Google Chrome Warning!

Be careful when updating your browser. Google Chrome Warning!

A fake Google Chrome update hit the Internet this Summer. Hackers tried to gain control over systems using an old technique. The fake update installs the banking Trojan Zeus and remote-control software. This allows hackers access to your PC, online banking and anything else that takes their fancy. TechRader  take a look at the Google Chrome warning!

Whilst peoples focus is on pandemic issues, hackers are taking advantage of their lack of attention to maximise their returns. Maybe their furlough payments are coming to an end 🙂 .

Using several different methods of attack, hackers are highly sophisticated. The initial attack examines your geographical location, computer and other factors. They then decide whether you are their victim of choice. It then tailors the next phase to any perceived weakness you may have.

Users are fooled into thinking to run the Google Chrome update. In reality they are installing a Trojan and remote-control system by the Google Chrome warning scam.

Google Chrome Warning

Google Chrome users are being warned against a convincing and dangerous new online scam. The fake “Google Chrome update” scam gives hackers total control over your device.

Hackers come up with a fake Google Chrome update

Google Chrome is undoubtedly amongst the leading browser software worldwide. Billions of people use Google Chrome making this an easy target for this sort of attack. Security conscious users know that updating apps is important to keep the bad guys at bay. Taking advantage of this, the scam uses a fake Google Chrome update page, to hook its victims.

If you click on the “Update Chrome” button, the dodgy website will download a hacked file. This then installs malware on your computer. The cyber-experts at ProofPoint, identified that one of the programmes used in this this attack is the banking Trojans Zeus. This program is designed to liberate money from the users’ accounts.

It gets worse

ProofPoint also noted similar attacks for Internet Explorer. Probably at the time of writing any other browsers you care to name. Remember, that also included in the attack is full commercial remote-control software. This opens your PC to full remote access from anywhere in the world. This will include access to online accounts, social media and good old-fashioned email.

Proofpoint’s Sherrod Degrippo in a statement explained that this technique is not new. However, it is still effective because it exploits the intended recipient’s desire to practise good security hygiene. He further mentioned that “keeping software updated is a common piece of security advice. As a result of this, hackers use that to their advantage”. Businesses have been targeted worldwide, including ProofPoint.

Security you never have to think about

You shouldn’t have to be a security expert to feel safe on the web. Chrome is easy to use and built to be secure. Contact the LIS Help Desk today to discuss your online security strategy.

LIS protects you from a range of deceptive and dangerous sites. Downloads may might steal passwords or infect your machine. We use the latest anti-spam and anti-virus software. Take advantage of our Office 365 Security package. As well as other cloud-based solutions. We’ll give you a clear understanding of your current exposure and of the impact such an attack would have on your business.

LIS – SECURING YOUR DIGITAL WORLD

#GoogleChromeUpdate #ScamWarning #MalwareScam

Security Challenge

Take our 60 minute security challenge

We are the local data security experts. Our team prides itself on quickly finding ways that hackers could damage your business and blocking them. Are you ready to take the security challenge?

When you’re running a business, you want to think you’ve done as much as possible to keep your data safe from theft and loss. But if you don’t have the right professionals implementing data security, how well protected are you really?

In fact, if you give us just 60 minutes, we’re confident we would find something wrong with your IT setup that places your data security at risk.

Watch our new video to find out more – then contact us to start your 60 minute security challenge.

Secure your business for peace of mind

Technology is advancing every day and so is the risk of hacking. Users are increasingly facing the risk of hacking as cyber security threats become progressively more sophisticated. Implementing a firewall on your network perimeter and anti-virus on your desktop is no longer a sufficient solution – the attack surface is now much bigger.

Take our 60 minute security challenge. If you give one of our experts just 60 minutes to examine your IT systems, we’re confident they’ll find a data security breach that will horrify you. Of course, we’re not doing this to be cruel.

We want to show you what extra measures your business should be taking to keep your data safe. And your people and clients protected. Let’s face it, it’s better that WE find the breach, than a cyber-criminal does.

Contact the LIS Help Desk to help you stay vigilant when it comes to hackers. We will suggest which upgrades for your system are best suited to your business. This will improve your IT security.

