gettyimages-551984543-2

Microsoft has claimed that their latest upgrade to Windows 10 (10S) is immune to all known ransomware. However, it appears that this isn’t quite true.

Windows 10S is a streamlined upgrade of Microsoft’s current operating system (OS) and it promises increased speed, stability and security. Naturally, this claim of invulnerability is certainly impressive, but, effectively, it’s also issued a challenge to the online community to test the strength of this security.

It’s a brave move, perhaps one which was necessary after the various security issues with Windows 10 shortly after its launch, but it’s now looking rather embarrassing for Microsoft as Windows 10S has already been breached.

Hacking Windows 10S

win10virus

Launched at the start of May, Windows 10S survived several weeks without having its defenses breached, but this security has now come tumbling down. Security expert Matthew Hickey of Hacker House managed to make his way through the security capabilities of Windows 10S in just three hours.

How did he do this though? Microsoft, after all, should know a thing or two about security, right? Well, Hickey actually employed an old fashioned technique of hacking called DLL injection. A particularly sneaky form of hacking, DLL injection runs malware within a running process that is deemed not capable of carrying a threat by the operating system in question.

This hack was carried out by one of the most common malware attacks seen in contemporary hacking, a Microsoft Word document packed full of malicious macros (automated commands). Although Microsoft Word now has an anti-malware system, this does not detect issues with files that have been shared on the network – which is exactly where Hickey had downloaded the infected document to.

Hickey was then able to activate the malicious payload in the Word document and found he was able to take control of the PC by giving himself full administration privileges. Using Metasploit – software designed to look for loopholes in cyber defenses – Hickey eventually managed to secure himself full system privileges. And this meant, in theory, that he could begin disabling firewalls and anti-malware software.

With the system’s defenses completely disabled, Hickey could easily have installed ransomware on the PC, but he refrained from doing this in order to protect other PCs on the network.

An Unhackable OS?

adobe-after-effects-master-creates-downloadable-version-of-windows-10-wallpaper-485537-2-e14394812989461-695x336

At no point did Microsoft claim that Windows 10S was 100% protected from any form of hacking, but by claiming that it was safe from ransomware they were setting themselves up for a mighty fall. And now that Matthew Hickey has revealed just how easy the hack was – and a three hour hack is relatively quick in terms of a previously unhacked operating system – it’s likely that even more exploits will be revealed.

And, although Hickey’s attack was a ‘friendly’ hack, it underlines just how fragile cyber security can be. Despite all the bold claims by Microsoft, Windows 10S doesn’t appear to be any more secure than previous versions and this is very troubling for consumers.

Once again, user knowledge and awareness is highly important as the root cause of this attack was an infected Word document. Your employees must understand the important of identifying malware and not rely on software as, even when Microsoft are involved, it’s impossible to claim something is secure enough to give you full protection.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


download

With the ever increasing rise in cyber security attacks, PC users are becoming more vigilant. However, do they know what they should be wary of in 2017?

The IT security landscape is constantly changing, so what may be considered a contemporary threat one year, may soon fall into obscurity as defenses improve. However, certain security threats seem to be becoming more and more prevalent. Therefore, it’s make sense to acquaint yourself with the most likely attacks you’re going to experience in the near future.

And, as luck would have it, I’ve decided to take a quick look at the biggest IT security threats coming in 2017.

Rise in Ransomwareransomware-expert-tips-featured

Ransomware made big headlines in 2016, but far from being swiftly dealt with, it’s expected that ransomware attacks are going to rise in 2017. With the source code for ransomware software becoming readily available online, it’s encouraged hackers to become competitive and improve on each other’s brand of ransomware. When this is coupled with the relative ease that ransomware can generate revenue for the hacker, it’s no surprise that more and more attacks are on their way.

Big Data Causes More Risk

Big Data is causing huge ripples throughout the business community as it’s an approach which is focusing IT efforts on analyzing large sets of data to improve operations. However, as big data is so new, the business community doesn’t yet know how to marshal it efficiently.

With such huge data sets being openly shared between departments and businesses, the security of this data is being severely compromised. This presents a severe problem if security is breached due to the large amount of data at risk. Big Data needs to be correctly controlled and access restricted otherwise it will be in the headlines for all the wrong reasons.

