Google announced it released 12 High Severity flaws in Chrome. They are urging Chrome user’s to update to Chrome version 55.2883.75 for Windows, Mac and Linux. Several of these flaws would allow for cross site scripting on the Chrome browser. US-CERT also issued a same day alert regarding vulnerabilities in conjunction with Google to stress the severity of these vulnerabilities. If you need assistance updating your Google Chrome browser please Contact Alpha & Omega at (714) 964-6932>
Apple recently released a patch for their Sierra MacOS which corrects 97 vulnerabilities. The update corrects vulnerabilities in ICloud, Itunes, Safari and the OS itself, this comes days after releasing dozens of other updates for the Sierra iOS. Apple is urging all iOS customers to update their Macs so that they will not be vulnerable. If you need assistance with updating your Mac or are unsure if it has been updated or not please contact Alpha & Omega at (714) 964-6932.
Both Google(Chrome) and Microsoft(Edge) released statements that they would be blocking Flash by default from the Chrome and Edge browsers. They are following suit with Apple and Mozilla who are already blocking Flash by Default. The move comes as Adobe released yet another patch to fix a Zero day Vulnarbility and many are moving towards HTML5 which is more secure. Microsoft will continue to monitor the usage of Flash on their Edge browser. Google stated that starting January user’s will be prompted to run flash on a site by site basis and by October all sites running flash will require permission. If you have questions or concerns about Flash on your PC or Network please contact Alpha & Omega at (714) 964-6932.
If you upgraded to Windows you might be one of the millions of users that are affected by your Wi-Fi connection randomly dropping. Microsoft has acknowledged the issue and has released a patch (KB 3206632) to address the issue. If you need assistance installing the update or finding out if you are affected by this issue contact Alpha & Omega at (714) 964-6932.
Research company Proofpoint recently discovered an exploit that targets user’s routers and changes the routers DNS to point to the attackers infected servers. The attackers start by placing fake adds on legitimate websites and when you click on the add it will infect your router. D-Link and Netgear have been found to be the most vulnerable routers and easiest to infect. This vulnerability is not the same vulnerability that was discovered on Netgear routers several weeks ago. According to Proofpoint there than 166 router models being affected by this Malicious software. If you need assistance with patching or replacing your current router, contact Alpha & Omega at (714) 964-6932.
Users have voiced their frustrations at Microsoft after users updated their PC’s to Windows 10 and now have issues with their Wi-Fi connection dropping on a regular basis. Below are the most common complaints about Windows 10 dropping the connection. A current temporary solution is to update the Drivers or if needed use an external adapter that compatible with Windows 10. If you need assistance updating your drivers or purchasing an external adapter contact Alpha & Omega at (714) 964-6932
1. No Wi-Fi is available on my computer after Windows 10 update.
2. Windows 10 Wi-Fi is not working.
3. How to connect Window 10 laptop with Wi-Fi?
4. There’s no Wi-Fi connection in Windows 10 on my HP laptop.
5. Why there is dreaded broken Wi-Fi after I installed Windows 10? Can’t access Internet.
6. My computer Wi-Fi is not working on Windows 10, 64 bit.
7. No Internet connection after upgrade to Windows 10. No wireless network connections or Wi-Fi.
8. No Wi-Fi adapter found after Windows 10 upgrade. Wireless adapter not showing up in Device Manager.
9. My Wi-Fi doesn’t work after upgrading Windows 8 to Windows 10. Why? Wi-Fi button on Windows 10 not working. Help.
10. My Wi-Fi stopped working after update to Windows 10. I have no WiFi settings, no Wi-Fi drivers, and even no sign of Wi-Fi.
Netgear recently issued a statement stating they found vulnerabilities affecting 8 of their routers. Netgear released a fix for several routers but not all. The Department of Homeland of Security issued a statement, saying anybody using the affected models should stop using these routers until they have been patched because they are vulnerable to being hacked or exposed to botnets. The affected routers are models (R6250, R6400, R6700, R7000, R7100LG, R7300, R7900, R8000). If you are using one of these models and need assistance with patching or replacing your current Router Please contact Alpha & Omega at (714) 964-6932.
