising networks upon which they relied for dynamic content were inadvertently serving malware”.  

This means a so-called drive-by-download where the user does not have to click on anything.  

Up until now, CryptoWall was spread by spam with infected email attachments and download links sent by the Cutwail botnet, which users had to click on the link.

The website visitors hit by this “malvertising” are Drive by Download chartpeople who run unpatched versions of Adobe Flash.  The poisoned ads silently ‘pull in’ malicious exploits from the FlashPack Exploit Kit, hence the “drive-by-downloads”.

 

Dell Secureware Ransomware chart

According to security researchers at Dell Secureworks, more than 830,000 victims worldwide have been infected with ransomware, a 25% increase in infections since late August when there were 625,000 victims.

The first ransom usually has a deadline of 4-7 days, and demands around $500.  Even bad guys have a conscience and understand its not always to get your hands on Bitcoins quickly.  However, when this deadline passes, the ransom doubles to approximately $1000, depending on Bitcoin exchange rates.

Counting the ransom payments to CrytoWall’s Bitcoin addresses, Proofpoint estimates that the attackers make $25,000 per day.  Recent data taken directly from the CryptoWall ransom payment server, shows that since August 2014, an additional 205,000 new victims have been claimed.

Save Data

How To Help Prevent Infection:

1.  Do not use mapped drives.  Period.  

Use UNC names instead to connect to servers.  Apart from close to real-time (snapshot) fileserver backups, I also strongly recommend to deploy ad blockers for all the browsers in your organization, if you have not done so already.  Or make sure you use endpoint security that has ad-blocking built-in.

2.  Continue to focus on all endpoints being fully patched, Windows and all third-party apps.  

Also, configure endpoint browsers to only execute plug-in content when clicked, rather than automatically.  Uninstall apps that are not absolutely needed, make you attack surface as small as possible.

3.  Click-to-Play & Whitelisting.Safe computer

Some browsers like Google Chrome and Mozilla Firefox allow you to enable click-to-play for plug-in based content, which can stop the automatic execution on exploits that target browser plug-ins.  Deploying a whitelisting product on all machines is also something you could look at – whitelisting will stop ransomware cold.

4.  Lifecycle Malware Detection

Technologies for lifecycle malware detection carry different names, including targeted threat protection (TTP), targeted attack protection (TAP), and “click-time link scanning”.  Whatever you call it, you want it in place.

5.  Company-Wde Internet Acceptable Use Policy

Having an Acceptable Use Policy (AUP) in place that forbids employees to use their machines for private browsing and have an edge device that blocks selected groups of websites (like all social media) is also something you should have in place.

6.  Prepare Yourself.

You could also open an account with coinbase.com get approved (it takes a few days), create a wallet, and buy a few Bitcoin “just in case” you get hit and your backup fails.

7.  Prepare Your Employees.

And obviously stepping all employees through effective security awareness training is a must these days.

Ask About Our Affordable ‘Core Security’ Plan

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

We Make I.T. Work!

Filed Under: ALERTS, Featured

Ending Programs

October 6, 2014 by The T By D Team Leave a Comment

2f70959Dear Geek, 

I know have a few programs running on my computer that are slowing it down. I need my PC to be at top speed for my computer game. I want to see exactly which programs are running and which ones I can close. Is there a way to do that?

Sincerely, 

Speed Gamer

 

 

Dear Gamer,

You can see all the programs running through the Windows Task Manager. From here you can also close some of the programs that you aren’t using.

To open up the Task Manager, you press the “Control”, “Alt” and “Delete” buttons all at the same time. This will bring up the Windows Task Manager.

In the “Applications” tab of the Task Manager, you will be able to see all the programs running. If you are not using the program, you can close it by clicking on the program and hitting “End Task”. If it is something like Microsoft Word, you may want to ensure that you don’t need to save anything first.

 

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

 

Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

Home Depot Lawsuit

October 1, 2014 by The T By D Team Leave a Comment

Home-Depot-data-breach

Home Depot Lawsuit

There have been a speculations that there will now be multiple class-action lawsuits filed against Home Depot based on the fact that they were negligent in regards to their IT security.

Some ex-employees from the Home Depot IT department are now claiming that management of the retailer had been warned for years that their Point Of Sale systems were open for attack and did not act on these warnings.

These same ex-employees claim that Home Depot relied on an antivirus program that was not being updated with new definitions. As well, security scans were done very irregularly, and only on a small number of stores, which meant that they were not able to detect any breach or see any unusual actions.

Moral of the Story?
Updates, updates, updates.  
Ask About Our ‘Core Security’ Plan!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

We Make I.T. Work!

