new-hempacks-logo

We like to think that once a cyber-attack takes place that a solution will be found. However, malware is evolving and becoming harder and harder to stop.

In Q1 2016, Kaspersky prevented just over 228 million malware attacks and this is a   figure which has been increasingly rapidly for the last few years. In fact, several years ago, it would have been unlikely to see pushed 228 million malware attacks in an entire year.

Malware, therefore, remains big business for hackers so, naturally, they’re constantly looking to upgrade their weaponry to beat the firewalls and antivirus software we rely on. And it’s a digital arms race which the cyber security experts are struggling to keep up with.

Let’s take a look at why malware is getting harder to stop.

Ransomware Arrives

499979-ransomware-feature

One of the most reported evolutions in the malware landscape has been the rise in ransomware attacks such as Locky.

Ransomware is a form of malware which encrypts users’ files and then demands a ransom to decrypt them. Being a relatively new form of malware, knowledge regarding their build and execution capabilities is somewhat limited, so this is making them particularly difficult to combat.

What’s also crucial to the success of ransomware is that the majority of attacks are routed through anonymous Tor servers which mask the attacker’s true IP address. This means that identifying the hackers becomes very difficult and they’re able to continue operating impeded and improve their malware. And this evolution of existing ransomware is best demonstrated by the Locky Trojan which began as a .DOC file, but is now being identified as a .ZIP archive in order to evade detection.

Targeted Attacks

Malware has, traditionally, followed the same execution regardless of which network it has been deployed upon. However, hacking groups such as Poseidon are now ensuring that their attacks are, after the standard breach, able to customize the attack depending upon the network.

Poseidon maps their victims’ networks and harvests all the available credentials to ensure they can gain the maximum privileges on the network. And the reason for this customized attack is because Poseidon is actively hunting the computer which operates as the local Windows domain controller. If the hackers are able to take control of this computer then they will have free rein over the entire network.

It’s this type of attack which is a cyber-security firm’s worst nightmare as it involves extensive research into the intricacies of individual networks. This is very time consuming and underlines how hackers are actively looking to make themselves more powerful.

Long Term Evolution

adwind-rat-console

One of the biggest problems with Malware is that certain strains are constantly evolving into new strains. The best example of this is the Adwind RAT (remote access tool) which first appeared in 2012 as a tool for online spying.

Originally debuting under the name Frutas, it evolved into Adwind, Unrecom, AlienSpy and JSocket over the next three years. Starting off as a Spanish language piece of software, it soon received an English language interface which allowed it to spread worldwide.

All these changes have allowed the Adwind RAT to enjoy a long career and cause so many cyber-attacks. By actively changing its exterior appearance and name, it has fooled firewalls and antivirus software to leave security experts scratching their heads.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Computer security. Isolated on white with clipping path for laptop.

The fear of losing control of your computer network results in good security practices, but it also leads to half truths about security being shared.

And when myths about computer security begin to circulate, they soon begin to take on a voice of authority. This results in businesses taking these myths as facts and concentrating resources on areas of computer security where it’s not necessary.

To help you avoid falling into this scenario, I’m going to show you the 4 biggest myths of computer security.

1. All Security Threats Are External

It’s common to assume that all security threats originate from outside your organisation, but the truth is that sometimes the biggest threats are within your business. After all, those individuals that already work for your company have much freer access to your systems.

And this takes them one step closer to accessing your secure data without all the hassle of breaking through firewalls etc. Therefore, in the case of a security breach you also need to look at your own employees as, for example, an individual who was missed out on a promotion can easily become aggrieved enough to seek revenge.

2. One Piece of Software Is All You Need

Too often, businesses feel safe in the knowledge that they have an amazing piece of software which is a one stop shop for all their security needs. And, yes, this type of software certainly makes things look neat and tidy, but what if a security flaw is discovered in that piece of software? Suddenly, all your security practices are at risk.

