Latest Article

You may want to unlock the iPhone 8 with your face, not finger – CNET August 22, 2017

The iPhone 8’s facial recognition is rumored to sense faces in millionths of a second — faster than you can say “cheese.” Source: CNet

Loading images...

Cyber Crime- Are Your Client, Student, and Patient Personal and Financial Records Safe?

Credit N.Y. Times 12/10/15 Personal Tech

http://paidpost.nytimes.com/norton/cybercrime-gets-personal.html?om_ext_cid=hho_ext_display_nr_greysf_299_US_599729_15438498

On a personal level we can always take steps to protect ourselves on a higher level. However, Are You Ready to prevent an attack on your entire company or institutions data history and payment information? 27-cybercrime-700x350MSI NET Can Give you the added layers of safety and with installation and daily maintenance of programs you are going to want to spend five minutes hearing more about. Call 718-921-6136 Ext 109 for a brief explanation, not a sales pitch. Visit us at msiny.com anytime.

Cyber Crime – Are Your Student, Client, and Personal Records Truly Safe?

Credit N.Y. Times 12/10/15 Personal Tech

http://paidpost.nytimes.com/norton/cybercrime-gets-personal.html?om_ext_cid=hho_ext_display_nr_greysf_299_US_599729_15438498

On a personal level we can always take steps to protect ourselves on a higher level. However, Are You Ready to prevent an attack on your entire company or institutions data history and payment information? 27-cybercrime-700x350MSI NET Can Give you the added layers of safety and with installation and daily maintenance of programs you are going to want to spend five minutes hearing more about. Call 718-921-6136 Ext 109 for a brief explanation, not a sales pitch. Visit us at msiny.com anytime.

 

The Trend Grows-Online Purchases Shift Further to Smartphone Users

Author Credit: Bill Murphy Jr. Please Visit- www.inc.comshopping smartphone

Click Here to read full article

TA15-337A: Dorkbot

Original release date: December 03, 2015

Systems Affected

Microsoft Windows

Overview

Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in over 190 countries over the course of the past year.” The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and Microsoft, is releasing this Technical Alert to provide further information about Dorkbot.

Description

Dorkbot-infected systems are used by cyber criminals to steal sensitive information (such as user account credentials), launch denial-of-service (DoS) attacks, disable security protection, and distribute several malware variants to victims’ computers. Dorkbot is commonly spread via malicious links sent through social networks instant message programs or through infected USB devices.

In addition, Dorkbot’s backdoor functionality allows a remote attacker to exploit infected system. According to Microsoft’s analysis, a remote attacker may be able to:

  • Download and run a file from a specified URL;
  • Collect logon information and passwords through form grabbing, FTP, POP3, or Internet Explorer and Firefox cached login details; or
  • Block or redirect certain domains and websites (e.g., security sites).

Impact

A system infected with Dorkbot may be used to send spam, participate in DDoS attacks, or harvest users’ credentials for online services, including banking services.

Solution

Users are advised to take the following actions to remediate Dorkbot infections:

  • Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. Even though Dorkbot is designed to evade detection, security companies are continuously updating their software to counter these advanced threats. Therefore, it is important to keep your anti-virus software up-to-date. If you suspect you may be a victim of Dorkbot, update your anti-virus software definitions and run a full-system scan. (See Understanding Anti-Virus Software for more information.)
  • Change your passwords – Your original passwords may have been compromised during the infection, so you should change them. (See Choosing and Protecting Passwords for more information.)
  • Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. You should enable automatic updates of the operating system if this option is available. (See Understanding Patches for more information.)
  • Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (see example below) to help remove Dorkbot from their systems.
  • Disable Autorun­ – Dorkbot tries to use the Windows Autorun function to propagate via removable drives (e.g., USB flash drive). You can disable Autorun to stop the threat from spreading.

Microsoft

http://www.microsoft.com/security/scanner/en-us/default.aspx

The above example does not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.

References

Revision History

  • December 3, 2015: Initial Publication

This product is provided subject to this Notification and this Privacy & Use policy.

Source: CERT

How Can CISCO Meraki Mobile Device Management Help YOU…?
Using Cisco Meraki Systems provides easy centralized management, diagnostics, and monitoring for mobile devices connected to your organization — from iPads and Androids to Macs and PCs. We can monitor these devices, showing client hardware/software information and recent location, and even lets administrators remotely lock and erase devices. Enforce policies across mobile devices administered by your organization. Protect devices and their data, control their usage with fine-grained passcode policies, and restrict access to the app store, gaming, and content. Instead of manually provisioning devices for network connectivity, or relying on end users to do so, configure settings such as WPA2-Enterprise in the dashboard, and let the cloud push the settings to end-user devices.

 

While user-owned devices have exploded onto networks everywhere, it’s imperative to keep network access secure without causing an undue IT burden. Improve the security of BYOD (Bring Your Own Device) initiatives by enforcing data encryption, remotely wiping lost devices, and even restricting network access to managed devices. Cisco Meraki wireless has built-in support for BYOD, making it easy to securely support BYOD — without extra appliances, licenses, or complex configuration.

 

Layer 7 client fingerprinting technology integrated into all Cisco Meraki products lets you see all the devices on your network, with no configuration required. Client devices are automatically identified and classified, letting you distinguish between mobile devices, desktop PCs, see device operating systems, and even see device hardware manufacturers. See how many BYOD clients have connected, measure the bandwidth they’ve used, and even see their percentage of total traffic.

meraki mdm

Did Cyber Monday Slow Your Company Down? Don’t Wait

 

Credit to:
The New York Times

http://www.seattletimes.com/business/target-and-paypal-sites-report-problems-on-cyber-monday

Some of the most popular websites experienced an overload on Monday, similar to a crowd pushing its way into an already packed brick-and-mortar store.  Check out this article on how some popular retailers seemingly fell short of providing a smooth customer on line shopping experience.

We can fix your headaches today! A user friendly website for navigating and purchases is essential to growing your business. Call us @ 718-921-6136 ext. 109 If your current maintenance and service provider isn’t giving you the attention you deserve!