 

Filed Under: ALERTS, Featured

Parental Controls

September 29, 2014 by The T By D Team Leave a Comment

11Dear Geek, 
My son is now 6 years of age and using my computer. I don’t mind him going onto the computer to play silly little games, but my wife has brought it to my attention that my PC version of Grand Theft Auto is probably not something he is ready for. On top of that, my wife is always scared that when he is on the internet, he will see other things he might not be ready to see until he is at least 35. Is there an easy way to put child blocks on the computer?
Sincerely,
Still want to play GTA5

 

Dear GTA,

 

You can use Parental Controls to help manage how your 6 year old can use the computer. Some examples of limits you can set are; types of games they can play by rating, programs they can run, web filtering, and even a time limit on game play.

When the Parental Control blocks access, it will bring up a notification saying it has been blocked, and ask for your information in order to open it up.

Before you can set up the Parental Controls, you must own your own administrator account. You must also make sure that your child has a Standard User account, and not an administrator account, as Parental Controls cannot be applied to an administrator account.

First you have to open Parental Controls by clicking the Start button, clicking Control Panel, and then, under User Accounts and Family Safety, clicking Set up parental controls for any user.‌ If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Then you click the standard user account that you want to set Parental Controls for. Under Parental Controls, click on enforce current settings.

Once you’ve turned on Parental Controls for your child’s standard user account, you can adjust the following individual settings that you want to control:

• Time limits.You can set time limits to control when children are allowed to log on to the computer. Time limits prevent children from logging on during the specified hours. You can set different logon hours for every day of the week. If they’re logged on when their allotted time ends, they’ll be automatically logged off.

• Games. You can control access to games, choose an age-rating level, choose the types of content you want to block, and decide whether you want to allow or block unrated or specific games.

• Allow or block specific programs. You can prevent children from running programs that you don’t want them to run.

Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

ALERT: POS Machine Updates

September 24, 2014 by The T By D Team Leave a Comment

point-of-sale-systemAlert:  POS System Updates

It has come out that the security breaches at Target and Home Depot had yet another thing in common. Both security breaches were both allowed by a vulnerability in XP embedded that was more than 10 years old.

The XP embedded, which is used in their POS systems was Windows XPe SP3, which is not the last version of the XP-based embedded OSen.

In both cases, the security breach could have been avoided if they had upgraded to Windows 7 for Embedded Systems.

Specific malware has been created the past decade for embedded XP systems, which uses a technique called “RAM scraping”. Once the malware is in the system, it can pretty much do what it wants and take as much credit card data as it would like.

This is possible because Windows XP has relatively weak memory access protection, whereas Windows 7 memory protection is much better.

There’s two big points to be made here:  1.  Don’t skimp on IT support, and 2.  Make sure you upgrade your computer.
Had these companies not skimped out on their IT support, their computers would have been properly protected, and there would have been no security breach.
Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

How to Remove Deceased Accounts

September 22, 2014 by The T By D Team Leave a Comment

Facebook-OutlivingDear Geek,
My Mother just passed away, and because she was a big person for keeping in contact with everyone in the family, she had everything from email to a Facebook account. I left her Facebook all of her online stuff for a bit, but I am wanting to take it down now and have some closure. Is there any way to de-activate this stuff?
Sincerely,
Wanting closure

 

Dear closure,

We are sorry for you loss, and yes, although leaving a Facebook page up for a while can help with some of the emotion, taking it down after a while often helps with closure.

Because many people save their passwords and usernames on their computers, the first step would be to log into their computer user and access their account and either modify it or delete it. If they have a password on their computer, or their user, this may not be a good option for you. You can use the password hint to help figure it out, but if you still can’t get it, there will be ways to delete the user from an administrator account (if it’s a shared computer).

If you have access to the person’s email account, you can use the “lost password” feature on most websites, including Facebook and YouTube.

Many websites also have pages to report the account of the deceased person:

Facebook:
https://www.facebook.com/help/contact/305593649477238

Gmail
https://support.google.com/mail/answer/14300?hl=en
World of Warcraft
https://us.battle.net/support/en/

Any other accounts can be removed by contacting a support person on their support page.

Email accounts such as Gmail accounts of Hotmail accounts will also expire after not being used for a year. So you can also let these expire, it’s one less thing to worry about.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.
Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

 

Filed Under: FAQ, Featured

Alert: Home Depot Hacked

September 22, 2014 by The T By D Team Leave a Comment

Home Depot Hacked

Alert:  Home Depot Hacked

 

After Target was hacked, execs at Home Depot Inc. put together a task force to prevent being the victim of a similar attack.

 

The task force recommended to fully encrypt any payment card information at all of the chain stores, but it wasn’t until months later that the work was begun.

The reason for this kind of action is that they thought they could defend against a hack like this, and apparently gave the wrong priority to the possibility that they had already been breached. Instead of prevention, they should have focused on the detection of the existing breach and getting the hackers out of their network.

