Categories
Blog

Facebook Scam Steals Your Credit Card Information

Social media continues to be a primary method of keeping in touch with friends and family — whether they live near or far. The average American does not just sit down on their couch after a long day at work and browse through their favorite site for a few minutes, though. Today. people access these sites from their mobile devices while they are on the go as well. This constant exposure to these sites means that it is more likely that you will fall victim to an innocuous-looking scam.

Social Media

Sunglasses Scam

Who hasn’t seen a post by a friend on their social media page prompting them to purchase a pair of their favorite sunglasses at a steep discount? This is the result of your friend’s account being hacked, though it might not be apparent that this is the case at first. Instead, you might think that they are actually doing you a favor. After all, with the many outlet shops and overstock opportunities today, it makes perfect sense that your favorite type of sunglasses would be heavily discounted and that your friend would think of you.

How the Crooks Scam You

Once you click on the link included in the ad your friend posted, you’ll typically see an array of sunglasses from your favorite brand. Curiously, all them will be marked down by the same percentage points. Perhaps, though that does not seem strange to you, so you decide to purchase a few pairs at the great, heavily discounted price. Instead of going to a secure site that is protected by an industry-standard SSL certification, so that your credit card information is encrypted, you’ll be taken to a non-secure website that offers no protection whatsoever. Instead, your credit card information is transmitted to the scam artist in plain text and can be exploited in the future.

How to Protect Yourself

First, if it looks like it is too good to be true, then it nearly always is. Don’t fall for heavily discounted items and inquire on the manufacturer’s website or social media page about the validity of the ads claims before you complete on online transaction. If you are the person whose account is generating these ads, first change your password, then remove all apps that look suspicious. Finally, run a thorough virus scan from a trusted manufacturer on your computer.

Categories
Blog

Protecting Your Business Against the Badlock Vulnerability

During late March of 2016, a vulnerability now called Badlock was found in the popular business network application Samba. Samba enables different kinds of computers to connect to files and printers on Microsoft Windows servers, the central platform for many businesses. Badlock is particularly serious, because it not only affects a whole range of different Samba versions, but, because of the manner in which it works with Windows computers, it makes them vulnerable to attack in other ways.

Badlock Virus

Badlock Creates Business Risks

The Samba software suite performs a variety of functions and is especially common on business networks. While Badlock could make home networks vulnerable, too, I believe attackers are much more likely to target businesses. Here are the types of attacks I believe Badlock enables against business networks.

Man in the Middle (MitM) Attacks

Samba works by connecting to your business’s central Windows server, the place in which your user account information is stored, called the Active Directory (AD) server. Badlock lets attackers perform what’s called a “Man in the Middle” attack, which lets the culprits see information moving between your AD user account server, your file server and your staff’s computers. Private business files and user information can be stolen this way.

Denial of Service (DoS) Attacks

If that weren’t bad enough, Badlock also makes businesses vulnerable to something called a Denial of Service attack. Here, instead of trying to access your business’s information, Badlock simply lets attackers punch a hole through IT security systems and overwhelm your Windows servers, preventing you from accessing your files or even logging into your computers.

What to Do

Technical information for IT staff can be found on the Badlock vulnerability awareness site. In general, all businesses affected by Badlock should take the following actions:

Prioritize the Application of Security Fixes

Updating your computer systems with the latest security fixes — patching — is the single most important step to take regarding Badlock. Patches are available now for affected versions of Samba. Badlock affects older versions of Samba, too, some of which are no longer supported by the developer. If your business is using Samba version 4.1, you should know that it will never receive a fix, and you should make upgrading to a newer, safer version a business priority.

Audit Computer Systems for Unnecessary Samba Connections

A general rule of IT security is that if you’re not using a particular feature, always turn it off. Leaving your network up and open when you don’t need it is akin to leaving a door to your business unlocked just because you think that someday you may need to use that door. If an audit hasn’t been performed in a while, work with IT staff to review your computer network for unnecessary, open network connections. These could be Samba connections or other types.

