Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: WordPress Website Hack

February 9, 2016 by The T By D Team Leave a Comment

WordPress Hack

ALERT:  WordPress Website Hack

 

An alarming number of websites built with popular website-building tool, WordPress, have been hacked, and are delivering the TeslaCrypt ransomware to unsuspecting victims.  

Malware researchers from Malwarebytes and other security firms have reported that a massive number of legit WordPress sites have somehow been compromised, and are silently redirecting visitors to sites with Nuclear Exploit Kit.  As of press time, it is unclear how the WordPress websites are getting infected, but is highly likely that there is a new vulnerability that is being exploited in either WordPress, or one of its plugins.

Malwarebytes Senior Security Researcher Jérôme Segura stated in a blog released last week:

“WordPress sites are injected with huge blurbs of rogue code that perform a silent redirection to domains appearing to be hosting ads.  This is a distraction (and fraud) as the ad is stuffed with more code that send visitors to the Nuclear Exploit Kit.”

The attack tries to conceal itself, and the code forces visitors to be redirected through a series of sites before dropping the ransomware payload.  Once a WordPress server is infected, the malware also installs a variety of backdoors on the machine.askimet Hack Files

 

What to do if You Run WordPress:Update No Excuses
  1. Update server Operating Systems (OS).
  2. Update WordPress.
  3. Delete any plugins you are not actively using, and update patches on any plugins you currently use.
  4. Update all your WordPress instances at the same time to prevent cross-infections.  
  5. Lock down all WordPress instances with a very strong password, as well as the WordPress 2-factor authentication
How to Protect Your Website Visitors:
  1. Keep workstation Operating Systems (OS) and 3rd party apps updated at all times.
  2. Backup your data and keep daily off-site backups.  TEST your backups, and if your restore function actually works (this is often overlooked).
  3. Provide end-users with the 64-bit version of Google Chrome if possible.
  4. Run the latest V5.5 of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) on workstations.
  5. Provide Security Awareness Training.No Backups
Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Your Stolen iPhone Has Been Found

February 4, 2016 by The T By D Team Leave a Comment

iPhone

ALERT:

Your Stolen iPhone Has Been Found

 

The enormous sales of Apple products, also mean that they are a huge target for theft.
Between 3 and 4 million smartphones are stolen every year.  

If you’re like most people your phone tends to be a little bit of everything:  a photo album, a diary, wallet, gaming machine, bank account, and more.  Most people have their entire work and private lives on these devices which can cost up to a thousand bucks.  The cost of losing your phone just starts with the cost of replacement…just take a moment to think about all the personal and financial information your phone contains.  Losing it can feel like a disaster.

CyberCriminals count on this panic, and use it for their gain.  They count on the person wanting to avoid the personal and financial loss, in order to use social engineering against them.  

In this new iPhone scam, people are victimized twice:
  1. Your iPhone gets stolen.
  2. You go online, and turn on the ‘Find My iPhone’ Activation Lock.
  3. Shortly afterwards, you receive an email that your iPhone has been found, but you need to go to this website (they provide a link) and verify your Apple ID.  
  4. You click on the link provided, and enter into your Apple ID credentials.

The link that was provided, was to a fake Apple iCloud site.  When you entered your information, you gave all the information that the CyberCriminals needed to now own your account and unlock the phone.  The CyberCriminals are now free to sell the phone.

There is nothing else for you to do, other than to go to Apple (go to the Apple site, or type in the address into the address bar manually – Not the one provided in the email).  Change your password, and set up a 2-factor verification for your account.

Your iPhone (or iPad) is gone forever.

 

How CyberCriminals Do This:

Since the release of iOS7, Apple has made it entirely possible for CyberCriminals to reset and reformat your iDevice without your iCloud Username and Password.  They simply send an iMessage to the email address that it said it had been locked by, as the default iOS settings mean you can send & receive iMessages to email addresses with an Apple ID.

