Technology Get the latest on technology, electronics and software…

The Official Internet/Computer Security News Discussion Thread

Thread Tools
 
Old Nov 10, 2014 | 03:26 PM
  #401  
Mizouse's Avatar
Moderator
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Oct 2004
Posts: 64,104
Likes: 3,360
From: Not Las Vegas (SF Bay Area)
Just reboot your iphone, can't use touchID after a reboot.
Reply
Old Feb 20, 2015 | 03:40 PM
  #402  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Buy a Lenovo laptop recently? Then you're probably infected with the Superfish MitM adware.

Lenovo Caught Installing Adware On New Computers
It looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time.

The adware, named Superfish, is reportedly installed on a number of Lenovo’s consumer laptops out of the box. The software injects third-party ads on Google searches and websites without the user’s permission.

Lenovo caught installing adware on new computers

Superfish appears to affect Internet Explorer and Google Chrome on these Lenovo computers.

A Lenovo community administrator, Mark Hopkins, wrote in late January that the software would be temporarily removed from current systems after irate users complained of popups and other unwanted behavior:

We have temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues. As for units already in market, we have requested that Superfish auto-update a fix that addresses these issues.

Hopkins defended the adware, saying that it “helps users find and discover products visually” and “instantly analyzes images on the web and presents identical and similar product offers that may have lower prices.”

He also says that users can refuse the terms and conditions when setting up their laptop, which means the software will be disabled. It doesn’t sound that straight-forward, however.


Other users are reporting that the adware actually installs its own self-signed certificate authority which effectively allows the software to snoop on secure connections, like banking websites as pictured in action below.

This is a malicious technique commonly known as a man-in-the middle attack, where the certificate allows the software to decrypt secure requests, yet Lenovo appears to be shipping this software with some of its products out of the box.


If this is true — we’ve only seen screenshots so far — Superfish could be far more dangerous than just inserting advertising.


Superfish is identified by antivirus products as adware and advised to be removed. One user created a video that details how to remove the software manually, for those that are affected.

Even though Hopkins says the company has stopped installing the software on computers, it appears that’s only “temporary” until the company behind the software makes some tweaks to stop pop-ups.

Reports of Superfish being pre-loaded on Lenovo computers have appeared on forums as early as mid-2014.

If this is as widespread as it appears to be, the news is not good for Lenovo computer owners. If you own a Lenovo machine, let us know in the comments if you find the Superfish software on your machine.

We’ve contacted Lenovo for comment on the Superfish software and will update when we hear back.


Update: Mozilla Firefox does not appear to be affected by the SSL man-in-the-middle issue, because it maintains its own certificate store.

Update 2: Lenovo contacted us with the below statement and says that it has disabled the Superfish software and will not bundle it in the future. The company did not, however, respond to the root security certificate flaw and does not appear to have fixed it.

“Superfish was previously included on some consumer notebook products shipped in a short window between September and December to help customers potentially discover interesting products while shopping. However, user feedback was not positive, and we responded quickly and decisively:

1) Superfish has completely disabled server side interactions (since January) on all Lenovo products so that the product is no longer active. This disables Superfish for all products in market.

2) Lenovo stopped preloading the software in January.

3) We will not preload this software in the future.

We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns. But we know that users reacted to this issue with concern, and so we have taken direct action to stop shipping any products with this software. We will continue to review what we do and how we do it in order to ensure we put our user needs, experience and priorities first.

To be clear, Superfish technology is purely based on contextual/image and not behavioral. It does not profile nor monitor user behavior. It does not record user information. It does not know who the user is. Users are not tracked nor re-targeted. Every session is independent. Users are given a choice whether or not to use the product. The relationship with Superfish is not financially significant; our goal was to enhance the experience for users. We recognize that the software did not meet that goal and have acted quickly and decisively.

We are providing support on our forums for any user with concerns. Our goal is to find technologies that best serve users. In this case, we have responded quickly to negative feedback, and taken decisive actions to ensure that we address these concerns. If users still wish to take further action, detail information is available at http://forums.lenovo.com.”


Update 3: A developer has created a website that helps Lenovo owners quickly check if they’re affected by the root security certificate and offers suggestions on how to fix if they are.

Update 4: Lenovo has released detailed instructions on how to fully remove Superfish from affected systems.
The latest definitions of Windows Defender aka MSE should remove Superfish if it finds it on your PC including the root certificate.
Reply
Old Feb 20, 2015 | 03:48 PM
  #403  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
:smh:
Reply
Old Feb 20, 2015 | 07:24 PM
  #404  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Stupid. Yeah I'll check my Yoga Pro 2 when home.
Reply
Old Feb 20, 2015 | 09:11 PM
  #405  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
Originally Posted by Whiskers
Stupid. Yeah I'll check my Yoga Pro 2 when home.
That really sucks, but it's easily uninstalled, including the certificate:

Lenovo Newsroom | LENOVO STATEMENT ON SUPERFISH

Superfish Uninstall Instructions - Lenovo Support (US)

Any Yoga 2 shipped before January will have it...

