443-992-7394

Cybersecurity News: Microsoft PCs are infected before reaching Consumers

It has not been a good couple of weeks for Microsoft. First, they discovered that Hackers had found a Security Hole in Internet Explorer. Now, the computer company has discovered that many of their PCs and laptops made in China were embedded with malicious software before ever reaching the consumer. The computer virus allows hackers to switch on a microphone or Webcam, record keystrokes, and access login credentials and online bank accounts.

And because computer companies rely on such a long and complex supply line, the malicious software could have been uploaded at any point, something Richard Domingues Boscovich, the assistant general counsel for the Microsoft Digital Crimes Unit, called “especially disturbing.”

“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend Micro. “There’s not really a solution unless you start to only build computers in the USA again.”

This isn’t the first time this has happened either. In 2008, the Defense Department and Federal Aviation Administration unknowingly purchased counterfeit Cisco routers, which were pre-loaded malicious software. FBI investigators found the routers allowed hackers to “gain access to otherwise secure systems.”

Then in May, the Senate Armed Services Committee released  a report citing 1,800 cases of counterfeit electronics from China, electronics used in the Air Force’s largest cargo plane and Special Operation helicopters.

“Companies are in a competitive dogfight to make products cheaper and hit the market faster,” said Scott Aken, a former FBI special agent who dealt with cyber counterintelligence. “They’re not spending time or money to ensure those products they are sourcing from overseas are devoid of counterfeits.”

So what are consumers to do?

Boscovich offers this simple advice: Consumers can often spot dangerous counterfeit technology if the deal “appears too good to be true.”

“However, sometimes people just can’t tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Pre-Infected PCs Expose Flaws In Global Supply Chain

Olympic-Themed Internet Phishing Scams :: Cybersecurity Tips

Every four years, the best athletes gather from around the globe to compete in the Olympics. Unfortunately, the Olympics also provide Internet scammers with a new outlet to try and phish information from unsuspecting and trustworthy individuals.

What is Phishing?

Phishing refers to attempting to acquire personal information – such as usernames, passwords, and credit card information – and money by masquerading as a trustworthy entity.

Olympic-Themed Phishing Scams

  • London 2012 Ticketing Team: This phishing scam sees scammers pose as ticketing officials offering unsuspecting individuals with an once-in-a-lifetime opportunity to purchase Olympic tickets that have been made available because of a previous bidder’s inability to pay for them. However, unlike the previous bidder, you are expected to pay upfront. This is why the original email is followed by a phone call asking for credit card information.
  • London Olympic Cash Officer: Unsuspecting individuals are sent an email from the “London Olympic Cash Officer” stating that the recipient has been randomly selected to receive a cash prize of 1.6 million GBP. However, to receive the payment the individual must provide personal information.
  • Dr. Beavis: Unsuspecting individuals are sent an email (signed by Dr. Beavis) stating that they, along with 6 other individuals, have been randomly selected as the winners of 7 million GBP. And, of course, they must provide personal information to claim their prize.
  • You are needed … Get Back to Us: Unsuspecting individuals are sent an email headed “You are needed … Get Back to Us.” It informs the recipient that they are needed to participate in the Olympics as a coordinator or event staffer. The individual is then directed to a site where they must input personal information and provide payment for the placement services.
  • Ring Steward: Unsuspecting individuals are sent an email (or letter) informing them that they have been selected to be a ring steward in the Olympics. Recipients are asked to call a phone number for additional details. And guess what? They are then asked to provide personal information.
  • Text Message Scams: Yep, phishing scams can include text messages, as well. This phishing scam involves a text message stating that the recipient has won 300,000 pounds in the London 2012 lottery. Recipients are then asked to call a phone number and provide personal information to claim their prize.

And this is just the beginning!

If you have any questions about Internet Phishing Scams and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

10 Olympics-Themed Phishing Scams To Avoid At All Costs

Another Website Hacking Incident: What the LinkedIn & DropBox Hacks mean

First there was the infamous LinkedIn hack a few months ago. Now, another major website has been attacked, Dropbox.

“Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts,” said Aditya Agarwal, VP of engineering at Dropbox. “We’re sorry about this, and have put additional controls in place to help make sure it doesn’t happen again.”

In instances such as these, hackers breach a website to steal usernames and passwords in hopes that these login credentials work for other services, as well. If they do, these hackers harvest personal data to use in future scams.

Protecting your Information: Simple IT Security Tips

The only way to truly prevent cyber-attacks is completely avoid using the Internet, which is nearly impossible these days. There are, however, several ways in which you can make your business network more secure. These security tips include:

  • Stop Password Reuse: Do not use the same password for multiple accounts. Yes, using multiple passwords will not be as easy to remember, but it will make you much less susceptible to cyber-attack.
  • Reset your Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Choose your Security Question Carefully: Don’t make it too easy for hackers to access your information. Do not use personal information or basic information that can be found on the Internet.
  • Be Careful: Only access the Internet over a secure network.
  • Keep Everything Up to Date: Keep your operating system, browser, anti-virus and other critical software up to date.
  • Outsourced IT Security Services from Working Nets: Data protection is crucial. Working Nets assures that your vital business data is available when you need it by implementing tools to protect you!

If you have any questions about Hackers, Hacking, and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

The Benefits of Outsourced Disaster Recovery :: Maryland IT Support

With so much of your business relying on technology, you cannot afford to lose critical data. The outcomes could be disastrous to your business. In fact, of companies that had a major loss of business data…

  • 6% Survived
  • 51% Closed Within 2 Years
  • 43% Never Recovered!

So what do you do when disaster strikes?

Do you have a plan in place?

Don’t wait until disaster strikes to step back and look at what you could have done differently. Now is the time to act. Now is the time to address Disaster Recovery.

What is Disaster Recovery?

Disaster recovery is the process and procedures your business puts in place for the recovery of your technology infrastructure and critical data after a natural or human-induced disaster.

What is Outsourced Disaster Recovery?

Companies of all shapes and sizes – from small businesses to Fortune 500 companies – are beginning to realize the importance of disaster recovery. But what do you do if you cannot afford to hire an in-house IT technician?

You outsource your disaster recovery needs to Working Nets, your virtual IT department! We assure that your vital business data is available when you need it.

What are the Benefits of Outsourced Disaster Recovery?

  • It is often cheaper to outsource your IT needs than it is to hire an in-house IT professional. Plus, you can utilize an entire team of IT experts without having to pay a single salary!
  • There are no upfront technology or storage costs.
  • There are no hardware maintenance costs.
  • There are no software subscriptions.
  • Peace of Mind!

So do the right thing for your business and outsource your disaster recovery to Working Nets!

If you have any questions about Outsourced Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Deptartment!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Data Storage: 10 Compelling Reasons for Outsourcing Disaster Recovery

Outsourcing Disaster Recovery versus traditional in-house methods

Disaster Recovery Services FAQ

Disaster Recovery Guide