IT Consulting and Tech Support Blog

Monthly Archives: March 2012

Critical Security Update for Adobe Flash Player

Adobe has issued a recent security update for its Flash Player software that fixes at least two critical vulnerabilities. Finally, this latest version will also include an auto-updating function which will streamline the deployment of Flash security fixes across multiple browsers. Do you feel as if every time you…

Posted in Technology Trends, Web Security | Tagged , , , , | Leave a comment

MasterCard and Visa are warning banks about a possible breach…

MasterCard and Visa are warning banks about a possible breach at a credit card processor, according to a report from Krebsonsecurity.com. Update, 4:45 pm: Atlanta based processor Global Payments just confirmed the breach via press release. Their full statement is below: “Global Payments Inc. (NYSE: GPN),…

Posted in Uncategorized | Tagged , , , , | Leave a comment

Microsoft Co-founder Falls Victim To Identity Theft

Federal authorities this month charged a US Army deserter with identity theft after being caught stealing credit card information from one of the richest men on the planet, Microsoft co-founder/multi-billionaire Paul Allen. Brandon Lee Price, an AWOL soldier from Pittsburgh swiped Allen’s Citibank credit card…

Posted in Uncategorized | Tagged , , , , | Leave a comment

How a Financial Botnet Infects Your Computer

An animation demonstrating how a financial botnet like Zeus infects a person’s computer. Zeus is a Trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. Zeus is very difficult to detect…

Posted in Exploits, Vulnerabilities, Web Security | Tagged , , | Leave a comment

“RDPKill” Hack Tool

F-Secure’s blog is reporting about a tool that exploits MS12-020 vulnerabilities. Since the public release of Microsoft’s MS12-020 bulletin , there have been plenty of attempts to exploit vulnerabilities in the Remote Desktop Protocol(RDP). Recently, a new tool appeared called “RDPKill by: Mark DePalma” that was designed to…

Posted in Exploits, Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , | Leave a comment

Enter the world of hackers and cyber sleuths

The internet is touted as one of the most important inventions in the history of modern man, and like the discovery of the atom, its ability to benefit mankind is matched only by its potential to unleash massive destruction. Web Warriors is a one-hour documentary…

Posted in Exploits, Technology Trends, Vulnerabilities, Web Security | Tagged , , , | Leave a comment

Fake AVG Scam on Twitter

There’s been a spike of activity recently regarding AVG and its products. The tweets contain a link, hidden by a link-shortener and encourages users to go a website made-up to look exactly like the official AVG site.

Posted in Exploits, Security Products, Social Networks, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , | Leave a comment

Tech Support Scammers Target Windows Users and Anti-virus Customers by Phone

Tech support scammers have started targeting Windows users and various antivirus customers according to reports from antivirus vendors Avast and ESET. In order to trick victims into believing that their computers have a problem, scammers commonly leverage the Windows Event Viewer, a legitimate Microsoft application…

Posted in Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment

Rogue AV Remains a Popular Threat Tactic

Over past few months, the news has been all about who got hacked, what software is vulnerable and should be patched, and what the latest Web threat is like, which ranges from simple spam to those deemed as advanced persistent threats (APTs). Between the “least dangerous” and the…

Posted in Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , | Leave a comment

Latest malware trends

Top 10 threats on the Internet № Name % of all attacks Change in ranking 1 Malicious URL 91.26% 0 2 Trojan.Script.Iframer 5.81% 0 3 Trojan.Script.Generic 2.15% 0 4 Trojan-Downloader.Script.Generic 0.95% 2 5 Trojan.Win32.Generic 0.47% -2 6 Trojan-Downloader.JS.Agent.gmr 0.43% new 7 Trojan-Spy.JS.Agent.c 0.37% -2 8…

Posted in Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , | Leave a comment