The data breach is very similar to the breach that occurred at Target. The malware used to steal card data from Home Depot had the same code base as the tool used against Target, said the people who analyzed. (The data is generally vulnerable in the brief moment it passes into the system’s memory after the card is swiped.) After analyzing the malware, it was found that in both “malwares’, the code had Russian words in it.

It is a possibility that the hackers accessed Home Depot the same way they accessed Target, and used spear-phishing to access one of the Home Depot vendors.

If Home Depot and Target can be vulnerable to spear-phishing attacks, so can you.
Ask About Our ‘Core Security’ Package!

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Turning Off GIFs

September 15, 2014 by The T By D Team Leave a Comment

Dear Geek,
There is a website that I need to use for work, but unfortunately, it looks like a 7 year old child made the page. There are these flashing GIFs all over the place, and I find them distracting and annoying. I know this is someone else’s website, but other than emailing the author of the website to take those pictures down, is there anything I can do to stop them from flashing?
Sincerely,
Annoyed.

images-3

 

Dear Annoyed,

There is a way to turn off animated GIFs in your internet browser. This will not work for Flash or Java animations, but just GIFs. Because there are multiple internet browsers, there are a few ways to turn the animated GIFs off.

In the Internet Explorer menu bar, click on Tools and then Options. In the Internet Options window that opens, click on the Advanced tab, then scroll down about half way and find the option for Play animations in webpages. Uncheck the box next to this option and click the OK button. Close and restart the browser for the setting change to take effect.

In the Firefox address bar, type about:config. Click the I’ll be careful, I promise button. In the Filter bar, type image, then find the entry for image.animation_mode. Double-click this option and set the value to none in the pop-up window and click the OK button. Close and restart Firefox for the setting change to take effect.

At this time, there is no option for turning off animated GIFs in Google Chrome. Several people have developed extensions (add-ons) that can sometimes “pause” the animated GIFs, but they do not turn off the animated completely.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.
Computer Troubles?

Call 1-204-800-3166

We Make I.T. Work!

Filed Under: FAQ, Featured

ALERT: Hackers Attempting To Access BitCoin Wallet

September 10, 2014 by The T By D Team Leave a Comment

bitcoin-wallet

Alert:  Hackers Attempting to Access BitCoin Wallets

 

A recent study has shown that phishing attacks using Bitcoin as scam-bait have a much higher click through rate than other campaigns.

In the past while, new criminal phishing campaigns have started claiming that hackers have tried to access your “Bitcoin Wallet”, even if you do not have a wallet with this kind of currency.

The email subject is a bogus alert of a “Suspicious sign-in attempt” and to make sure no Bitcoins are stolen, you are supposed to reset your password. The email even has a “case incident” number to make it look official.

BitCoin Scam

Do not click on any attachments!

If you are suspicious that your BitCoin Wallet has been tampered with, manually look up your BitCoin wallet (do not click on the link provided – manually type the URL, or address).

Ask About Our ‘Core Security’ Package!

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Charging Batteries

September 8, 2014 by The T By D Team Leave a Comment

Dear Geek, 

I bought a new laptop, and I’ve just had a lot of friends tell me different things about how to prolong the battery. I had one friend tell me that I should discharge the battery before charging it completely back up, and another that they should be charged between 40%-80%. What’s the best way to keep your lithium-oin battery in the best condition possible?

Sincerely, 

Dead Battery

 

Dear Charged,

There is a lot of confusion about this because lithium-ion batteries are a lot different than the older, nickel-based batteries.There are a few things you can do to help.

The first thing is to preform shallow discharges instead of discharging to 0% all the time. Lithium-ion batteries do best when you discharge them for a bit, then charge them up for a bit. Studies on the subject show that discharges to 50% are better for your battery’s long-term life than, say, small discharges to 90% or large discharges to 0% (since the 50% discharges provide the best number of cycles-to-usage ratio).

Lithium-ion batteries also don’t need to be charged to 100%, they actually prefer not to be. When possible, it is good to keep your battery in the 40%-80% range to prolong the life of the battery. If you do charge it to 100%, do not leave it plugged in. This as well can hurt the battery.

Another important thing to remember is that you need to keep the battery (and the rest of your laptop) cool. A hot battery will degrade in heath much quicker than a cool one.

Keep these things in mind and your battery will last longer. But if needed it’s okay to discharge to 0% or charge to 100%. Remember that your battery is going to die in a few years, no matter what you do—even if you just let it sit on a shelf.

If you have a question for our Resident Geek, send it to: geek@tbyd.ca.

We’ll translate it from Geek-lish to English, so it actually helps!

Filed Under: FAQ, Featured

  • « Previous Page
  • 1
  • …
  • 21
  • 22
  • 23
  • 24
  • 25
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in