It is important to know that patching and auditing your computer systems against Badlock may require some downtime. This can be a tough pill to swallow for businesses that rely heavily on their computer systems, but Badlock is serious enough that you must make this a priority. The potential damage an attacker can wreak on your systems is just too great to delay taking action.

Get Further Advice on Badlock or Business IT Security

Do you want additional advice on how to handle Badlock or other IT security matters? Our team has years of experience to offer you. Give us a call at (469) 635-5500 today.

Categories
Blog

The Potentially Dangerous Effects of Badlock

As the owner of an IT company, we take the risk of your cybersecurity threats very seriously. In April 2016, Samba and Windows users discovered the potential dangers of the Badlock bug. This bug is in its infancy but could get worse. By understanding what Badlock is now, how it affects users, what signs to look out for, and how to get rid of it, you can prevent Badlock from ever worming its way into our clients’ computers.

Virus Badlock

What Is Badlock?

This new bug was discovered in March 2016 with its own .org site. It began affecting Samba and Windows users by April. Any Samba users running 3.6.x, 4.0.x, 4.1.x, 4.2.0 through 4.2.9, 4.3.0 through 4.3.6, and 4.4.0 could be targeted. Any Windows users running Windows XP, Windows 2000, Windows 2003, Windows 7, Windows Vista, Windows 8, Windows 8.1, and Windows 10 can be affected as well.

What Does Badlock Do?

Badlock affects both the Local Security Authority Domain Policy or LSAD and Security Account Manager or SAM protocols. This bug can then attack users’ computers in one of two ways:

  • Denial-of-service attacks: Also known as DoS attacks, denial-of-service attacks can kill service, preventing users from getting online and doing other basic computer functions.
  • Man-in-the-middle attacks: Also known as MITM attacks, man-in-the-middle attacks can affect up to two users at once, as the name suggests. A hacker or attacker can glean information and gain private access by changing the conversation stream and other data between two users.

How Do You Know If You Have Badlock?

It can be difficult to know if your clients have Badlock. To be on the safe side, you should consider sending out an email or making a video informing all your clients of what Badlock is and what it could do. If any of your clients report that their computer has been acting strangely, it’s best to address this as soon as possible.

How Can You Prevent Badlock?

At this point, the respective Samba and Windows teams are working tirelessly to prevent the spread of Badlock to any other users. Samba users can download an office patch that was released for SAMBA+ and Enterprise SAMBA. Windows users can report any instances of Badlock. However, Microsoft is optimistic that the company is doing a good job containing the bug.

Badlock: The Verdict

While Badlock sounds risky and scary in name alone, the consensus is that it’s not as detrimental as other bugs and vulnerabilities. Microsoft has an Exploitability Index where bugs are rated on a scale of one to 10. The tech giant rated Badlock a three out of 10. One reason Badlock isn’t causing a huge panic is because of its MITM method of attack, which requires any hacker to know a bit about the network they’re invading. That takes more time, patience, and dedication than random attacks.

Overall, you shouldn’t overlook Badlock entirely (especially if your clients use Samba or Windows), but with some education, your clients can prevent the spread of Badlock relatively easily. With enough awareness, it seems like the potentially dangerous Badlock bug can be contained and prevented from more widespread attacks.

Categories
Blog

Top Ten Ways To Create A Strong Password

Creating a password is not as easy as it has been in the past. People today are forced to make stronger passwords and keep track of several different ones. While this may seem complicated, it is important to create a strong password so that your information can be kept safe and secure. Use these tips to create a strong password every time.

