A fairly new CryptoLocker malware has been spreading via Yahoo Messenger, and if you’re infected it may cost you a fortune to retrieve your own data.

Look Before You Jump, Steer Clear of YOURS.JPG.exe

The CryptoLocker ransomware has been wreaking havoc among many users, disguising itself as a file named ‘YOURS.JPG.exe’, the malware will encrypt important system files, and basically locking out rightful owners from their computers and documents.

2309323926

To regain access, the ransomware—as the name suggests—will demand ransom money from its victims.  In this particular case, the CryptoLocker ransomware demands $400 for a key which will supposedly unlock the encrypted files.  Once the ransom process is initiated, the malware will set off a timer that will destroy the key within a given amount of time if the exploiters don’t receive their fund.

Main Target: Yahoo Messenger Users

If you’re using Yahoo Messenger at home and especially at work, please take the necessary precautions to prevent this form of exploitation from happening to you. Recently CrytpoLocker has been targeting Yahoo Messenger users in the form of image attachments. First, we suggest you install the latest version of CryptoPrevent to keep CryptoLocker from infecting your computers.  It is also highly advisable that you keep your antivirus/antimalware software up-to-date, as this will also shield your computers from various online attacks.

For more tips and tricks on what you can do to prevent these types of intrusions and attacks, please don’t hesitate to contact our IT professionals.

Read More


password-cracker

Pulling an account password can be hard or easy, it’s up to you.

The bottom line for when it comes to personal security on the internet is you must take care of it yourself.  Many .com companies will make lofty promises of keeping your private data secured, but when things go bust they don’t take responsibility when your account is compromized.

Read More


6bkyvwE

System commands saved by Bing, will show up as ‘search suggestions’.

Windows 8 users need to be aware that Bing will record system commands inputted locally.  This is a big problem for businesses (and even individuals) if the commands are unique and track-able, as the commands are publicly displayed for anyone using the Bing via the ‘search suggestions.’

Pros and Cons

Companies like Google and Microsoft will, one way or another, find ways to track your user data, and it’s crucial that people are aware of what is being extracted from a computer console every time the power switch is flipped on.

By integrating Bing into the OS itself, the results may be beneficial as well as detrimental.  When users search for something on a computer, those same keywords are recorded so that Bing can help other users find things on the internet quicker.  For sensitive and private data (in this case system commands pointing to your network), the threat of hackers obtaining such information can become a major problem.

How to Disable

j62NxRM

How to disable it

To prevent Bing from recording your system command inputs, go to your Search options in Windows 8 by pressing Windows + C, clicking on “Settings”, then “Change PC Settings”, “Search and Apps” and sliding the ‘Use Bing to search online’ to ‘Off.’

For more tips on how you can keep your information safe while using a connected device, contact your office IT professionals.

Read More


w3-counter-browser-share

Browser share according to W3Counter

The debate about which internet browser is the best has essentially ended.  Personal preferences aside, the consensus among most casual users as well as developers is that Chrome, the Google-backed browser, is number one (for the time being).

Why should you pick Chrome over all other browsers?  First and foremost, let’s consider the fact that the browser is constantly being revamped and tweaked by a huge community of developers worldwide.  Google gave developers the source code for Chrome back in 2008.  Since then, the open source Chomium project has thrived, leading to a robust and constantly updated browser.

A Think Tank is Better Than One Einstein

ad-block

AdBlock can be easily integrated into Chrome

What it comes down to is this, Google is allowing outside developers to tinker with Chrome.  Among some of the crucial benefits resulting from the open collaboration of many brilliant minds are these:

  • Exceptional security measures as developers are constantly debugging and patching up vulnerabilities
  • Add-ons built around the Chrome browser allows for a highly customizable surfing experience.  For instance, the adblock plugin lets surfers select which site is allowed to have ads or popups.
  • Convenience.  Users can sync their browsing history, usernames, passwords, and etc. across multiple platforms.  By simply logging into one’s Google account, he/she can have access to all his past browsing history, and save his present browsing experience for future syncing on other platforms.

It Can Always Be Better

Google, with its involvement in adding parts to the Internet of Things (IoT), has greatly improved the browsing experience for most average internet surfers.  Much of the work done in the development of Chrome (past, present, and future) ultimately serves as medium for Google to grow and profit.  However, Google is taking input from outside developers, and thus it has given the search giant an edge in the browser war over its competitors like Microsoft’s Internet Explorer and Mozilla’s Firefox.

Although Chrome is an exceptional browser for almost everyone and every purpose, a tool for surfing the internet is only a piece of the personal computing experience.  Chrome users will still need to consider what other tools will complement the browser, so that surfing the Internet becomes as secure as possible.

For more ideas and tips on staying safe and secure online, contact your office IT professionals.

Read More