Need Customer Support?click here

Posts Tagged as security (page 7)

What’s Next for Conflicker?

April fool’s day came and went, but so far the much feared attack from Conflicker never materialized, leaving security researchers to ponder what’s next for the notorious Internet worm . Although it didn’t release any detectable malicious payload, the arrival of April 1 did trigger a change in its behavior, with experts finding a finding a changed domain generation algorithm that opens up unfettered communication to 500 of the 50,000 potential newly generated domains. The latest variant, Conficker C , now has the ability to contact its command and control centers for further instructions while circumventing interference from the security community, which up until now had been able to block communication with its parent domains. At this point users are still advised to patch their operating systems or to seek the assistance of their IT service providers to make sure all variants of the worm has been removed. Read more at Channel Web .

Continue reading »

Protecting Against the Rampant Conficker Worm

PC World posts a nice overview of the highly infectious Conflicker Worm. The Worm is dangerous as it uses several methods of attack. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly. The worm can download and install additional malware from attacker-controlled Web sites as well. Since that could mean anything from a password stealer to remote control software, a Conflicker-infected PC is essentially under the complete control of the attackers. Conficker and other worms are typically of most concern to small businesses that don’t regularly update the desktops and servers in their networks. If you’re not sure your network security is up to day get some help to find out. Read more at PC World…

Continue reading »

How Much is Conficker Really Affecting the Enterprise?

Lately, we have been hearing about how quickly the Conficker Worm is spreading. News sources have pegged the number of infections in the neighborhood of 3.5 million computers. Given that Microsoft issued a patch for the flaw targeted by the Conficker worm and the use of strong passwords can prevent much of the spread, it seems odd that enterprises (large corporations) with network management would be hurt by the worm. But sometimes enterprise security isn’t all it’s cracked up to be. Regardless of your size – small or large you need to make sure you’re taking all available steps to protect your network security. If you’re not sure, get help. Read More at eWeek

Continue reading »

2009 Tech Security Forecast

In 2009, IT experts predict more malware and other attacks on company networks coming from mobile devices, social networks, and faster Internet connections, among other trends. IT experts predict a substantial uptick this year in the number of small businesses using smart phones — as well as flash drives, social networks, and faster Internet connections. While that might make employees more productive, it also increases the security risks a small business faces. Read more at Inc Technology…

Continue reading »

Lemon Juice Email: Keeping Email Messages Secure

As a kid I used to write messages with lemon juice and when the juice dried I had a secret message (or so I thought) that was viewable when held up to the light. Of course these child hood secret messages only work in the mind of a child, but not the corporate shield of real business. For your communications between your employees, your partners or your clients you need to ensure that each email message that needs to be secure, is secure. Read more at Small Biz IT…

Continue reading »

Wi-Fi Security: Block Rogue Access Points

Wireless networks have moved to the small business arena, helping offices spread Internet connectivity and mobility at a low cost, but bringing security concerns. Unauthorized access points can undercut your Wi-Fi security. Read the story on Inc. Technology…

Continue reading »

Help for Recovering Stolen Laptops

A variety of software and services — from Lojack to GadgetTrak — are designed to help recover a lost or stolen notebook computer. These products have become more appealing to businesses of all sizes. Read the story on Inc. Technology…

Continue reading »

Don’t Leave Your Business Open to Cyber Attacks

Simple Steps Businesses Can Take to Protect Themselves from Cyber Crime “When the World Wide Web launched almost 20 years ago, it generated a lot of buzz about how it would revolutionize the way we do business, but many questioned whether these projections were fact or just grand words. Today, few can argue that the Internet has transformed business operations. For example, it has changed the way we share information, talk to employees, advertise jobs and sell services and merchandise to customers. It has opened the door to resources from all over the word. It has become such an essential tool for business success that few can afford not to have a Web presence. But the Internet has done more than change the way we work; it changed the way criminals commit crimes. Cyber criminals view the Internet as a tool they can use to launch daily cyber attacks such as computer viruses, worms, spam, phishing and identity theft, and the Web presence that businesses need to be successful is what makes them vulnerable to these attacks.” Read the story on SmallBizTechnology.com

Continue reading »