<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware protection Archives - A1 Computer Repair</title>
	<atom:link href="https://a1computerrepair.com/tag/malware-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://a1computerrepair.com/tag/malware-protection/</link>
	<description>Computer Services</description>
	<lastBuildDate>Sun, 24 Jul 2022 01:31:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Millions Exposed To Ads That Use Infected Images</title>
		<link>https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 08 Dec 2016 06:51:33 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[malvertising]]></category>
		<category><![CDATA[malware ads]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus protection]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1651</guid>

					<description><![CDATA[<p>Antivirus provider ESET released a report on Tuesday stating that its researchers have discovered malicious code residing within advertisements that are currently in rotation on many “reputable” news websites. Since the beginning of October, these malicious ads have been exposed to millions of web surfers who still use Microsoft’s Internet Explorer browser. According to the [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/">Millions Exposed To Ads That Use Infected Images</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Antivirus provider ESET <a href="https://www.eset.com/us/resources/detail/malicious-code-hides-in-pixels-of-advertising-banners-eset-uncovers-new-stegano-exploit-kit/" target="_blank" rel="noreferrer noopener nofollow">released a report on Tuesday</a> stating that its researchers have discovered malicious code residing within advertisements that are currently in rotation on many “reputable” news websites. Since the beginning of October, these malicious ads have been exposed to millions of web surfers who still use Microsoft’s Internet Explorer browser.</p>


<div class="wp-block-image">
<figure class="alignleft"><img fetchpriority="high" decoding="async" width="450" height="300" src="https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb.jpg" alt="Millions Exposed To Ads That Use Images Infected By Malicious Scripts" class="wp-image-1650" srcset="https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb-250x167.jpg 250w" sizes="(max-width: 450px) 100vw, 450px" /></figure></div>


<p>According to the report, the ads promote applications called “Browser Defense” and “Broxu.” What’s scary is that the actual graphic used in these ads contain malicious code buried within the parameters of their alpha channel, which is used to define the transparency of each pixel in images. By way of explanation, an alpha channel is what makes the background color of an image transparent so that the focused object can reside as an overlay against any backdrop image or color.</p>



<p>Adding the malicious script to an image’s alpha channel is only a minor modification. The resulting image has a slightly different tone than the original, but if web surfers have no idea what the originating image looks like, then they have no clue the altered, malicious version is on their screen. The sample provided by the ESET researchers is barely indistinguishable from the “clean” original.</p>



<p>Once the advertisement is displayed on the visitor’s screen, the embedded code uses the CVE-2016-0162 vulnerability in Internet Explorer to scan the target PC to see if it’s running on a malware analyst’s machine. If the coast is clear, it will then load a landing page that includes a Flash file built for exploiting three vulnerabilities in Flash Player: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.</p>



<p>“Upon successful exploitation, the executed shell code collects information on installed security products and performs — [in a manner] as paranoid as the cybercriminals behind this attack — yet another check to verify that it is not being monitored,” <a href="http://www.welivesecurity.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/" target="_blank" rel="noreferrer noopener nofollow">the antivirus firm reports</a>. “If results are favorable, it will attempt to download the encrypted payload from the same server again, disguised as a GIF image.”</p>



<p>When the encrypted payload is downloaded to the target PC, it is then decrypted and launched through regsvr32.exe or rundll32.exe in Microsoft Windows. The payloads detected thus far have included various trojan downloaders, banking trojans, backdoors, spyware, and “file stealers.”</p>



<p>The attack is based on the Stegano exploit kit, which uses steganography to hide malware out in plain sight. The term is typically used when hiding messages or information within public text and data. However, in this case, the method throws a malicious script within the alpha channel information of an image. The kit was first used in 2014 to target Dutch customers, and moved on to residents in the Czech Republic. New attacks are targeting web surfers in Australia, Britain, Canada, Italy, and Spain.</p>



<p>ESET senior malware researcher <a href="http://www.welivesecurity.com/2016/12/06/stegano-exploit-kit/" target="_blank" rel="noreferrer noopener nofollow">Robert Lipovsky pointed out in an interview</a> that web surfers aren’t required to do anything to trigger the malicious script: all they have to do is visit a website displaying the infected ad. The payloads aren’t random either: attackers choose what to download to the target PCs.</p>



