tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Current Articles | RSS Feed RSS Feed

Beware of Hacktivist Group 'Anonymous'

 
Anonymous Hacktivist Group

The hacker group referred to as 'Anonymous' has recently launched a cyber attack, this time targeting a pair of trade associations in the area of technology.  The attacks took the form of a distributed denial of service, a technique that can make web sites inaccessible.  The group, which is considered a ‘hacktivist’ organization because its attacks generally relate to policy aims rather than the theft of personal information, was protesting legislation currently before Congress.  The legislation would serve to encourage businesses to share information about the threat environment with government officials.

New Cyber Threat 'Flame' Suggests Need for Improved IT Security

 
Kaspersky Flame Virus

The cyber threat detection company Kaspersky Lab, maker of an anti-virus program used on millions of Windows PC computers, has uncovered a new form of malware that has been termed both advanced and massive in scope.  This new cyber threat has been officially designated as Worm.Win32.Flame but is being referred to in casual parlance simply as "Flame".  The purpose of Flame appears to be cyber espionage and has mainly been deployed in the Middle East region, with its targets being networks and systems under the control of the national governments there.  To date, targets appear to include nations such as Iran, Sudan, Syria, Lebanon, Egypt, and Saudi Arabia. 

Symantec Report Illustrates Importance of a Managed Programs Model

 
Symantec Report and Security Threats

The giant anti-virus company Symantec has released a new version of their Internet Security Threat Report.  The study, which is published on a yearly basis, outlines the current threat environment in detail.  Among the findings were some facts likely to startle employees of small and medium businesses, even those who regard themselves experienced with today's online environment threats. 

The Benefits of Managed IT Programs

 
Benefits of Managed Programs

Some firms can operate well by using a managed services approach to their IT needs, but some need more of a hands-on approach.  This is where a managed programs provider can be invaluable.  In many situations, there is no substitute for a human being who is onsite on a regular basis.  By contracting with a managed programs IT support provider, a company can have the confidence that comes from knowing a consultant is close at hand when infrastructure or network problems occur. 

Google's ‘Bouncer’ uses IT Solutions to seek out app malware

 
App Malware

One of the challenges in the world of Android-based cell phones and devices has been the fact that some malware developers have seen apps as the ideal way to intrude into not just cell phones themselves, but into the systems to which they may at times be connected, including business systems set to synchronize or communicate with mobile devices.  Up until now, Google has not provided IT professionals with robust tools to help them deal with this type of menace.  That has changed with the introduction of Google Bouncer, a program designed to scan the Android Marketplace for apps containing malicious code.

IT Solutions: Identifying Bad Devices

 
Bad devices

Not so very long ago, the term ‘bad device’ merely indicated a hardware component or peripheral that had stopped functioning properly.  In today's world of extensive cyber threats, however, the term has taken on an entirely new meaning.  A bad device now is one that functions as a repository for malware or malicious web content.  According to industry estimates, thousands of new bad devices are added to the World Wide Web every day. 

IT Consulting Companies provide IT Solutions for Malware Attacks

 
Malware attacks

A recent wave of malware attacks has highlighted the need for banks and other businesses to secure high quality IT consulting services.  A variant of the attack program known as Zeus, nicknamed Ice IX, has begun to target individuals and organization that use online banking services.  Ice IX attempts to extract user names and passwords, but the true goal of the malware is to secure telephone numbers in order to continue perpetrating fraud that is much more difficult to detect. 

Outsourcing Solutions for the Patching Issue in VMware

 
VMware

Like any other software system, VMware does sometimes need to be patched with updates and fixes that can improve security and offer enhanced functionality.  Other patches may even remediate bugs that have been recently discovered in the newer versions of the software.  One of the best ways to ensure your system stays up to date is to use the VMware Update Manager, which provides automated functions that can streamline the process of upgrading and patching.  The Update Manager allows managed services staff to fine-tune the patching process as needed so that organizational workflow is disrupted as little as possible.

New Worm Threat Raises Awareness of Managed Programs

 
Security

Employees often want to visit social media sites such as Facebook on their breaks or lunch hours, or even during working hours, although many company policies prohibit such access.  It can be difficult for companies to lock down such sites, however, because all too often, firms are making valuable business use of social media.  These factors complicate life when malware programs such as the Ramnit worm begin to target those who log onto Facebook.

Eliminating Malware Means Understanding its ‘Tricks’

 
download-the-six-doaposs-and-donapos

Any attempt to prevent malware from taking hold in a network or system must depend on a thorough understanding of how malicious programs tend to infiltrate information systems as well as how they propagate.  While there are many ways to search for malware, by “signatures” that identify known malicious files, for example, one of the most useful is to look for such programs by searching for evidence of unauthorized communication on the network.

All Posts