With criminals ramping up their efforts to infect PC’s with Ransomware there could be a new tool that could help stop these criminals from infecting your PC. The FBI reported that in the 1st Quarter of the year Cyber Criminals were able to extort about $209 Million dollars and the yearly revenue could reach over 1 Billion dollars from Ramsomware payments. Ramsomware works by encrypting files on the PC and other Rasomware goes onto encrypt the Master Boot Record. Encrypting the Master Boot Record makes the PC unusable and essentially turns the PC into a paperweight and would most likely require a complete re-installation of the OS and Software. A company name Cisco Talos has released a tool that essentially stops any software from writing to the Master Boot Record thus preventing the Ransomware to install. This only protects you from Ransomware that goes after the MBR and does have some limitations such as preventing the legitimate software to write to the MBR if needed such as updates or new software installation. Alpha & Omega has implemented Zscaler in order to combat the Ramsomware threat. If you have any questions or need any information on Zscaler or Ranswomware please contact Alpha & Omega at (714) 964-6932.
Microsoft made an official announcement that they have completed the purchase of Linked In for $26.2 Billion dollars. Microsoft and Linked In are stating that this will increase the usability of Linked In’s site for users and businesses. Full details of what enhancements will be made were not made public but they did mention several features they hope to make to integrate Linked In with Microsoft products. Several enhancements mentioned were integrating Office 365 with Linked In to help users with creating resumes and uploading them directly to their profile pages. Also mentioned was integrating excel graphs that would update to business profiles. Integration with other Microsoft products is also a possibility such as Skype’s video conferencing. We will have to wait and see, but expect to see several changes in the upcoming months. If you need assistance with any Microsoft product please contact Alpha & Omega at (714) 964-6932.
Today, the US-CERT has released a technical alert regarding a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns, known as “Avalanche.”
Cyber criminals utilized Avalanche botnet infrastructure to host and distribute a variety of malware variants to victims, including the targeting of over 40 major financial institutions. Victims may have had their sensitive personal information stolen (e.g., user account credentials). Victims’ compromised systems may also have been used to conduct other malicious activity, such as launching denial-of-service (DoS) attacks or distributing malware variants to other victims’ computers.
In addition, Avalanche infrastructure was used to run money mule schemes where criminals recruited people to commit fraud involving transporting and laundering stolen money or merchandise.
Avalanche used fast-flux DNS, a technique to hide the criminal servers, behind a constantly changing network of compromised systems acting as proxies.
The following malware families were hosted on the infrastructure:
- Windows-encryption Trojan horse (WVT) (aka Matsnu, Injector,Rannoh,Ransomlock.P)
- URLzone (aka Bebloh)
- VM-ZeuS (aka KINS)
- Bugat (aka Feodo, Geodo, Cridex, Dridex, Emotet)
- newGOZ (aka GameOverZeuS)
- Tinba (aka TinyBanker)
- Vawtrak (aka Neverquest)
- Smart App
- Trusteer App
Avalanche was also used as a fast flux botnet which provides communication infrastructure for other botnets, including the following:
- QakBot (aka Qbot, PinkSlip Bot)
A system infected with Avalanche-associated malware may be subject to malicious activity including the theft of user credentials and other sensitive data, such as banking and credit card information. Some of the malware had the capability to encrypt user files and demand a ransom be paid by the victim to regain access to those files. In addition, the malware may have allowed criminals unauthorized remote access to the infected computer. Infected systems could have been used to conduct distributed denial-of-service (DDoS) attacks.
Users are advised to take the following actions to remediate malware infections associated with Avalanche:
- Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. Even though parts of Avalanche are designed to evade detection, security companies are continuously updating their software to counter these advanced threats. Therefore, it is important to keep your anti-virus software up-to-date. If you suspect you may be a victim of an Avalanche malware, update your anti-virus software definitions and run a full-system scan.
- Avoid clicking links in email – Attackers have become very skilled at making phishing emails look legitimate. Users should ensure the link is legitimate by typing the link into a new browser (see Avoiding Social Engineering and Phishing Attacks for more information).
- Change your passwords – Your original passwords may have been compromised during the infection, so you should change them. (See Choosing and Protecting Passwords for more information.)
- Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. You should enable automatic updates of the operating system if this option is available. (See Understanding Patches for more information.)
- Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool.
Alpha and Omega Computer and Network Services, Inc. implements high level security services in order to protect your critical business infrastructure and data! Contact us today!
FREE Disaster Recovery Self-Assessment Worksheet!
FIXED COST IT SUPPORT
The above pricing is based upon:
25 Workstations + 2 server.