<p>Lipovsky added that the firm didn’t release a list of websites affected by the malicious ads because the information didn’t add any value to the warning. Even more, the firm didn’t want to inflict reputational harm to the websites given that they had no clue or control over displaying the ads. Naturally, web surfers can stay safe by keeping their browser, Flash Player, and security software updated regularly.</p>



<p><a href="http://www.digitaltrends.com/computing/eset-malware-images-alpha-channel-browser-defense-broxu-stegano/" target="_blank" rel="noreferrer noopener nofollow"><span style="font-size: small;">http://www.digitaltrends.com/computing/eset-malware-images-alpha-channel-browser-defense-broxu-stegano/</span></a></p>
<p>The post <a href="https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/">Millions Exposed To Ads That Use Infected Images</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be careful, it is The Season for Cyber Criminals</title>
		<link>https://a1computerrepair.com/be-careful-it-is-the-season-for-cyber-criminals/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Dec 2015 17:26:33 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[malvertising]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware ads]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[virus protection]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1630</guid>

					<description><![CDATA[<p>With the end of the year, the volume of internet sales increases drastically due to Black Friday, Cyber Monday, Christmas, and New Year’s Eve. Cybercriminals also increase their activity on these dates, as they want to go unnoticed in the high number of transactions. For that reason, you must be aware of the threats you [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/be-careful-it-is-the-season-for-cyber-criminals/">Be careful, it is The Season for Cyber Criminals</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With the end of the year, the volume of internet sales increases drastically due to Black Friday, Cyber Monday, Christmas, and New Year’s Eve. Cybercriminals also increase their activity on these dates, as they want to go unnoticed in the high number of transactions.</p>



<p>For that reason, you must be aware of the threats you are exposed to in order to avoid an unwanted gift—more than your grandma’s socks.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="450" height="278" src="https://a1computerrepair.com/wp-content/uploads/2015/12/cyber-criminals-450x278.jpg" alt="cyber criminals" class="wp-image-1629" srcset="https://a1computerrepair.com/wp-content/uploads/2015/12/cyber-criminals.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2015/12/cyber-criminals-250x154.jpg 250w" sizes="(max-width: 450px) 100vw, 450px" /></figure>



<p>According to <span style="color: #0000ff;">Allianz</span> Risk Barometer for 2015, cybercrime rose three positions from 2014 to become the fifth top global business risk in 2015. It is a big threat that continues to expand; you have to be informed about it and take action to avoid it.</p>



<p>Let’s take a look at the biggest threats that you should be aware of.</p>



<h2 class="wp-block-heading">Malvertising: A growing threat</h2>



<p>Malicious ads are online advertisements on legitimate websites created to deliver and spread spyware, ransomware, and other malware to end-user systems. They are usually shown as targeted pop-up advertisements or as banner ads on online shopping sites, news portals, social media sites, and gaming and adult platforms.</p>



<p>Unlike other malware delivery mechanisms which require user action (clicking a link or opening an email attachment), malvertisements often require no user interaction to work, which makes them quite dangerous.</p>



<p>Sometimes, just visiting a webpage with malicious ads on it is enough to infect a system. In other cases, users have to click fake Flash or Java updates, or fake anti-virus alerts, to get infected.</p>



<p>Typically, larger websites receive ads through multiple ad brokers and networks automatically, with little action margin to filter them. As advertisements are tailored to the user’s demographics, location, and browsing history, attackers can deliver the malware to their desired victims.</p>



<p>Security vendor <span style="color: #0000ff;">RiskIQ</span> reported a shocking 260 percent increase in the number of detected malvertisements in the first half of 2015, compared to the same period last year.</p>



<p><strong><span style="font-size: medium;">Unfortunately, there isn’t much you can do to avoid malvertising, but make sure you have <u>good commercial antivirus software</u> installed so that if you do stumble upon a bad ad, you will have an extra layer of protection.</span></strong></p>



<h2 class="wp-block-heading">Phishing</h2>



<p>One of the most dangerous threats this season is <a href="https://hacked.com/tag/phishing/" target="_blank" rel="noreferrer noopener nofollow"><span style="color: #0000ff;">Phishin</span></a>g. Phishing occurs when cybercriminals attempt to get your usernames, passwords, and credit card details by creating a fake version of a real and well-known site. Users get tricked into entering their sensitive information, thinking that the site is the real one. You may arrive at one of these sites by misspelling the address or by following links on forged emails, ads, or posts.</p>