Edit: Attn Whiskers:

https://www.thurrott.com/uncategoriz...1-ultrabook2-1

Last edited by nfnsquared; Feb 20, 2015 at 09:17 PM.
Reply
Old Feb 21, 2015 | 09:10 AM
  #406  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
Yeah, buying stuff from Chinese companies is a good idea.
Reply
Old Feb 21, 2015 | 10:23 AM
  #407  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Originally Posted by doopstr
Yeah, buying stuff from Chinese companies is a good idea.
I buy most of my stuff from California
Reply
Old Feb 27, 2015 | 10:52 AM
  #408  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Lenovo Newsroom | Lenovo's Promise for a Cleaner, Safer PC
Just over a week ago, the Superfish visual discovery software preloaded onto Lenovo consumer notebooks beginning in September 2014 created concern and frustration among our customers and the security and privacy communities. We have worked with partners to create tools and update antivirus programs to eliminate Superfish software. And an automatic removal tool is available on Lenovo.com. No ThinkPads, desktops, tablets, smartphones nor any enterprise server or storage product was impacted.

Additionally, we will offer Lenovo PC users affected by this issue a free 6-month subscription to McAfee LiveSafe service (or a 6-month extension for existing subscribers). More information will be available at Lenovo.com within 7 days.

The events of last week reinforce the principle that customer experience, security and privacy must be our top priorities. With this in mind, we will significantly reduce preloaded applications. Our goal is clear: To become the leader in providing cleaner, safer PCs.

We are starting immediately, and by the time we launch our Windows 10 products, our standard image will only include the operating system and related software, software required to make hardware work well (for example, when we include unique hardware in our devices, like a 3D camera), security software and Lenovo applications. This should eliminate what our industry calls “adware” and “bloatware.” For some countries, certain applications customarily expected by users will also be included.

Lenovo will post information about ALL software we preload on our PCs that clearly explains what each application does. And we will continuously solicit feedback from our user community and industry experts to ensure we have the right applications and best user experience.

We view these actions as a starting point. We believe that these steps will make our technology better, safer and more secure.
Reply
Old Feb 27, 2015 | 12:59 PM
  #409  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ


hopefully a growing trend...
Reply
Old Feb 27, 2015 | 03:16 PM
  #410  
AZuser's Avatar
_
15 Year Member
Liked
Loved
Community Favorite
 
Joined: Nov 2006
Posts: 19,304
Likes: 3,429
Good move. But it still won't change my standard procedure of going into Programs to see what's installed, uninstall any junk, install my own anti-virus/anti-malware programs, and run thorough scans before calling it safe to use.
Reply
Old Mar 5, 2015 | 12:04 PM
  #411  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
My boss just bought a Lenovo laptop and gave it to me to work on. I'm sure it's laced with Superfish
Reply
Old Mar 5, 2015 | 12:05 PM
  #412  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
DNS enhancement catches malware sites by understanding sneaky domain names | Ars Technica
A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, initially developed by researcher Jeremiah O'Connor, uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank, it spots DNS requests for sites that have names similar to legitimate sites, but with IP addresses that are outside the expected address blocks and other related data that hints at sketchiness.

The practice of using look-alike domain names as part of an effort to fool victims into visiting websites or approving downloads is a well-worn approach in computer crime. But recent crafted attacks via "phishing" links in e-mails and social media have gone past the well-worn "typo-squatting" approach by using domain names that appear close to those of trusted sites, registered just in time for attacks to fly under reputation-scoring security tools to make blacklisting them harder. Fake domain names such as update-java.net and adobe-update.net, for example, were used in the recently discovered "Carbanak" attacks on banks that allowed criminals to gain access to financial institutions' networks starting in January 2013 and steal over $1 billion over the next two years.

Many security services can screen out malicious sites based on techniques such as reputation analysis—checking a centralized database to see if a site name has been associated with any malware attacks. But because attackers are able to rapidly register new domains with scripted systems that look relatively legitimate to the average computer user, they can often bypass reputation checks—especially when using their specially crafted domain names in highly targeted attacks.

O'Connor's approach, which is currently being tested by OpenDNS using live DNS query traffic, gets around the reputation problem by simply analyzing the domain name itself for sketchiness. It works in a way similar to natural language processing of any stream of text content. Using patterns spotted in malicious DNS traffic, OpenDNS security researchers are training the NLPRank system to identify domain names that look similar to legitimate sites but have attributes that flag them as being suspicious.