Business Email Compromise (BEC) Scams

BEC scams hit businesses all over the world last year and some high profile names fell victim to this straightforward scam. By sending emails purporting to be from company CEOs, hackers have been able to con employees in to sending out either sensitive information or, in extreme cases, transfer bank funds. And, with pay outs from BEC scams reaching as high as $140,000, hackers are going to maximize their efforts on this simple and easy attack this year.

Internal Threats to Increase

insider-threats

Hackers are well aware that IT security teams are gradually getting better at blocking their attempts to infiltrate their defenses, so that’s why the hackers are turning to those on the inside. Sometimes this literally means teaming up with an employee on the inside to facilitate the theft of data. However, this inside threat can sometimes be the result of blackmail following the hacking of an employee’s social media account and the threat of revealing personal information. This is a difficult form of hacking to combat, but reinforces the need of good employee education on IT security in and out of the workplace.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Fiber-optic-cableThe speed of your business PC network can make a huge difference to your productivity, but not all businesses use their network as effectively as possible.

By not getting the most out of your network, you’re missing out on crucial improvements in performance which can help you remain competitive in the marketplace. Now, there’s not a business on the planet which wants to lag behind its competitors, so let’s go through 6 quick ways you can improve your network performance.

  1. Protect Your Network  NetworkSecurity_large

The simplest way to improve network performance is to ensure it’s protected from malware and viruses. Making sure that you have reliable antivirus software and sophisticated email filtering is key to keeping your network online. Remember: if your network goes down then – even if it’s just for an hour – it can hit your productivity hard.

  1. Embrace Compression

Even in this modern age, bandwidth is still a valuable commodity and increasing your available bandwidth can be a costly affair. However, you don’t have to break the bank to get the most out of your bandwidth. By working with compression software you can significantly reduce the size of the data being transmitted over your network and free up valuable bandwidth to be used by other applications.

  1. Keep Your Network Up to Date

Once you launch a new network it will be as well tailored to your needs as it could possibly be. However, over time, things change such as individual staff requirements, software upgrades which require specialist attention and numerous other factors which alter your digital needs. And this is why you need to regularly review your network to assess and identify the changes required to keep your network in touch with your current needs.

  1. Consider LinuxLinux-logo-without-version-number-banner-sized

Linux is a lot more secure than Windows as it’s less commonly used and, therefore, there’s less incentive for hackers to concentrate on breaching it. Now, I’m not suggesting you should migrate all your users to Linux, as it only supports certain applications. However, if you can migrate users who don’t require access to Windows-only applications then you’ve eliminated a number of potential security risks.

  1. Identify Junk Traffic

It’s important that you understand what’s taking up your valuable bandwidth as this can often be caused by junk traffic. Say, for example, your employees are running online games through their lunch period, depending on the software involved this could be consuming large amounts of your bandwidth. Likewise, blocking large attachments which are forwarded round from employee to employee can also drain your bandwidth, so preventing this will also improve your network performance.

  1. Educate Your Staff

It’s vital that your staff understand the best practices to optimize your network’s performance. This can be simple advice that makes up part of your company’s IT induction process and informs staff how to not only practice good network security, but also understand how to use applications correctly and not affect the network’s performance.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


confusion

We’re frequently bombarded with requests to remember and reset passwords, but this taxing memory drain is causing security fatigue and making us less safe.

And this security fatigue is causing PC users to take shortcuts with their cyber security e.g. using the same password time and time again across all the online platforms you have to sign in to. Whilst this is a simple solution, it’s also incredibly unsafe as it’s compromising the security of almost all your data.

As this is a security threat which is entirely rooted in the user base, it’s one that’s relatively simple to treat, but in practice it’s one that’s overlooked. Let’s take a look at exactly what’s happening and how you can tackle it.

What Is Security Fatigue?

It seems that not an hour goes by where we’re not prompted to change a password, verify an incoming connection or download a security patch. And this can be a time consuming affair when we’re in the middle of something important, so many PC users begin to experience security fatigue and go for the easy option: ignore everything.