#WeChallengeYou #60minuteSecurityChallenge #Security #Business

 

Return to work traps

As businesses transition their workforces back to the office, hackers are distributing phishing emails and malicious files disguised as COVID-19 training materials. Return to work traps are becoming more common as cyber criminals take advantage of the pandemic.

Return to work traps take advantage of employees

According to a new report from UK Tech News, criminals are setting “return to work traps”, taking advantage of the training employees need to go through as they return to the office in its new form.

They claim many workers now need to go through various tutorials, webinars and training sessions. Ensuring they are compliant with new workplace rules set up to prevent viral transmission. Sensing an opportunity, cybercriminals are disguising malware as webinar recordings and other educational material, it was said.

According to the report, these new practices are mostly reserved for businesses in North America and Europe, where lockdown measures are slowly being eased up and people are being allowed to return to work.

Return to work traps.jpg

Workers return to their offices and cyber criminals will abuse Covid-19 to spread malware and steal sensitive data.

Open emails and documents with caution

Make sure emails and documents are from a legitimate source from within the company. We are seeing a trend of hackers leveraging household names, such as Microsoft Office 365, to trick employees. One thing is for certain: the coronavirus pandemic is leading us towards a cyber-pandemic.

Protect you staff at home

Organizations are allowing employers to access work-critical information from their homes. This is  a vulnerability as many employers working from home are in need for a VPN (virtual private network). Unconsciously they are downloading software from untrustworthy sites leaving their computers infected.

In addition, the tech support scammers will also emerge, pretending to be trying to fix an IT problem. They attempt to gain control of a target’s computer; and hackers may call pretending to be another department of an organization to get access remote and tricking general staff. On a bigger scale, cyber criminal groups in Russia, China and North Korea were exploiting the growing chaos to target national governments like the US, Japan, and Italy.

While some organizations are using tech to fight coronavirus, attackers are using healthcare organizations as a target. This will be particularly dangerous as those are the most vital among us at the time. A recent example was the ransomware attack against the University Hospital in Brno, Czech Republic. One of the largest COVID-19 research labs in the country, shutting down the entire IT network and causing anxiety to an already stressed staff.

Stay safe. Protect your business

Unfortunately, we do not see cybercrime going away in the near future. Cybercrime has rocketed since the start of the Covid-19 pandemic as many try to exploit people’s fears. IS your  operating system and software up to date? Do you use the latest Anti-Virus and Anti-Spam solutions?

Contact the LIS Help Desk to discuss the most cost-effective solutions for your company. Our experienced and friendly team will make sure you have the correct protection in place. We will carry out an IT Audit and recommend upgrades to hardware and software. Why worry about your IT security? LIS take care of all your IT requirements.

LIS – SECURING YOUR DIGITAL WORLD

#Cybercrime #Security #ITSupport #AntiVirus

Save The Planet

As a society, we get through serious amounts of technology. Help save the planet! What do you do with your old devices though? Sell them? Shove them in a drawer and forget all about them? We should be recycling them to help the planet. The Evening Standard published a story about how millions of old gadgets can be recycled into new shiny ones.

When you’re done with your old PC, laptop or Mac, don’t just throw it in the rubbish. Make sure you recycle it properly, including safely removing any personal data on your computer’s hard drive.

Recycling an old computer can be relatively straightforward. When you buy a new electrical item such as a PC or laptop, the retailer you buy from is legally obliged to help you safely and responsibly dispose of the item you are replacing.

Save The Planet.jpg

Computer Recycling – Technology continues to rapidly grow. Make sure you recycle your old machines the right way.
Do not risk getting a fine!

Computer recycling schemes help save the planet

One of the best recycling services we’ve come across is called WeeeCharity. This charity will collect your old computing equipment free of charge from your home. It will also offer to wipe your data securely, free of charge. WeeeCharity donates refurbished computers to those in need, or else disposes of them in an environmentally responsible manner.

Alternatively, your local council may run a scheme for recycling old computers (but it might charge for collection). For more details, go to the Environment Agency Website or contact your council.

You can also enter your postcode at the Recycle Now website to see whether there’s a recycling scheme near you. Alternatively, the Freecycle Network will help you give away your old machine, and Computer Aid International sends computers to developing countries.

In all cases, it’s essential to take some steps to securely remove the data on your computer. Some charities offer to do this for you. If you’d prefer to take matters into your own hands, follow our advice below.