"Essentially what we are defining is a 'malicious language' within the lexical nature of DNS traffic," O'Connor wrote in a blog post being published this morning. The "language" consists of domain names that are combinations of technology company-related text (such as "java," "gmail," "facebook," or "adobe," for example with a collection of "certain dictionary words," O'Connor explained ("install," "update," "security," or "payment," for instance).

The system then performs "sentiment analysis" on frequently queried domain names in tens of billions of DNS requests that flow through OpenDNS daily, looking for patterns like these, applying a set of ranking scores to domain names that match the pattern. "If it's a Facebook-related domain and not associated with Facebook's IP address space, that would be a negative tick," said Andrew Hay, director of security research at OpenDNS, in an interview with Ars. "Or if it was registered a day ago and administered by someone with a Russian disposable e-mail address, those would be negatives." And the system can also do HTML analysis of websites associated with the domain names to check if there's a match. "We can look at fraud websites and compare them to actual legitimate pages, see how much they differ," Hay explained.

Hay said that OpenDNS is currently fine-tuning the system to prevent false positives, but that so far NLPRank has held up well in testing. "We have used it to detect malicious phishing campaigns," he said. "And we've been able to use it to validate data in other security firms' reports, giving us additional reinforcement that it's working."
Reply
Old Mar 5, 2015 | 12:11 PM
  #413  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
Originally Posted by #1 STUNNA
My boss just bought a Lenovo laptop and gave it to me to work on. I'm sure it's laced with Superfish
Maybe, maybe not. If he bought it locally in a big box store, maybe.

If he bought it online from Lenovo, maybe not.
Reply
Old Mar 5, 2015 | 12:18 PM
  #414  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Bought it locally from Tigerdirect aka CompUSA
Reply
Old Mar 5, 2015 | 03:35 PM
  #415  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Rip
Reply
Old Mar 5, 2015 | 05:12 PM
  #416  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Naw son I outsmarted it. I took out the drive and replaced it with an ssd and installed a clean version of 8.1!

Ha ha...face!
Reply
Old Jun 16, 2015 | 07:38 AM
  #417  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
All your passwords belong to us?
Lastpass would like you to believe no.

Password Manager LastPass Suffers Breach, But Says User Data Safe - NBC News
Popular password management service LastPass informed its users Monday that it had detected and blocked "suspicious activity" on its networks on Friday. LastPass works as an app or browser extension that keeps track of passwords for you, requiring only one "master password" to be remembered in order to access the rest. In a blog post, the company assured users that their passwords are completely safe, but that emails associated with accounts, and hints for their "master password" were swiped by the attackers.

"We are confident that our encryption measures are sufficient to protect the vast majority of users," wrote CEO Joe Siegrist in the post. "Nonetheless, we are taking additional measures to ensure that your data remains secure."

Anyone logging in from a new device or IP will be asked to check in via email or some other form of multi-factor authentication. And if you had a weak master password, you should probably change it, especially if your hint was "first dog's name" or something likewise revealing.
Reply
Old Jan 21, 2016 | 01:16 PM
  #418  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
https://player.vimeo.com/video/148946917
Reply
Old Jan 21, 2016 | 01:24 PM
  #419  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
nice
Reply
Old Feb 8, 2016 | 06:47 PM
  #420  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Anyone use any paid VPN services for travelling?

I am trying a 30 day trial of PrivateInternetAccess (PIAVPN.com) someone gave me.

Seems pretty quick, you can choose where your connection routes through, and they say they don't maintain any logs...

It's $7 a month or $40 a year if you buy the whole year.

We'll see if it's all it claims to be...
Reply
Old Feb 8, 2016 | 07:34 PM
  #421  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Just don't try to pay for one via PayPal...
Reply
Old Feb 9, 2016 | 01:26 AM
  #422  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by #1 STUNNA
Just don't try to pay for one via PayPal...


As a measure of anonymity, they allow you to pay with store gift cards, like Walmart, Starbucks,etc.

Last edited by stogie1020; Feb 9, 2016 at 01:28 AM.
Reply
Old Feb 9, 2016 | 05:11 AM
  #423  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA
PIA is good stuff. I used it for a while when a friend recommended it to me. Plenty fast and the different portals makes it easy to watch things on other European networks for example.

I'm waiting for a $60/2 year promotion they run once in a while. They have mobile apps for VPN on your phone as well.
Reply
Old Feb 9, 2016 | 12:13 PM
  #424  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by thoiboi
PIA is good stuff. I used it for a while when a friend recommended it to me. Plenty fast and the different portals makes it easy to watch things on other European networks for example.

