IT Consulting and Tech Support Blog

Monthly Archives: March 2012

Critical Security Update for Adobe Flash Player

Adobe has issued a recent security update for its Flash Player software that fixes at least two critical vulnerabilities. Finally, this latest version will also include an auto-updating function which will streamline the deployment of Flash security fixes across multiple browsers. Do you feel as if every time you…

Posted in Technology Trends, Web Security | Tagged , , , , | Comments Off on Critical Security Update for Adobe Flash Player

MasterCard and Visa are warning banks about a possible breach…

MasterCard and Visa are warning banks about a possible breach at a credit card processor, according to a report from Krebsonsecurity.com. Update, 4:45 pm: Atlanta based processor Global Payments just confirmed the breach via press release. Their full statement is below: “Global Payments Inc. (NYSE: GPN),…

Posted in Uncategorized | Tagged , , , , | Comments Off on MasterCard and Visa are warning banks about a possible breach…

Microsoft Co-founder Falls Victim To Identity Theft

Federal authorities this month charged a US Army deserter with identity theft after being caught stealing credit card information from one of the richest men on the planet, Microsoft co-founder/multi-billionaire Paul Allen. Brandon Lee Price, an AWOL soldier from Pittsburgh swiped Allen’s Citibank credit card…

Posted in Uncategorized | Tagged , , , , | Comments Off on Microsoft Co-founder Falls Victim To Identity Theft

How a Financial Botnet Infects Your Computer

An animation demonstrating how a financial botnet like Zeus infects a person’s computer. Zeus is a Trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. Zeus is very difficult to detect…

Posted in Exploits, Vulnerabilities, Web Security | Tagged , , | Comments Off on How a Financial Botnet Infects Your Computer

“RDPKill” Hack Tool

F-Secure’s blog is reporting about a tool that exploits MS12-020 vulnerabilities. Since the public release of Microsoft’s MS12-020 bulletin , there have been plenty of attempts to exploit vulnerabilities in the Remote Desktop Protocol(RDP). Recently, a new tool appeared called “RDPKill by: Mark DePalma” that was designed to…

Posted in Exploits, Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , | Comments Off on “RDPKill” Hack Tool

Enter the world of hackers and cyber sleuths

The internet is touted as one of the most important inventions in the history of modern man, and like the discovery of the atom, its ability to benefit mankind is matched only by its potential to unleash massive destruction. Web Warriors is a one-hour documentary…

Posted in Exploits, Technology Trends, Vulnerabilities, Web Security | Tagged , , , | Comments Off on Enter the world of hackers and cyber sleuths

Fake AVG Scam on Twitter

There’s been a spike of activity recently regarding AVG and its products. The tweets contain a link, hidden by a link-shortener and encourages users to go a website made-up to look exactly like the official AVG site.

Posted in Exploits, Security Products, Social Networks, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , | Comments Off on Fake AVG Scam on Twitter

Tech Support Scammers Target Windows Users and Anti-virus Customers by Phone

Tech support scammers have started targeting Windows users and various antivirus customers according to reports from antivirus vendors Avast and ESET. In order to trick victims into believing that their computers have a problem, scammers commonly leverage the Windows Event Viewer, a legitimate Microsoft application…

Posted in Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , | Comments Off on Tech Support Scammers Target Windows Users and Anti-virus Customers by Phone

Rogue AV Remains a Popular Threat Tactic

Over past few months, the news has been all about who got hacked, what software is vulnerable and should be patched, and what the latest Web threat is like, which ranges from simple spam to those deemed as advanced persistent threats (APTs). Between the “least dangerous” and the…

Posted in Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , | Comments Off on Rogue AV Remains a Popular Threat Tactic

Latest malware trends

Top 10 threats on the Internet № Name % of all attacks Change in ranking 1 Malicious URL 91.26% 0 2 Trojan.Script.Iframer 5.81% 0 3 Trojan.Script.Generic 2.15% 0 4 Trojan-Downloader.Script.Generic 0.95% 2 5 Trojan.Win32.Generic 0.47% -2 6 Trojan-Downloader.JS.Agent.gmr 0.43% new 7 Trojan-Spy.JS.Agent.c 0.37% -2 8…

Posted in Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , | Comments Off on Latest malware trends