System Security

Home/System Security

The Business of Unwanted Software

If you’ve ever downloaded a piece of software, there is a good chance you have encountered pack-in or pay-per-install software.  As it turns out, pay-per-install software is a highly lucrative market that walks a thin line of legality and is often more aggressive and equally as disruptive as malware. Researchers at Google conducted a yearlong [...]

By |2019-02-04T02:35:49+00:00August 12th, 2016|System Security, Uncategorized|Comments Off on The Business of Unwanted Software

Flaws in HTTP/2 Could Bring Down Web Servers

The HTTP/2 protocol for websites was officially launched in May of last year as a way of improving website performance.  The new protocol was quickly adopted and supported by all major browsers, but unfortunately, it looks like a few flaws exist in the system. Cybersecurity firm Imperva released research into a number of high-profile flaws [...]

By |2019-02-04T02:35:50+00:00August 5th, 2016|System Security, Uncategorized|Comments Off on Flaws in HTTP/2 Could Bring Down Web Servers

Apple iOS Devices Vulnerable to Image Based Malware

Cisco researchers have discovered vulnerability in the way that Mac devices process image formats.  TIFF image files are data rich and typically used by publishers or designers, unfortunately, these images can contain more than just image data.  Because of how Apple processes image data, TIFF files can be used to run malware automatically, without being [...]

By |2019-02-04T02:35:51+00:00July 22nd, 2016|malware, System Security, Uncategorized|Comments Off on Apple iOS Devices Vulnerable to Image Based Malware

Ransomware: Best Case Scenario

Proactive defenses and employee education are the best ways to protect against ransomware, however, accidents happen and sometimes malware sneaks through even the best defenses.  We’ve discussed ransomware disasters in the past but you may wonder how things would turn out with proactive solution in place.  Quite recently, our technicians remediated just such an occurrence. [...]

By |2019-02-04T02:35:51+00:00July 15th, 2016|Ransomware, System Security, Uncategorized|Comments Off on Ransomware: Best Case Scenario

Severe Security Loophole Discovered in 25 Symantec/Norton Products

Individuals and businesses alike turn to Symantec for system security but a recently discovered exploit reveals that some versions of the software may do more harm than good.  Tuesday, researchers discovered a bug that affects the majority of the Symantec product line and exposes millions of users to the threat of automatically propagating attacks. The [...]

By |2019-02-04T02:35:51+00:00June 30th, 2016|System Security, Uncategorized|Comments Off on Severe Security Loophole Discovered in 25 Symantec/Norton Products

The Dangers of Shared Passwords

The recent credential leak from LinkedIn revealed that a large percentage of users continue to use common or weak passwords.  While many people may not consider LinkedIn security a top priority on its own a more troubling statistic was discovered. Nearly a third of the leaked accounts on LinkedIn used the same password/username combination on [...]

By |2019-02-04T02:35:51+00:00June 1st, 2016|System Security, Uncategorized|Comments Off on The Dangers of Shared Passwords

Hacked LinkedIn Credentials Selling on the Dark Web

Back in 2012, LinkedIn admitted that their social network had seen a breach that led to millions of compromised accounts.  At the time, it was believed that the breach was limited to around 6.5 million leaked passwords, but recent events has put that number at over 117 million.  While alarming on its own, the four [...]

By |2019-02-04T02:35:51+00:00May 20th, 2016|System Security, Uncategorized|Comments Off on Hacked LinkedIn Credentials Selling on the Dark Web

MS Office Offers New Protection Against Macro Viruses

Microsoft Office is ubiquitous among businesses, so it is not surprising that it is also one of the most common attack vectors for malware.  Macro viruses are a type of malware that makes use of the macro scripts that run in many programs within the MS Office Suite.  Last week, Microsoft delivered an update that [...]

By |2019-02-04T02:35:52+00:00March 28th, 2016|Microsoft, System Security, Uncategorized|Comments Off on MS Office Offers New Protection Against Macro Viruses

Recent Spike in WordPress Infections Encourage Caution

Security firms Heimdal and Securi have now both reported a huge high spike in malware across a variety of legitimate Wordpress websites.  The compromised websites have been taken over by a sophisticated variant of Ransomware that locks a user out of their computer and demands payment. The compromised websites are injected with fraudulent JavaScript code [...]

By |2019-02-04T02:35:52+00:00February 5th, 2016|System Security, Uncategorized|Comments Off on Recent Spike in WordPress Infections Encourage Caution

Oracle to Retire Java

Oracle has announced plans to retire the Java internet browser app on September 2016. Outdated versions of Java are one of the leading risk factors for the spread of browser based malware.  The discontinuation of Java should be a great boon for IT security but it also creates a problem; many large businesses still use [...]

By |2019-02-04T02:35:52+00:00February 1st, 2016|Business Management, System Security, Uncategorized|Comments Off on Oracle to Retire Java