In order to avoid this, you should aim to have different pieces of software in place to deal with security threats e.g. firewalls, antivirus, mail wash etc. With this setup you can rest assured that it’s much harder for hackers to carry out a theft of all your data at once.

3. Windows Is Not Safe

Windows 10 has certainly come in for criticism regarding security and this has led many critics of Microsoft claiming that Windows is a liability in terms of security. However, this is a little unfair.

Whilst PCs running Windows are certainly at risk of more cyber-attacks than Macs, Microsoft are constantly monitoring security threats and issuing patches when necessary. What’s particularly unsafe about Windows is its users.

And this is because users of Windows ignore automatic updates too often. Perhaps this is because they’re too busy checking Facebook, but if they’re not careful their Facebook, and much worse, will be hacked before they know it.

4. Computer Security Is Too Confusing

Many PC users struggle to deal with security threats as they’re very defeatist when it comes to learning about the basics of computer security.  And it’s not a surprise when you consider the amount of technical jargon involved.

However, the basics of computer security aren’t too confusing, so there’s no excuse for not getting to grips with them. If your staff members are able to embrace the core concepts of computer security – good password practices, understanding the threat of email attachments – you’ll find that the risk of succumbing to an attack is reduced.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


hackershackhacked

Anyone who sets foot online these days is at risk of falling victim to hackers, so it’s a good idea to know when you’ve been hacked.

After all, the sooner you realize you’ve been hacked, the sooner you can start working to remove the infection from your PC and make your data secure again. However, hackers are stealthy individuals and you may have to look a little closer than usual to catch them in the act.

And, to give you a helping hand, here are 7 tell-tale signs that you’ve been hacked.

1. Slow Internet Connection

If you internet connection has ground to a halt then this could indicate that you’ve been hacked. Due to an increase in network activity – caused by hackers using your bandwidth to commit malicious activity – this can render your normal internet access next to useless.

2. Unusual Access Times

It’s always a good idea to keep an eye on the times at which your network is accessed by new connections. In general, access during your normal working hours is to be expected, but new connections outside these times should be treated as suspicious. Hackers, you see, are likely to use automated software that is active throughout the entire day rather than between 9-5.

3. Disabled Antivirus

There are very few occasions that you would deliberately disable your antivirus, so if you notice that your antivirus software has been disabled this should start ringing alarm bells. And, for a hacker, if they’re able to disable your antivirus software, this allows them free rein to download all sorts of malware to your PC.

4. Unable to Log on?

One of the first things a hacker will try to alter on your system is your login credentials as this restricts your access and gives them more time to cause trouble. Therefore, if you’re absolutely sure that you’re entering the correct username/password combination, you need to consider that you may have been hacked.

5. Strange Cursor Movements

Due to hardware and software issues, your mouse may occasionally move without any user interaction. However, these are usually haphazard movements and certainly don’t double click on programs to open them. If you ever see your mouse ‘come to life’ on its own then it’s time to shut your PC down and call in the experts!

6. Fake Antivirus Messages

fake-antivirus-pro-security

You should always make sure that your network users are aware of the antivirus software that you’re running; this is because one way that hackers can target your PCs is through fake antivirus messages. These will usually advise users that a virus scan has been run and viruses detected that only this piece of software can remove. And this will involve being redirected to a website to download the “antivirus software”, but in reality you’ll be downloading nothing but malware.

7. Internet Searches Redirected

Hackers are keen to disrupt your activity for their own benefits and one way to do this is to redirect your internet searches to alternate websites. So, if you find your internet searches suddenly start taking you to dubious websites then there’s a good chance you’ve been hacked.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Computer Keyboard with symbolic padlock key

Almost every business has a daily need to go online and interact with the internet, but to do this safely you need a little bit of browsing know-how.

Whilst most websites are relatively secure, it’s difficult to guarantee just how secure they are. And seeing as even government websites can be hacked, how do you know that, for example, that customer maintenance portal you have to log on to daily hasn’t been hacked for dubious means?