Stronger Passwords

  • Embrace Complexity. A good password is one that is hard to figure out. If you create a complex password then it will more difficult for hackers to break it. You can do this by utilizing combinations of uppercase and lowercase letters, special characters, and other forms of punctuation in your password. You can even create a common phrase that only you would know, not one that can be guessed from a song, movie, or other common vernacular.
  • Stay Away From Easy Guesses. While this may seem obvious, there are still attacks (about 3/4 of them) that involve easily cracked passwords. To stay away from passwords that are easy guesses do not use family member names, pet names, favorite bands, or other information anyone may know about you. In no circumstance should you use a password like “admin” or “password” as they are easily guessed.
  • Do Not Share Your Password. You may share a lot of things with people but your passwords should not be on that list. This includes your friends, family, and colleagues. Even if you trust the person with everything, keep your passwords private.
  • Always Make New Passwords. Do not reuse old passwords or use the same one for multiple websites. This is a terrible idea because if you do this and a hacker cracks one password, he has cracked them all. More than half of users recycle passwords on multiple accounts and this act puts you in danger.
  • Update Your Passwords Regularly. It may seem like a hassle but updating your password often helps keep your accounts more secure. When you update a password, do not simply add another number on to your old one. Create an entirely new password.
  • Consider A Password Storage System. If you are creating different passwords for all accounts as you should be, there will be a lot of passwords to keep up with. Consider using a password management solution or save them in a very safe place such as an encrypted file. Whatever you do, do not keep your list of passwords on a sheet of paper where anyone can find it.
  • Take Advantage of Multifactor Authentication. Whenever possible, utilize multifactor authentication to protect your accounts. With this method, you can easily confirm your identity using a one-time password or PIN given to you through your email or phone. Set these up in case you forget a password so that only you can unlock the account.
  • Keep Everything Central. Manage everything from a central location instead of various locations. This is another reason why it is good to use a password management system. That kind of system can also generate strong passwords for you and remind you to update it periodically.
  • Create a Single Sign On For Accounts. If you do need to have people sign on to the same system but do not want everyone to have their own access to keep up with, use a single sign on that everyone can use. This is not ideal for all systems but it can be efficient in some areas.
  • Manage Passwords and Password Policies Smartly. No one wants to have their information used without their permission. Make smart decisions about your passwords.
Categories
Blog

Top 3 Computer Viruses You Should Know About

A computer virus is at best a mild inconvenience that requires time and money to solve, and at worst something that compromises your personal security and crashes your whole system. At either end of the spectrum it is clearly something that should be avoided at all costs.

Computer Virus

The very first computer virus was the Creeper program, which was designed not to harm computers but to display a message. The second was the Reaper program which was designed specifically to delete the Creeper. The first virus to get into the wild and spread, was the Elk Cloner. It to was mostly harmless and meant as a prank at first. Most virus’ are not as harmless as these, and despite efforts on many levels to prevent them new viruses emerge often. There are a few that have stood out in the past few years as particularly bad and/or far reaching.

Viruses You Should Know About

  • Sobig.F: This version of the Sobig virus has been dubbed the “fastest growing virus in history.” The thing about this virus is it will come from people who are seemingly trustworthy. It may be a co-worker or friend who sends the email for all you know. The attachment will be labeled things such as “thank you”, or “wicked screen saver”, things that they may actually send you. When the attachment is opened it sends the virus to all the people on your email list spreading itself across the internet through email attachments.
  • Blaster: This virus is also in the form of a worm that is spread through Microsoft Windows XP and Windows 2000. It could be spread without the user actually opening an attachment. The 18-year-old creator was sentenced to 18 months in prison, despite the virus not being known for being particularly harmful because it was far reaching and the implications of a worm spread without the user opening an attachment is disturbing, even if it was isolated to one operating system.
  • My Doom Virus: This virus has been dubbed the worst ever. It is a worm like Sobig, but shortly after it emerged it accounted for 20 percent to 30 percent of the email traffic in a single day. Slowing systems and spreading faster than anyone could have expected.

What Can You Do to Protect Yourself and Your Company?

  • Do not open e-mails that look suspicious or from an unknown sender.
  • Do not ever open an e-mail attachment unless it is from a sender you know and you are expecting it.
  • Keep your anti-virus software up to date.
  • Also keep in mind that if your computer is running very slowly, something is wrong. Chances are it is a virus of some sort and you should get it checked out by professionals for both increased security and speed.

At Data Magic Computer Services we offer IT services at the level you need. From full data management, to co-management, to consulting and development. Contact us today to increase your company’s security and prevent any of these viruses from effecting your business. If your personal or work computer is infiltrated by any virus we can help remove it and repair whatever weakness allowed it in to begin with.

Skip to content