Factory reset your computer before recycling

Before recycling a laptop or desktop, you should reset it to its ‘factory settings’. In theory, this leaves only the bare operating system and pre-installed programs on the device – removing access to your files and any programs you’ve added.

It’s essential before beginning the proces to back up all your data. Firstly, store them safely on an external hard drive. Then save them to your new computer or in online cloud storage solutions. Finally, if you wish to reinstall software from your old computer onto a new one, note down the licence keys. You’ll need these to install paid-for software (including Microsoft Office) on a new machine.

Use data-shredding software

Scrapped computers can end up being recycled anywhere, often with the components stripped out to extract valuable metals. It is also possible to extract potentially sensitive data at this point, even with a computer that’s been factory reset as per the steps above.

To be certain your data is gone, you should consider using data-shredding software. Windows 10 lets you shred data from within its factory reset options. If you’re using a different operating system, it’s a good idea to run additional software.

Remove the hard drive

If you’re recycling a laptop or desktop and would prefer not to dabble with data-shredding software, the safest way to make sure your data isn’t accessed is to physically remove the hard drive.

You can put an old hard drive into an external caddy – available for about £12 online. This will convert it into a USB hard drive that you can use to store and access data, just like a regular external hard drive.

Alternatively, you can smash the old hard drive to make it unrecoverable. It’s physical work – you’ll need to destroy it with a few satisfying blows of a hammer to break the ‘platters’ that hold the data.

How we help save the planet

We are unable to save the animals or forests of the world. We offer a recycling service to our clients, by taking your old equipment. Our recycling program makes sure your we dispose of your items ethically and abide by UK law.

Contact the LIS Help Desk to talk about upgrading your equipment. Our friendly team are here help you with data shredding, transfer of data and other issues you have.

LIS – SECURING YOUR DIGITAL WORLD

#recycle #OldDevices #SaveThePlanet

Windows File Recovery App

Windows File Recovery app is a new app from Microsoft that can recover deleted files. Have you ever deleted important files accidentally? We’ve all been there, shift + delete can sometimes be a nuisance, or deleting the recycle bin and then realizing that you needed one of the files. If you have a backup you may restore the files but if you don’t, you are left with file recovery software or caches.

Abhishek Baxi from the technology news website Neowin explains more in their recent article. Microsoft’s new Windows File Recovery app will assist in recovering files that you may have deleted and want to bring back or resolve issues with corrupted data.

It supports a number of file types for photos, videos, documents, and more. Whilst also supporting a number of file system types, including:

  • NTFS
  • FAT
  • exFAT
  • ReFS
Windows File Recovery app

Microsoft is releasing its own Windows file recovery tool, designed to retrieve files you have mistakenly deleted.
Like any file recovery tool, you will need to use it as soon as possible. Ensuring files have not been overwritten.

A number of options

It offers users a number of recovery modes. Which one you should choose  depends on how long it has been since the data was deleted. For example, for files deleted recently, the default option should suffice. However, if it’s been a while or the disk has been formatted since, then the Segment and Signature modes may be more successful.

Whilst the app is usable by anybody on Windows 10 or later, it is recommended for power users, as it uses a command line interface. Using the Microsoft Store on Windows 10, the file recovery app can be downloaded.

While this certainly isn’t a tool for beginners, it’s nice to have it available in case the worst happens. We are are all human and sometimes unintentionally delete files. One thing to keep in mind, though, is not to wait to use it once you realize a file or files are missing. As Microsoft points out in the documentation, “If you want to increase your chances of recovering a file, minimize or avoid using your computer. In the Windows file system, the space used by a deleted file is marked as free space, which means the file data can still exist and be recovered. But any use of your computer can create files, which may over-write this free space at any time.”

Giving  you peace of mind

We are unable to control how your staff operate their PCs. However, rest assured we can set up a cloud based back up system. Our solutions secure your files and back up your data. You are in safe hands.

Contact the LIS Help Desk to discuss your requirements. We protect anything from a single PC or laptop to large corporate servers. We cover your Office 365 One Drive and Share Point files, Exchange and SQL server data, and can even provide 10 year email archiving. So, you have certified evidence against future litigation.

All our backup systems are secure, encrypted, robust, tested and built to meet your specific requirements.

LIS – SECURING YOUR DIGITAL WORLD

#Microsoft #FileRecovery #WindowsFileRecovery