Avoiding this sort of scenario is crucial for your business to run smoothly, so I’ve prepared 6 tips to help you browse online safely and securely.

1. Use HTTPS Security

If a website is truly secure then its web URL should start “HTTPS:” and the “S” at the end stands for secure – provided by secure sockets layer (SSL) security. Conversely, if the web URL only starts “HTTP:” then the security behind it will be much less and can’t be taken for granted.

2. Avoid Public WiFi

NEW YORK, NY - JULY 11: A free Wi-Fi hotspot beams broadband internet from atop a public phone booth on July 11, 2012 in Manhattan, New York City. New York City launched a pilot program Wednesday to provide free public Wi-Fi at public phone booths around the five boroughs. The first ten booths were lit up with Wi-Fi routers attached to the top of existing phone booths, with six booths in Manhattan, two in Brooklyn, and one in Queens. Additional locations, including ones in the Bronx and Staten Island, are to be added soon. (Photo by John Moore/Getty Images)

Public WiFi may provide a fantastic service and serve many happy consumers, but unfortunately these networks have a less than amazing level of security protecting them. And hackers are able to easily infiltrate these networks with basic software to hijack the personal data of those accessing the public network.

3. Don’t Click on Phishing Websites

Phishing is a contemporary threat to your data and appears to be showing no signs of going away soon. This is why you need to be on your guard about phishing websites as they can be deceptive beasts at the best of times.

Links to these websites are usually emailed, but whilst the link may appear to seem innocent, it’s possible to engineer a link which reads www.amazon.com but redirects you to a different (and more dangerous) website.

This puts you at risk of infection and having your networks breached, so double check any suspicious links by hovering your mouse cursor over them to get a preview of the true web address.

4. Update Your Browser

Keeping your software up to date is vital to ensure that you’re well protected against hackers who have discovered vulnerabilities in that piece of software. And web browsers are no different, in fact, once support for out-dated web browsers is discontinued, hackers will discover vulnerabilities very quickly.

Therefore, it’s essential that you install all patches and updates as soon as possible to keep your browsing activity protected.

5. Disable Stored Passwords

Although activating the ‘store your passwords’ option may feel as though it’s going to make forgotten passwords a thing of the past, it can actually cause more trouble than it’s worth. You see, if your system becomes compromised by hackers, they can then access all your store passwords.

And the best way to avoid this is to work on a little bit of memory training to remember your passwords!

6. Have a Strong Arsenal

maxresdefault

Perhaps the best way to browse online safely and securely is to arm yourself with the best defenses possible. And the more defenses the better.

So, instead of just securing your network with a state of the art firewall, why not try adding in state of the art email filtering? And, you know what, if you also install web filtering software on top of that, you’re going to find your data becomes safer than ever before.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


opendns_umbrella

OpenDNS not only blocks malware, botnets and phishing but also detects and contains advanced attacks before they can cause damage. But how does it work?

How does OpenDNS Umbrella work?

OpenDNS is a cloud-delivered network security service that proactively protects users from advanced malware, botnets and phishing attacks. Unlike reactive signature-based tools, OpenDNS leverages big data analytics and real-time algorithmic learning machines processing over one million events per second. This 2% cross section of the world’s Internet activity enables OpenDNS to predict and prevent attacks. It protects users on- and off-network, across any port, protocol, or app. And because Umbrella is delivered via the cloud, it is lightning-fast and easily scalable.

howitworks

Predictive intelligence to proactively protect your employees: OpenDNS is powered bypredictive intelligence, which means that we identify malicious places on the Internetand prevent your employees from visiting them, so that they don’t get infected withmalware.
Maintain acceptable use & compliance: filter up to 60 content categories and domain-specific whitelists & blacklists, so you can manage where any corporate-owned assetgoes whether on- or off-network.

For more ways to secure your business networks, contact your local IT professionals.

Read More