I'm waiting for a $60/2 year promotion they run once in a while. They have mobile apps for VPN on your phone as well.
Cool, i didn't know about the $60/2 deal. I have the mobile apps, trying them out.
Reply
Old Feb 9, 2016 | 12:16 PM
  #425  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA
Originally Posted by stogie1020
Cool, i didn't know about the $60/2 deal. I have the mobile apps, trying them out.
https://slickdeals.net/f/7767743-2-y...vpn-service-60





Reply
Old Feb 21, 2016 | 06:24 PM
  #426  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
If you downloaded Linux Mint on 2/20/16 kill your computer with fire.
The Linux Mint Blog » Blog Archive » Beware of hacked ISOs if you downloaded Linux Mint on February 20th!
Reply
Old Mar 6, 2016 | 06:32 PM
  #427  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
If you recently downloaded Transmission for mac (v 2.90) you need to upgrade before ransomware attacks!

https://www.transmissionbt.com/
Read Immediately!!!!

Everyone running 2.90 on OS X should immediately upgrade to and run 2.92, as they may have downloaded a malware-infected file. This new version will make sure that the “OSX.KeRanger.A” ransomware (more information available here) is correctly removed from your computer.

Users of 2.91 should also immediately upgrade to and run 2.92. Even though 2.91 was never infected, it did not automatically remove the malware-infected file.
Reply
Old Mar 7, 2016 | 07:14 AM
  #428  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Im waiting to see what happened to those who get this.
Reply
Old Mar 7, 2016 | 10:07 AM
  #429  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
So... MACs CAN get a virus...
Reply
Old Mar 7, 2016 | 10:16 AM
  #430  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA


They're targeting torrenters
Reply
Old Apr 14, 2016 | 09:16 PM
  #431  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
Quicktime for Windows, and oh yeah, you should uninstall.
Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
https://www.us-cert.gov/ncas/alerts/TA16-105A
According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation.
Why it is not "according to Apple?" I guess the government is still pissed about that whole iPhone unlocking thing.
Reply
Old May 16, 2016 | 04:37 PM
  #432  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Anyone using icloud.com/me.com email addresses, be aware that Apple does not strip your end node IP address from your sent email headers. Gmail and most other web based email services (even if used through an IMAP client) will strip your end node (i.e. home) IP address to protect your anonymity against geo-location, tracking, etc. For some reason, @icloud/@me does not.

Just a heads up if you are trying to be in one place and say you are in another via email...
Reply
Old May 16, 2016 | 04:40 PM
  #433  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
Reply
Old May 16, 2016 | 05:02 PM
  #434  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA
I only use iCloud for notes/reminders and not email luckily
Reply
Old May 16, 2016 | 05:58 PM
  #435  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
Originally Posted by stogie1020
Anyone using icloud.com/me.com email addresses, be aware that Apple does not strip your end node IP address from your sent email headers. Gmail and most other web based email services (even if used through an IMAP client) will strip your end node (i.e. home) IP address to protect your anonymity against geo-location, tracking, etc. For some reason, @icloud/@me does not.

Just a heads up if you are trying to be in one place and say you are in another via email...
So, if yo wit yo ho, don't use icloud/me to lie to yo beyotch
Reply
Old May 16, 2016 | 06:30 PM
  #436  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by nfnsquared
So, if yo wit yo ho, don't use icloud/me to lie to yo beyotch
Well said?
Reply
Old Jun 17, 2016 | 08:34 PM
  #437  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
BadTunnel

http://www.darkreading.com/vulnerabi...d/d-id/1325875

https://www.blackhat.com/us-16/brief...her-power-3915
This affects all version of Windows back to 95. M$ has released MS16-077 to cover it but Windows XP and earlier won't be patched.

Dude got $50,000 for finding the vulnerability.

Last edited by doopstr; Jun 17, 2016 at 08:37 PM.
Reply
Old Jun 18, 2016 | 08:27 PM
  #438  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,983
Likes: 11,771
From: Florida
Reply
Old Jun 23, 2016 | 09:49 PM
  #439  
MaxMike93's Avatar
Currently Post-Acura
15 Year Member
Photogenic
Liked
Loved
 
Joined: Jan 2010
Posts: 998
Likes: 125
From: Bergen County, NJ
Hope everyone has backups set up just in case - ransomware keeps getting worse and worse around here. Thursday had a work computer get infected and it spread to mapped network drives. Backup Exec hadn't done a backup in 3 weeks so we were already behind and then the server's RAID 1 config blew up so it had to be recovered and the office was without email and a main program they use for almost 3 days. Also got wind that a new one came out that will install a keylogger, get your account credentials, delete any online backups, then encrypt your files to really leave you up shit creek.
Reply
Old Jun 24, 2016 | 02:08 AM
  #440  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
^^^^What version of ransomware?
Reply



All times are GMT -5. The time now is 01:53 AM.