Categories
Blog

Patch Tuesday Leaves Outlook Users Outraged

outlook crashing

Microsoft’s recent Patch Tuesday brought four critical updates, as well as eight important updates, in an attempt to resolve 54 reported vulnerabilities found in Microsoft Windows and Microsoft Office. KB 3097877, part of security bulletin MS15-115, was found to cause a multitude of issues for those using Outlook, including the following:

  • Crashing when opening web-formatted (HTML) emails
  • Black screens when trying to log in
  • Other odd behaviours/general hangups

Upon discovering the issues, a spokesperson from Microsoft explained, “We are looking into reports from some customers who are experiencing difficulties with Outlook after installing Windows KB 3097877. An immediate review is under way.”

If you experienced issues as mentioned above, you’re likely extremely frustrated. We get that. Fortunately, Microsoft has reissued KB 3097877 to address the issues. A spokesperson expressed, “We recommend customers apply this update to help stay protected.”

There was no mention as to what the issues were caused by or why the update was faulty in its release, however, it’s vital to apply the reissued update as it’s designed to fix a series of flaws that could otherwise let attackers remotely execute code on your systems.

Call (469) 635-5500 to learn more about managed IT services.

Categories
Blog

CryptoWall: Back With A Vengeance

Don’t Let the Latest Version of CryptoWall Destroy Everything You’ve Worked So Hard to Build…

CryptoWallRemember CryptoWall, the world’s most destructive ransomware? It’s back with a vengeance! CryptoWall 4.0 has surfaced with a multitude of encryption methods and evasion tactics that are tricking even the latest anti-virus programs. Ransomware is the worst possible threat for businesses as it encrypts all of your vital information, then demands payment for the decryption key.

Tyler Moffitt, Sr. Threat Research Analyst at Webroot, explained, “CryptoWall 4.0 is the latest encrypting ransomware out right now and we’ve already observed it spreading. With the huge ‘success’ of CryptoWall 3.0, I anticipate this variant to be the number one threat to watch out for going into 2016.”

Are you prepared to fend off the destructive ransomware that costs you thousands, or worse, tens of thousands of dollars to recover?  

You’ve heard the saying ‘knowledge is power,’ and it’s absolutely true when it comes to fending off threats such as ransomware. Here are the top factors you need to know, in order to face the latest version of the most destructive ransomware:

  • Keep an eye out for its name:

The creators of CryptoWall 4.0 have given the ransomware a new name: help_your_files_ransomware. If you notice the phrase, make sure to call an experienced team of IT security professionals immediately. Also, make sure you’ve updated your file screening to include the phrase.

  • Don’t open suspicious email attachments:

If you’re not absolutely certain of the sender, do not open suspicious email attachments, even if it’s from someone you know, check the source. Don’t hesitate to call the sender and ask if they sent you something in the form of an attachment. Email attachments are still the most commonly used way to send ransomware.

  • Expect to feel even more frustrated than ever:

 In an effort to further frustrate victims into paying the fee, the attackers have started encrypting filenames, as well as files, so you’re not able to tell what files have been targeted and encrypted! This means filenames will appear with names including random letters and numbers.

  • Prepare in the same way you would for previous versions:

The good news is CryptoWall 4.0 behaves exactly like previous versions, although the encryption methods and evasion tactics are more advanced. CryptoWall 4.0 still infects in the same way, encrypts files in the same way, and uses the same domain to request/receive payments. This means you can prepare in the same way.

CryptoWall 4.0 is stronger and more sophisticated than previous versions, but ultimately, it’s the same preventative measures that matter:

  • Make sure files are backed up onsite and in the cloud, in order to ensure you’re able to recover those files instead of paying the fee.
  • Use email filtering software to prevent malicious or annoying spam from getting to your inboxes.
  • Install an enterprise-grade firewall that keeps unauthorized users away from your network at all times.
Skip to content