<p>This time of year we always see several fake stores emerge. They are there for a couple of weeks, then disappear with your sensitive data and your money.</p>



<p>The <a href="http://www.antiphishing.org/" target="_blank" rel="noreferrer noopener nofollow">Anti-Phishing Working Group</a> reports that in the last quarter of 2014, there was an increase of 18 percent in the number of unique phishing reports compared to the previous quarter and that retail /service was the most targeted industry sector, with payment services close behind.</p>



<p>To confirm that you are on a real, legitimate site, look for the https protocol at the beginning of the URL and check that there is a padlock icon, indicating that the identity of the site is confirmed by a third-party security firm.</p>



<p><span style="color: #0000ff;">Click Here to Continue Reading This Article</span></p>



<p><em>When you are browsing a site look for <strong>https</strong> and the padlock icon to ensure its authenticity and that your information will be transmitted securely.</em></p>
<p>The post <a href="https://a1computerrepair.com/be-careful-it-is-the-season-for-cyber-criminals/">Be careful, it is The Season for Cyber Criminals</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How To Protect Your Files From Malware</title>
		<link>https://a1computerrepair.com/hot-to-protect-your-files-from-malware/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 11 Apr 2015 18:29:56 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti cryptolocker]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[apple security]]></category>
		<category><![CDATA[back up]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[computer help]]></category>
		<category><![CDATA[Computer Tips]]></category>
		<category><![CDATA[Cryptolocker Prevent]]></category>
		<category><![CDATA[e-mail fraud]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[ransomware removal]]></category>
		<category><![CDATA[remove hijacker]]></category>
		<category><![CDATA[remove malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows security]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=1347</guid>

					<description><![CDATA[<p>Protect Your Files From Malware and Viruses Backing up your files is the best way to protect your files and data. Once you have a great backup system installed, you’ve already taken the most important step in protecting your computer – but there are threats beyond data loss that you can prepare for. Malware (short [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/hot-to-protect-your-files-from-malware/">How To Protect Your Files From Malware</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Protect Your Files From Malware and Viruses</h2>



<p>Backing up your files is the best way to protect your files and data. Once you have a <a href="/managed-services/"><span style="color: #0000ff;">great backup system</span></a> installed, you’ve already taken the most important step in protecting your computer – but there are threats beyond data loss that you can prepare for.</p>



<figure class="wp-block-image"><img decoding="async" src="/wp-content/uploads/2015/04/ransomware_protection_thumb.jpg" alt="How To Protect Your Files From Malware" title="Protect Your Files"/></figure>



<p>Malware (short for malicious software) is software that is developed to disrupt or damage a computer system. It can appear in a number of ways and can be used to gather private information, delete data or even lock people out of their own files. According to <a href="http://usa.kaspersky.com/internet-security-center/#.VSlkPBiJTKg" target="_blank" rel="noreferrer noopener nofollow">Kaspersky Labs</a>, <strong>there are more than 200,000 new malware threats per day!</strong></p>



<p>One such malware, <a href="/free-cryptolocker-malware-protection/"><span style="color: #0000ff;">Cryptolocker</span></a>, has been making the internet rounds over the past several weeks. The software is called “<a href="/avoid-ransomware-attacks-using-these-5-steps/"><span style="color: #0000ff;">ransomware</span></a>”, as it encrypts the files on infected computers so users can’t access them. When someone tries to open a file on a computer infected with this malware, they are alerted that they must pay $300 for their files to be unencrypted so they can access them. Deleting the malware or refusing to pay the ransom will leave their files encrypted.</p>



<p>As a trusted partner in data protection, <a href="/managed-services/"><span style="color: #0000ff;">Carbonite Backup</span></a> wants to ensure that our customers are aware of these threats and know how to prevent them from infecting their computers and servers. Here are some tips that can help you avoid malware and other types of viruses to protect your files:</p>



