China has been a long-term participant in upping the potential of malware, but it appears they have reached a new peak with their Daxin malware.

In a quite remarkable statistic, it’s estimated that nearly half of all PCs in China are infected with malware. Clearly, the distribution of malware within the country is a hardened campaign and, not surprisingly, China is also responsible for producing some major malware designers. And, despite all their ‘successes’ in the world of hacking, they aren’t about to rest on their laurels. Researchers from Symantec have discovered that the Daxin malware represents a sophisticated threat to PCs all over the world.

New malware threats emerge every day, but occasionally a head-turner appears on the scene, and it pays to take notice of it.

What is Daxin?

The earliest evidence of Daxin, in its most basic form, dates back to November 2013 when it was first discovered in a number of cyber-attacks e.g. versions of the Exforel malware. Given the time that has elapsed since then, Daxin has evolved into a highly sophisticated hacking tool.

Using an infected Windows kernel driver, Daxin’s main objective is to establish backdoor access on any PC that it infects. Once this has been established, Daxin strives to keep its presence hidden through a number of stealthy processes. It does this by implementing advanced communication techniques to hide itself within normal network traffic. Daxin is also capable of sending single commands across entire networks which have been infected, this allows it to work at a devastating pace and inflict maximum damage.

One of the most sophisticated aspects of Daxin is that it can hijack TCP/IP sessions; this means that it can identify patterns in internet traffic and use this knowledge to disconnect legitimate users and ‘steal’ their pathway. Not only does this give hackers unauthorized access, but it also allows them to blend into seemingly normal traffic and remain undetected. While Daxin is certainly a sophisticated piece of code, it also employs more traditional techniques such as downloading further malware and spreading this throughout infected networks.

How Do You Beat Daxin?

The precise details of Daxin’s infection methodology haven’t, as of yet, been revealed, so it’s difficult to give a definitive answer on the best way to protect your PC. Nonetheless, these best security practices should provide you with a significant level of protection:

  • Always Use Official Upgrades: one of the most crucial elements of protecting a PC is by installing updates, but you need to make sure these are genuine. Accordingly, head straight to the manufacturer of specific hardware/software to guarantee you are downloading the correct updates.
  • Monitor Network Traffic: while Daxin is certainly stealthy when it comes to network activity, it still makes sense to monitor your network. Anything which looks even slightly suspicious should be scrutinized closely and a contingency plan activated to reduce potential damage.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


There never seems to be enough hours in the working day, so maximizing productivity is crucial. But how exactly do you go about doing this on a PC?

Using a PC in the workplace has revolutionized the way in which we work. However, the sheer range of possibilities contained within a PC mean that it’s difficult to understand each one. It’s important, therefore, to get to grips with the techniques that will save you time and make life easier. Implementing these into your daily routines is hassle free and will make a difference almost instantly. Not only will this help you as an individual, but it will also benefit your organization. The question is, though, where do you start?

Maximizing Your Productivity

The 5 best ways to give your PC productivity a boost is by carrying out the following:

  1. Use a Calendar App: A lack of focus and planning is the biggest obstacle that productivity can face. But the modern business world is packed full of distractions. Accordingly, navigating your way through the day can feel like an uphill struggle. Thankfully, help is at hand from calendar apps such as those contained with Microsoft Teams and Outlook. These calendars allow you to plan your day and set reminders for crucial tasks e.g. attending meetings, completing reports and chasing suppliers.
  • Embrace Keyboard Shortcuts: Every second counts in the workplace and you can make significant time savings with keyboard shortcuts. These commands use a series of keyboard strokes to activate pre-programmed commands. Say, for example, you wanted to highlight an entire paragraph of text. You could do this manually by clicking your mouse and dragging the cursor down the page. Or, more quickly, you could place your cursor at the start of a paragraph and hold down Ctrl + Shift + down arrow for instant selection. There are thousands of shortcuts available, so investigate which ones are best for your daily needs.
  • Pin Apps to Your Taskbar: You will use certain apps more than others, so it’s important you have quick access to them. Unfortunately, searching through a crowded desktop or through the start menu can be frustratingly slow. However, by pinning your most popular apps to your taskbar, you can find and open them within seconds.
  • Use Clipboard History: The Clipboard feature – which allows you to save a section of text or an image to a PCs memory for later use – has been in place for decades. But it’s now more powerful than ever before. By turning on the Clipboard history feature, you can save multiple items. This means, for example, you can save a selection of images and texts from a website before moving into a Word document to paste them all, as opposed to moving backwards and forwards.
  • Install a Second Monitor: There may be a cost involved with installing a second monitor, but the benefits easily outweigh this small investment. With a second monitor you are effectively expanding your desktop. This means that you can view two important apps at once to allow seamless interactions e.g. copying details from an email on one screen into a database displayed on the other screen. It’s a strategy which will make working more comfortable and allow you to become more productive.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More