It’s important to note that iCloud does not provide an IP address or any other details which will help you actually identify your thief.  It basically shows you a map of the general vicinity of the location of the stolen item (could be 1-3 city blocks), and that’s all.  iPhone3

What to do if Your iPhone (or iPad) is Stolen:
  1. Do Not respond to, or click on links, from an address you do not recognize claiming your phone was found.  
  2. Do not click on any links, or open any attachments provided.  Do not call any phone numbers that the message may give you.  
  3. Do not log into any site that you get within an message like this, and do not provide your username and password, or any other credentials.
  4. DO follow the procedures you were given by your phone manufacturer.  If you do not know the procedure, go directly to the manufacturer website to find out.
  5. For Apple go to:  https://support.apple.com/en-ca/HT204315
  6. Deactivate the phone with your wireless provider to prevent the theif from running up a lot of charges on your bill.  Some providers will deactivate your device on their network, which prevents a thief from just resetting the device and slapping in a new SIM card.  Note:  Once you deactivate service, you won’t be able to communicate with your iPhone via ‘Find My iPhone’.  iPhone2
  7. Start taking steps to prevent the criminals from accessing your personal information.  Visit the website for every app and service on your phone, and see if they have the option to logout other devices, revoke tokens, or de-register mobile devices.  This will prevent the thief from simply firing up an app or website and using your saved login info.
  8. File a police report.  It’s unlikely that the police will act upon the theft, but it is important to document the theft, especially if the device turns up later.  Be sure to include a unique identifyer for your device (phone number or serial number).
  9. Change any passwords for email, Facebook, etc.  
  10. Inform your family, friends, coworkers, and all contacts in your address book.  It’s possible that the thief may try to impersonate you through social media or via SMS on a different phone. By letting them know, you can prevent them from being victimized as well by a phone/email scam.
Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Sneaky Scam Gets Past AntiVirus

January 29, 2016 by The T By D Team Leave a Comment

Email scam

ALERT:  Sneaky Scam Gets Past AntiVirus

 

 

Cybercriminals are stepping up their game again!  

 

AntiVirus, AntiMalware detection software and email security apps are so advanced that CyberCriminals have had to find a way around them.

CyberCriminals are sending out emails that antivirus and spam filters don’t catch.

The email itself isn’t malicious, but basically all they are asking you to do (and all they want you to do) is open the attachment.  The attached document itself also isn’t malicious.  However, it does ask you to click on a link contained within the document…

…and this is where the trap door springs shut!

The link leads either to an exploit site/page or to a fake login page for a recognizable service.  This infects your computer!

Do not open attachments you aren’t expecting.  If you can’t verify the sender – don’t click.  If the email or the request is illogical, or unexpected, don’t click.

For more Email Red Flags click:  here.  Feel free to print it out and post it around your office or workplace.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS

Worst Passwords of 2015

January 26, 2016 by The T By D Team Leave a Comment

password

Worst Passwords of 2015

 

As much as we hate it when we are asked to create a password…
which includes 25 non-repeating letters, both upper and lower case,
with at least 5 special characters,
my grammy’s maiden name,
my first-born,
and the middle 6 letters from the 5th elfish tune in Lord of the Rings,
…at least I know that my information and data are secure.

However, not all technology requires such an unguessable password.  And technology users everywhere are still taking full advantage of that fact, and relying on some nauseatingly easy (and common!) passwords. 

password 2

Security applications and services company SplashData released its annual list of the previous year’s worst passwords.  Apparently, some of us aren’t learning our lesson from the hacks of others, as the 2015 edition bears a striking resemblance to the 2014 version.

As hard as it is to believe, “123456” once again tops the list, just like last year (and since the list’s beginning in 2011).  The 2nd in line is no less groan-worthy, “password” is also unchanged from 2014.  Most of the “new” passwords on the lists, are variations of “old faithfuls” that have been on the list since it’s beginning in 2011.  2 new ones have roots “in a galaxy far far away”.

SplashData’s “Worst Passwords of 2015”:
  1. 123456 (unchanged from 2014)
  2. password (unchanged)
  3. 12345678 (Moved up 1 spot)
  4. qwerty (Up 1 spot)
  5. 12345 (Down 2 spots)
  6. 123456789 (Unchanged)
  7. football (Up 3 spots)
  8. 1234 (Down 1 spot)
  9. 1234567 (Up 2 spots)
  10. baseball (Down 2)
  11. welcome (New)
  12. 1234567890 (New)
  13. abc123 (Up 1)
  14. 111111 (Up 1)
  15. 1qaz2wsx (New)
  16. dragon (Down 7)
  17. master (Up 2)
  18. monkey (Down 6)
  19. letmein (Down 6
  20. login (New)
  21. princess (New)
  22. qwertyuiop (New)
  23. Solo (New)
  24. passw0rd (New)
  25. starwars (New)

Morgain Slain, CEO of SplashData states, “we have seen an effort by many people to be more secure by adding characters to passwords, but if these longer passwords are based on simple patterns they will put you in just as much risk of having your identity stolen by hackers…As we see on the list, using common sports and pop culture terms is also a bad idea.  We hope that with more publicity about how risky it is to use weak passwords, more people will take steps to strengthen their passwords and, more importantly, use different passwords for different websites.”