<ul class="wp-block-list"><li>Be an email skeptic: Malware is often spread through email links or attachments. Don’t open attachments or click on links from people or companies you’re not familiar with.</li><li>Free software – too good to be true?: Downloading free software is tempting, but it may include spyware and other malicious content. Only download software from trusted vendors.</li><li>Down with the pop-ups: Block pop-up windows and don’t click on links or buttons within them.</li><li>Bump up your browser security: Go into your web browser settings and make sure your security settings are set to medium or higher.</li><li>Beware of illegal downloads: While it’s tempting to watch a movie that’s still in theatres on your computer, many files shared on illegal file-sharing sites have pieces of malware attached to them.</li></ul>



<p>These are just a few tips that can help you avoid the headaches to protect your files and other negative effects of malware. Need more information on backup software? <a href="/contactus/"><span style="color: #0000ff;">Contact Us</span></a> or <a href="/create-support-ticket/"><span style="color: #0000ff;">Open a Support Ticket</span></a>, we are here to help.</p>



<p><em><span style="font-size: medium;">Reprinted from an article</span></em></p>
<p>The post <a href="https://a1computerrepair.com/hot-to-protect-your-files-from-malware/">How To Protect Your Files From Malware</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Avoid Ransomware Attacks Using These 5 Steps</title>
		<link>https://a1computerrepair.com/avoid-ransomware-attacks-using-these-5-steps/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 06 Sep 2014 01:16:35 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[back up]]></category>
		<category><![CDATA[Computer Tips]]></category>
		<category><![CDATA[computer virus removal]]></category>
		<category><![CDATA[crypto locker]]></category>
		<category><![CDATA[Cryptolocker Prevent]]></category>
		<category><![CDATA[cryptolocker prevention]]></category>
		<category><![CDATA[free download]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[ransom ware]]></category>
		<category><![CDATA[remove crypto locker]]></category>
		<category><![CDATA[virus protection]]></category>
		<category><![CDATA[Virus Removal]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=888</guid>

					<description><![CDATA[<p>Ransomware is malicious software used by cybercriminals all across the world to get hold of your computer and computer files for ransom, demanding payment from you to get them back in normal working condition. Although ransomware is not a common malware, over time it has proved to be a very effective one. Various new variants [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/avoid-ransomware-attacks-using-these-5-steps/">Avoid Ransomware Attacks Using These 5 Steps</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="alignleft size-full"><img decoding="async" width="300" height="215" src="https://a1computerrepair.com/wp-content/uploads/2022/05/ransomeware-prevent.png" alt="Avoid Ransomware Attacks" class="wp-image-2046" srcset="https://a1computerrepair.com/wp-content/uploads/2022/05/ransomeware-prevent.png 300w, https://a1computerrepair.com/wp-content/uploads/2022/05/ransomeware-prevent-250x179.png 250w" sizes="(max-width: 300px) 100vw, 300px" /></figure></div>


<p>Ransomware is malicious software used by cybercriminals all across the world to get hold of your computer and computer files for ransom, demanding payment from you to get them back in normal working condition. Although ransomware is not a common malware, over time it has proved to be a very effective one. Various new variants of ransomware are swarming in the digital market these days, all specifically designed to frighten the victim into paying a fee to get their computer back in a normal working state. Lately, many cybercrooks have started targeting it locally, making it even more dangerous than before.</p>



<p>However, you can save your system from giving in to the ransomware attack by employing these simple, yet effective steps-</p>



<h2 class="wp-block-heading">Back up your valuable data</h2>



<p>This one is an overall security tip on which you can fall back if your computer system is attacked by ransomware. Have a regularly updated backup of your valuable data so that even if you do become a victim of ransomware, you don’t have to lose all your vital data. In such a case, you can easily restore your system and refurbish all your important documents from backup. Having a regular backup regimen is really important for you, preferably on an external hard disk or any backup service.</p>



<h2 class="wp-block-heading">Use a robust security suite</h2>



<p>It’s always good to have a strong backing of a robust Internet security software program to help you pick out the identity thefts, suspicious activities, and unsolicited dangers. These days many new variants of viruses, malware, and ransomware have hit the digital world, escaping even from the strong detection systems. Hence, it becomes really essential to have an added layer of protection to help detect the ransomware or mitigate its effects after the attack. Install CryptoPrevent as well as a commercial-grade anti-virus like ESET Nod 32.</p>



<h2 class="wp-block-heading">Patch/update your software</h2>



<p>The ransomware authors and programmers heavily rely on the people who are running outdated software. This outdated software is vulnerable itself and it makes the whole computer system susceptible to any malicious attack, which can exploit other programs on your computer to silently get into your system. So, keeping all your software updated can decrease the potential threat of ransomware. For this purpose, you can turn the update notification system of your software program, which will timely alert you about the security updates and patches.</p>



