Sudbury Computer Repair Blog

RSS Grab RSS Feed

Enter your e-mail address below to receive
updates on new blog posts!

Another Kind of Malware - Boston, MA

Joseph Coupal - Thursday, July 11, 2013

To keep your business  running smoothly, you need computer and network security. It is important to maintain your network and systems, making sure they are virus and malware free,  current with security patches, and running at optimal performance.

Ransomware is a type of malware that prevents you from using your computer or accessing your data until you pay a certain amount or "ransom" to a remote entity. There are two types of ransomware:

  • Lockscreen ransomware, which displays a full-screen image or webpage that prevents you from accessing anything in your computer, and
  • Encryption ransomware, which encrypts your files with a password, preventing you from opening them

Most ransomware displays a notification, saying that the ‘authorities in your location have detected illegal activity in your computer’. To avoid prosecution, and regain access to your files, ransomware demand payment from you in the form of a "fine".

Paying the "fine" does not necessarily return your computer to a usable state. We do not advise that you pay. With ransomware, the threat of prosecution does not come from the legitimate authorities.

FAQ’s about ransomware

Q: Is it true that the legal authorities in my area have detected illegal activities in my computer?

A: No. These warnings are fake and have no association whatsoever with the legitimate authorities. The operators of ransomware abuse the tone, images and logos of legal institutions to give their scam an air of legitimacy.

Q: I cannot access my computer or my files. Should I just go ahead and pay these people to regain access?

A: No. Do not pay, regardless of how legitimate or threatening the claims look. You will only end up giving money to criminals, who have no intention of giving you back access to your computer or files.

Q: What should I do if I've paid the scammers?

A: In all cases, you should contact your financial institution and your local authorities. If you paid with a credit card, your financial institution may be able to block the transaction and return the money to you.

Q: How did the scammers know my IP address?

A: There are publicly available tools online that can check a computer's IP address. Getting IP addresses is common behavior for malware - in the case of ransomware, it is used as another scare tactic.

Q: How did ransomware get on my computer?

A: Ransomware, like other malware, can arrive in a variety of ways. However, in most instances, it is downloaded automatically into your computer when you visit a malicious website or a website that's been compromised.

Q: How do I regain access to my computer or files?

A: Do not pay the fine. Ransomware have varying behavior and will have to be removed in different ways. Refer to How to remove a ransomware infection for steps on how to remove ransomware.

For computer system security, contact Sudbury Computer.

Excerpts - microsoft

Microsoft Pays Hackers to Discover and Report Bugs in their Software

Joseph Coupal - Tuesday, July 02, 2013

It is important that Boston area company's computer system security is up-to-date. Your business computer system should be regularly and/or continuously monitored to make sure that you are up to date with the latest security, compliance, and disaster recovery standards.

Microsoft has long benefited from the bug bounty programs of other vendors. But it now has its own new programs to compensate researchers who spend their days hunting down fresh security flaws in Microsoft products. Microsoft is offering cash bounties to boost the "win-win" between Microsoft customers and security researchers.

Microsoft has reversed its longstanding ban on paying hackers for information about freshly discovered security holes and instead is now offering rich bounties for notice of new Windows bugs.

Microsoft has benefited from the bug bounty programs of Google and Mozilla. But it is now offering three new programs to encourage and compensate so-called gray hat and white hat researchers who spend their days hunting down fresh security flaws in Microsoft products.

Hackers can now claim bounties of up to $100,000, depending on the type of bug discovered. For instance, Microsoft will pay $11,000 hard cash for any bugs found in its upcoming Internet Explorer 11 browser software.

"Microsoft entering the game is a big changer because they are a large traditional software vendor," says Chris Wysopal, chief technology officer at application security vendor Veracode.  

Microsoft has come full circle in the hacking community's fractious "full disclosure" debate. Black hat, white hat and gray hat hackers have been relentlessly exposing new Windows bugs since the 1990s.

White hats argue that the intense scrutiny compels software vendors, like Microsoft, to take security more seriously and patch security flaws with more alacrity. Black hats hunt for bugs, too, but with criminal intent. Gray hats sometimes contribute to the cause of good, and at other times behave more like black hats.

Each newly disclosed Windows bug sets off a race to get the new vulnerability patched across the massive breadth of Windows PCs, laptops and servers -- before they can be taken advantage of.

That phenomenon now happens at such a frenzied scale that Microsoft has taken to issuing security patches on the first Tuesday of each month to maintain a semblance of order.

Bug bounty programs have been around for awhile in order to encourage gray hats and white hats to work with vendors to fix problems instead of disclosing new bugs without vendor coordination.

Bounties help "massively.” Cash is best when it comes to demonstrating that software companies who tend to rush products to market actually value the gray hat and white hat researchers who, essentially, perform a critical quality control function.

Now Microsoft is finally acknowledging gray hats and white hats -- with its check book. "The value comes from the business actually understanding the importance of security, and the downstream impacts and ramifications to their business and customers," Ford says.

Mike Reavey, director of Microsoft's Security Response Center, tells CyberTruth that in the past researchers willingly reported a vast majority of bugs directly to Redmond "so there wasn't a need to offer a bounty program."

Do you think you have a bug in your computer system? You may not be able to get cash for it, but contact Sudbury Computer to get rid of it and to help make your system more secure.

Sci-TechToday.com


Recent Posts


Tags

ransomware, Boston Sync Contacts email virus, Boston ultralight laptop Exchange Environment reliable email defense, Boston infected email, Boston Blackberry infected computer system, Boston computer backups, marlborough worms and spoofing, Boston infected websites computer screen set up, Boston infected files maintenance security for wireless networks, Boston email security, Boston MA Calendar antivirus cloud computing, Framingham computer back ups, marlborough network security, Boston computer backups, framingham multiple computer screen set up, Boston Scareware cleaners Virus issues malware, Boston computer system set up, Boston email worms, Boston system backups, marlborough Sudbury MA computer hacker protection Boston securing wireless networks, Boston email security options, Boston Sudbury Computer, MA cloud based hosted email, Framingham viruses SPAM data loss, marlborough virus scanner reliable email security, Boston notebook Micorsoft security, Boston Scareware SPAM filter multiple computer monitors, Boston computer system security, Boston computer security, Boston hosted email in the cloud, framingham data recovery, framingham Malware SPAM lists system backups, framingham computer and network security, Boston multiple computer screen, Boston cloud based hosted email, Marlborough Netbook IT services, Marlborough Sudbury Computer Repair - Sudbury MA Managed IT, Marlborough secure wireless networks, Boston Sudbury Computer, Boston unsecure networks, Boston disaster recovery, Framingham Windows bugs, Boston computer hard drive failure, marlborough IT services, Framingham Managed IT, Framingham hosted cloud email, framingham Desktops RIM Netbooks unsecure wireless networks, Boston hosted cloud email, marlborough Micorsoft bugs, Boston protect business network, Boston SPAM protection, Boston data recovery, marlborough Laptop Emails SPAMmers wireless security, Boston cloud based solutions, Boston disaster recovery, Marlborough computer hard drive failure, framingham Malware infections hardware issues Sudbury email has been hacked, Boston business computer systems, Boston hosted email in the cloud, marlborough cloud computing, marlborough data loss, framingham anti-spyware protection cloud based email security, Boston Enterprise Express Server hacked email, Boston Facebook app/virus email has been hacked block infected email, Boston

Archive