Unfortunately, this puts you at a high risk of susceptibility to hackers. If we go back to our password example, from earlier, we can begin to understand the risks of security fatigue – you won’t just lose one account’s data, but all your data period. And, obviously, overcoming this security fatigue and creating multiple passwords is going to contribute heavily towards damage limitation.

Tackling Security Fatigue

security-fatigue-a-wakeup-call-for-business

The use of computers in our daily business lives has rapidly expanded in the last 15 years, so the need for security has rapidly increased accordingly. Whereas you once needed just one password to log on your PC, you now probably have to have a whole host of passwords for accessing databases, online portals and emails etc.

As a result there’s no going back to the days of single passwords – we now require around 25 daily to cover all our needs – so we need to learn how we can adapt to this new landscape. And there’s no use dismissing the threat of hackers targeting your data simply because it doesn’t relate to anything important. If a hacker can find even the most insignificant entry point into your network they’ve got a huge head start on causing damage within.

Organizations, therefore, need to work towards lightening the load on their user’s security requirements, but at the same time keep their data secure. This is not an easy problem to solve, but by employing the services of security companies you can gain professional insights on the best way to create a simple security system which reduces the difficulty of decision making and prevents security fatigue setting in.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


ddos-attack

Even the biggest firms are failing to combat cyber-attacks as a recent DDoS case has revealed; if the big firms are struggling, what does this mean for you?

Well, what’s most interesting is that this distributed denial of service (DDoS) targeted some major players of the online world such as Twitter and PayPal. As you would imagine, these firms spend millions of dollars on cyber-security, but they were still successfully hacked and found their services severely disrupted.

It’s incidents such as this which highlight just how frail security defenses can be when confronted by a formidable foe. To help you understand how the power is shifting out there, I’m going to take a look at the current landscape.

The Dyn Inc DDoS Attack

 

outagemap-0

The DDoS attack we’ve been focusing on was aimed at the cloud based online infrastructure company Dyn Inc; basically, these guys form the server backbone for brands such as Twitter, PayPal and Netflix.

And it was this backbone which was targeted by hackers through a phenomenal botnet capable of transmitting 1.2 trillion (that’s 12 zeros!) bits worth of data at Dyn Inc every second. Understandably, these huge amounts of data soon brought severe data outages and this is why sites like Twitter suddenly disappeared from the web.

Fortunately, this huge influx of data eventually stopped, but it was an attack of such magnitude that it’s left the security industry very concerned.

Why Are Attacks Getting More Prolific?

DDoS attacks have steadily been ramping up their power in recent months, so it seems as though there’s a concerted effort amongst hackers to outdo each other. This is a dangerous scenario and is leading us down a path towards a world of super powerful hackers.

These hackers are also being helped in the upsurge in popularity of the ‘internet of things’. Thanks to the huge proliferation of internet ready devices (smart TVs, security cameras and even heating systems) there are now more entry points to your core network than ever before.

In fact, a recent mock-up of a wireless toaster demonstrated just how quickly hackers can find access points to networks. In this example, everything was securely set up to prevent any damage occurring, but not all Wi-Fi ready devices are this secure. It’s predicted that any device which can be accessed by the public is potentially vulnerable.

And it’s in sharp contrast to, for example, a decade ago when hackers only had the limited choice of attacking PCs, but the playing field is now becoming wider and wider with the internet of things. Matters aren’t helped by the increase in popularity of ‘cyber-crime as a service’ which allows anyone to buy hacking tools or services from the dark web and carry out crude cyber-attacks.

Protecting Yourself

 

ddos-diagram

Hackers are becoming more and more sophisticated, so it’s crucial that you conduct a thorough analysis of your security precautions on an ongoing basis. It’s paramount, in particular, to keep a close eye on any devices which connect to the internet as they may need specialist attention to make secure.

When it comes to preventing DDoS attacks, it’s a little harder as they’re difficult to prevent. Sure, you can have ‘bad traffic’ routed elsewhere, but this is a very costly service. And this is why the future for cyber-security is a little uncertain and means hackers are increasing their chances of successfully completing a hack.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More