<p></p>



<h2 class="wp-block-heading">Disconnect from the Internet immediately</h2>



<p>Getting a ransomware note from an unknown source can prove to be a real threat to your computer system. In such a case, don’t panic; rather disconnect your system from the Internet so that your personal information isn’t transmitted to cybercriminals and hijackers. The best action could be to simply shut down your computer system and re-install the software and data backup after turning it on. This way, you can not only start afresh but your computer system will be saved from literal damage by a malicious program.</p>



<p>In the end, all you have to do is to stay alert and use a robust security suite to prevent ransomware attacks. Though, following these steps will help you avoid your computer system from becoming a victim of ransomware.</p>



<p>Article Credit Tech Genie @ http://blog.techgenie.com/security-how-to/five-steps-to-avoid-ransomware-attack.html</p>
<p>The post <a href="https://a1computerrepair.com/avoid-ransomware-attacks-using-these-5-steps/">Avoid Ransomware Attacks Using These 5 Steps</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bank Account Stealing Malware Returns</title>
		<link>https://a1computerrepair.com/bank-account-stealing-malware-returns/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 11 Jul 2014 22:33:33 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[ransom ware]]></category>
		<category><![CDATA[Scum Ware]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[windows security]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=870</guid>

					<description><![CDATA[<p>Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say. The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which officials said infected up to one million computers in 12 [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/bank-account-stealing-malware-returns/">Bank Account Stealing Malware Returns</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Malicious software used to steal millions from bank accounts has re-emerged a month after US authorities broke up a major hacker network using the scheme, security researchers say.</p>



<figure class="wp-block-image"><img decoding="async" src="/wp-content/uploads/2014/07/Bank-Account-Stealing-Malware-Returns.jpg" alt="Bank Account Stealing Malware Returns" title="Bank Account Stealing Malware Returns"/></figure>



<p>The security firm Malcovery said it identified a new trojan based on the Gameover Zeus malware, which officials said infected up to one million computers in 12 countries, and was blamed in the theft of more than $100 million.</p>



<p>&#8220;This discovery indicates that the criminals responsible for Gameover&#8217;s distribution do not intend to give up on this botnet even after suffering one of the most expansive botnet takeovers/takedowns in history,&#8221;.</p>



<p>By infecting large numbers of computers, the cybercriminals were able to control the devices to steal passwords and send out emails to further spread the infection.</p>



<p>The news came as the Department of Justice said it had made progress in rooting out the malware infections.</p>



<p>In a status report filed in court, officials said that &#8220;all or nearly all of the active computers infected with Gameover Zeus have been liberated from the criminals&#8217; control and are now communicating exclusively with the substitute server established pursuant to a court order.&#8221;</p>



<p>A blog post by the security firm <a href="http://www.emsisoft.com/en/" target="_blank" rel="noreferrer noopener nofollow">Emsisoft</a> said the new variant may be harder to combat because it is using &#8220;an evasive technique that allows the botnet to hide its distributive phishing sites behind a constantly shuffling list of infected, proxy computers.&#8221;</p>



<p>Gameover Zeus, which first appeared in September 2011, stole bank information and other confidential details from victims.</p>



<p>The FBI blamed the Gameover Zeus botnet for the theft of more than $100 million, obtained by using the stolen bank data and then &#8220;emptying the victims&#8217; bank accounts and diverting the money to themselves.&#8221;</p>



<p>The June crackdown also targeted another computer virus, dubbed &#8220;Cryptolocker,&#8221; which appeared in September 2013.</p>



<p>Russian Evgeniy Mikhailovich Bogachev, 30, an alleged administrator of the network, was charged in Pittsburgh, Pennsylvania, with 14 counts including conspiracy, computer hacking, bank fraud, and money laundering in the <a href="http://www.us-cert.gov/ncas/alerts/TA14-150A" target="_blank" rel="noreferrer noopener nofollow">Gameover Zeus</a> and <a href="/free-cryptolocker-malware-protection/" target="_blank" rel="noreferrer noopener">Cryptoblocker</a> schemes.</p>