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: FAQ, Featured

ALERT: Dell Tech Support Service Tag Hack

January 19, 2016 by The T By D Team Leave a Comment

Dell

ALERT:

Dell Tech Support Service Tag Hack

 

A number of people using Dell PCs have been contacted by scammers claiming to be Dell Tech Support who had PC-specific data that only Dell could have had.  

 

Every Dell PC sold has a unique service tag number, which the CyberCriminals have gotten somehow.  

Dell posted a warning in October about this phone scam, but did not mention a service tag number hack.  Dell apparently does not know what is going on, and is “investigating”.  

The scam goes something like this…

People are receiving phone calls reporting to be from “Dell Tech Support”.  They have all the correct personal information, including your name, contact numbers, emails, and address, including the computer-specific service tag number, and any ‘ticket’ numbers assigned to any phone calls you made to Dell support, including the issue that the phone calls were about.

They try to manipulate people into downloading software onto their computer that will give the fake “support” access to their computer.  They will not “fix” anything, but you will receive a huge credit card invoice, and may have ransomware infecting your computer.

Ars Technica reports several stories indicating a possible security breach.  

  1. Joseph B. called Dell about a problem with his optical drive.  A few months later, he received a call from a CyberCriminal who knew exactly what his problem was (optical drive), his service tag number, computer model and serial number, and other customer-specific information.  
  2. Patrick Z. reported on a Dell U.S.A Customer Care Board about receiving similar calls.  He stated the CyberCriminals knew his full name, email address, city, phone number, computer service tag, and a real Dell ticket number.  He called the scammers back at the number they provided, and they answered “Dell Software Support”.  Patrick Z. hung up & called Dell support directly [using a publicly available phone number, such as on the Dell website].  When he asked company reps to explain how CyberCriminals had so much information about him, a company employee answered “Dell is aware of this and other complaints and is investigating.  No, there will not be a public post/blog.  We consider this closed from a Forum perspective.”
  3. DJ, an unhappy customer posted in June 2015 that [other than a hack], there is no other way the person would have had my name, cell phone number, and know I had a Dell computer if it didn’t come from your company…”

In a 10ZenMunkeys’ blog post published Jan. 4/16, the author reported he had been contacted by CyberCriminals who knew of every problem the author had ever called Dell about.  None of the problems had ever been discussed in public forums, leading the author to share the suspicion that proprietary Dell data had somehow been breached.  The author reports that the CyberCriminals instructed to enter their domain name into the author’s “Run window”, which would have re-directed to a site to download software to allow remote access to their computer.

There are several other Dell customer complaints regarding the same type of scenarios.   

 

If you receive a phone call reporting to be tech support (from ANY company), and they request you to confirm personal/payment information, or to grant them access to your computer —
HANG UP…IMMEDIATELY.
Delete any email they might send you with similar claims.

 

ONLY give out personal information, if you have initiated the call, and looked up the main company number yourself on the company’s main website.  
Do NOT rely on information in pop-ups, ads, in general internet searches, or on another website or forum, unless you can verify it is a valid source and verify it is a valid phone number for that company.  

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Review: ipets Petrainer Coller

January 14, 2016 by The T By D Team Leave a Comment

iPetsReview:

ipets Petrainer PET916-1 E-CollarPetrainer PET916N1 Collar

Product Description:  

Petrainer PET916-1 has a professional look and is rechargeable, waterproof while delivering professional performance for a starting amateur trainer.  It’s the perfect introductory system for someone new to e-collars who desire to perfect obedience around the house, yard or walks in the park.  Our range of 330 yards will easily cover any household misbehavior and backyard problems.  It features 4 modes:  static shock, vibration, beep and light.  Don’t forget the remote transmitter is also waterproof to ensure it can handle any type of wet conditions.  Lastly, you can always add another collar to the remote transmitter as it can control up to two dogs.

E-Collar Features:
  • Collar Size:  Able to fit small, medium, and large dogs.  15 lbs or larger.  TPU Collar Size from 7 to 26 inches long.
  • Includes one collar, remote transmitter can control up to 2 collars.  (Extra collars sold separately).
  • Battery Type:  Rechargeable lithium batteries for collar receiver and remote transmitter.
  • Water Capabilities:  Waterproof remote transmitter and collar receiver.
  • Range:  UP to 330 yards.
  • Tone/Vibration Options:  100 levels of vibration and 1 level of standard tone.
  • Stimulation Levels:  100 levels of static shock.
  • Easy to read display with blue back light.
  • Quick and straightforward pairing process.
  • Conserves power when not in use to extend battery life.
  • Remote transmitter and receiver can be charged at the same time.
Package Contents:
  • 1 x Remote Transmitter
  • 1 x Collar Receiver
  • 1 x Adjustable TPU Strap
  • 2 x USB Charging Cable
  • 1 x Charger
  • 1 x Test Bulb
  • 3 Sets of Contact Points
What We Think:

We ordered the collar for our then 4 month old Shepard/Lap/Rotti cross.  Our dog is big, and growing much, much bigger.  He is fairly smart, but also has the ‘lab’ excitability/enthusiasm.  The dog had recently started to learn some bad habits, like jumping to ‘nip’ at our 4-year-old’s hands, and not coming when he was called.  We ordered the collar on the internet for approximately $60, as it was at least $100 cheaper than anywhere closer.  It took about a week to get here, granted though, that it was ordered during the Christmas holidays.  

We didn’t want to put our dog through anything that would hurt him, we wanted to use the least amount of deterrent required, we were planning on using the vibration only setting.  We wouldn’t use anything on our dog we were scared to use on ourselves.  So, before trying the collar on the dog, we tried it on our own thighs.  (***Do not try this at home!***)  You have to ensure both ‘prongs’ on the collar unit are sitting firmly on your skin and pressing down slightly on the unit, so the prongs are depressed.  Using the vibration only setting of 10, it felt like a minor vibration of the unit on the collar.  Once we raised the setting to 20, there was a definite vibration, not enough to hurt, but definitely enough to make you stop what you were doing.  

The collar was easy to apply to the dog.  The collar strap was long enough to accommodate any size of dog, but there was no way to secure the excess collar to the collar.  We tried looping it around so it went back through the loop.  However, it didn’t stay looped, so it ended up being loose most of the time, and our dog ended up chewing the excess off.  Problem solved?  The dog got used to the excess bulk of the collar/unit fairly quickly.

At first we used the vibration only setting of 10 whenever he exhibited the behavior we wanted to correct.  The first couple of days, the effect was instantaneous.  He would stop the behavior immediately and come to us.  We made sure not to ‘over-use’ the collar, however, the dog seemed to become de-sensitized to the lowest setting.  So we raised it to 15, then 20 (still vibration only).  At the setting of 20, the collar seemed to be effective again, and has remained effective ever since.  We have had the collar several weeks now, and have not had to increase the vibration setting, nor add any other setting.

Pros:

You choose the behavior deterrent you want/need:  Tone only, Vibration only, Tone and Vibration, Shock.  There are 100 levels of vibration, and 100 levels of shock (“static”).  The remote has a range of up to 300 meters, and both the collar and the remote transmitter are waterproof.  This is great, because we were planning on taking him to the lake with us this summer, and in the boat.  The transmitter is expandable to control 2 collars, which is great if you get another dog.

Cons:

The transmitter is bulky, and although it has a hook to attach it to your belt/pocket, it falls off easily.  So we tend to put it down wherever we are, and forget it.  Also, when one person is upstairs, and one downstairs, the dog follows whoever he wants at the time.  So we find ourselves either forgetting the transmitter there too, or passing it up/down the stairs.  However, this could be a product of the dog behaving for the most part.  

Overview:

The collar/transmitter combo are great and easy-to-use for the beginning trainer.  My only suggestion:  Use the lowest level deterrent you need.  If you need to use the highest level of shock, you may need something more than just the collar/transmitter…try obedience training first, and maybe this just isn’t the dog for you.  

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Reviews

ALERT: Comcast Triple-Threat

December 22, 2015 by The T By D Team Leave a Comment

ComcastALERT:  Comcast Triple-Threat

More and more, legitimate-looking advertising served on major websites turn out to be malicious.  CyberCriminals pay for and post ads, which they hope you click on.  BUT if you click on the malicious ads, you are redirected to a compromised website which may infect your computer and/or disply pop-ups that claim your PC has a virus and provide a toll-free number for “Tech Support” who will “fix” your PC, but really just want your credit card information.

Comcast is the largest ISP in the U.S. and have thousands of business users.  This makes them a prime target for a social engineering attack by CyberCriminals.

Comcast Triple Threat

Threat #1:  Malicious Ad

Comcast has a search page called Xfinity that serves tons of searches.  On this page is a malicious ad (served by Google) from “Sat TV Pro” which claims to compare Direct TV to Comcast TV.  If you click on the ad, you are redirected to a compromised site which has an Exploit Kit (EK) running.

Threat #2:  Infection

The EK first infects the workstation with ransomware, then redirects to a fake Xfinity site.

Threat #3:  Extortion

Comcast Tech Support

The fake Xfinity site pops up, with a message allegedly from “Comcast’s security plugin”.  The message states that the workstation is infection (which is correct, because they just did it!), and the user needs to call “tech support”, for which they provide a toll-free number.  If you call the toll-free number provided, you get fake “Tech Support”, which is actually scammers who try to get your credit card information to “fix” the box.  

How to Avoid This Scam
  1. Keep updates up-to-date to avoid security holes.  
  2. Use up-to-date software.  Old software versions may be cheaper and “familiar”, but they may no longer be supported by their manufacturer.  This means that the software manufacturer no longer releases security patches (to “patch” up known security holes).  This leaves your computer, and any computer on your network, vulnerable.  
  3. Do not click on any suspicious ads or links (in ads or in emails).
  4. Do not open emails or click on links from unknown senders.
  5. Do not open emails or click on links from “uncharacteristic” emails from known senders.  Example – it’s unlikely that the CEO of your company, or your Great-Aunt Freda, would send you penis-enlargement information.
  6. Make sure staff and employees know about current security alerts.  Not sure what they are?  Visit our ALERTS page to find out!
  7. Provide Security Awareness Training for your employees.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

Definition: Ransomware

December 22, 2015 by The T By D Team 2 Comments

Definition:  Ransomware

Malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.  Ransomware software has the ability to lock a computer screen, or encrypt computer files.  

Filed Under: Definitions

Definition: Malicious Ads

December 22, 2015 by The T By D Team 1 Comment

Definition:  Malicious Ads, or Malvertising

Using online advertising to spread malware.  Malvertising (short form for malicious advertising), requires placing ads filled with malware, on legitimate website pages and through authentic online advertising networks in order to infect a web browser and device.  (PC, or mobile device).  

Web publishers unknowingly allow what appears to be a legitimate ad to be placed on one of their webpages.  In reality, the ad contains malware.  Once someone clicks on the ad, their computer becomes infected with malware.  

Sometimes the ads come in “alert” form, such as a warning that there is a malware infection, in order to use scare tactics via social engineering, to get the user to act quickly.  Note:  Users will NEVER receive a legitimate warning about malware infections via an ad through their browser.  Alerts like those only come from a comprehensive Internet security program.  

Another way the malvertising infects a computer is simply by the user loading the infected page, which is also known as a drive-by-download.  Drive by downloads can be installed on your computer simply by looking at a spam email, browsing a compromised website, or via a malicious pop-up window.  The ad is full of links that make browsers acquire software from harmful websites and pages via known security holes in unpatched web browsers (NOTE:  This is one reason it’s so important to keep your patches up-to-date!).

 

Filed Under: Definitions

Definition: Drive-By Download

December 22, 2015 by The T By D Team 1 Comment

Definition:  Drive-By Download

A download that occurs when a user visits a malicious website that is hosting an exploit kit.  There is no action required on the user’s part, other than simply visiting the infected webpage.  The exploit kit looks for a vulnerability in the browser software, and uses it to inject malware via the security hole.

Filed Under: Definitions

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in