<p>Originally from: http://news.yahoo.com/bank-stealing-malware-returns-us-crackdown-193233883.html</p>
<p>The post <a href="https://a1computerrepair.com/bank-account-stealing-malware-returns/">Bank Account Stealing Malware Returns</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keyloggers &#8211; Keystroke Logging Software Threats</title>
		<link>https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 24 Nov 2013 21:46:28 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[key logger]]></category>
		<category><![CDATA[key loggers]]></category>
		<category><![CDATA[keylogger]]></category>
		<category><![CDATA[keylogger removal]]></category>
		<category><![CDATA[keyloggers]]></category>
		<category><![CDATA[keystroke logging]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[spyware prevention]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=746</guid>

					<description><![CDATA[<p>A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/">Keyloggers &#8211; Keystroke Logging Software Threats</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware.png" alt="Keyloggers---Keystroke-Logging-Software-and-Hardware" title="Keyloggers---Keystroke-Logging-Software-and-Hardware"/></figure>



<p>For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information.</p>



<p>Keyloggers can be either software or hardware-based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware-3.jpg" alt="Keyloggers - Keystroke Logging Software and Hardware 3" title="Keyloggers - Keystroke Logging Software and Hardware 3"/></figure>



<p>As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user’s privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potentially obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal users’ personal documents, money, or even their identity.</p>



<figure class="wp-block-image"><img decoding="async" src="http://a1computerrepair.com/wp-content/uploads/2013/11/Keyloggers-Keystroke-Logging-Software-and-Hardware-2_thumb.gif" alt="Keyloggers - Keystroke Logging Software and Hardware 2" title="Keyloggers - Keystroke Logging Software and Hardware 2"/></figure>



<p>A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot-up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including:</p>



<p>· Undetectable in the process list and invisible in operation</p>



<p>· A kernel keylogger driver that captures keystrokes even when the user is logged off</p>



<p>· A remote deployment wizard</p>



<p>· The ability to create text snapshots of active applications</p>



<p>· The ability to capture http post data (including log-ins/passwords)</p>



<p>· The ability to timestamp record workstation usage</p>



<p>· HTML and text log file export</p>



<p>· Automatic e-mail log file delivery</p>



<p>All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor websites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its keylogging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo’s password and gain access to the needed file.</p>



<p><a href="http://a1computerrepair.com/computer-repair-services/">A1 Computer Repair</a> – Malicious Software Removal Experts</p>
<p>The post <a href="https://a1computerrepair.com/keyloggers-keystroke-logging-software-and-hardware-threats/">Keyloggers &#8211; Keystroke Logging Software Threats</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Personal Computer Security, The Threats and Solutions</title>
		<link>https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Nov 2013 09:08:00 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[anti malware]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spyware prevention]]></category>
		<category><![CDATA[Virus Removal]]></category>
		<guid isPermaLink="false">http://a1computerrepair.com/?p=695</guid>

					<description><![CDATA[<p>When it comes to computer security, many of us live in a bubble of blissful ignorance. We might be vigilant and never open email attachments from people we don&#8217;t know, we might take care to make sure an eCommerce site is secure before entering our credit card information, or we might even go so far [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/">Personal Computer Security, The Threats and Solutions</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><img loading="lazy" decoding="async" style="background-image: none; margin: 0px 6px 6px 0px; padding-left: 0px; padding-right: 0px; display: inline; float: left; padding-top: 0px; border: 0px;" title="personalcomputersecurity" src="http://a1computerrepair.com/wp-content/uploads/2013/11/personalcomputersecurity.jpg" alt="personalcomputersecurity" width="300" height="229" align="left" border="0">When it comes to computer security, many of us live in a bubble of blissful ignorance. We might be vigilant and never open email attachments from people we don&#8217;t know, we might take care to make sure an eCommerce site is secure before entering our credit card information, or we might even go so far as to install a standard firewall on our computers. Unfortunately, much of the common sense advice we follow when it comes to Internet security does little to combat the cybercrime that is rampant.</p>



<p>Federal Trade Commission</p>



<p>Even the U.S. Federal Trade Commission, a governmental agency that is designed to help consumers, had to issue a press release stating that &#8220;consumers, including corporate and banking executives, appear to be targets of a bogus e-mail supposedly sent by the Federal Trade Commission but actually sent by third parties hoping to install spyware on computers.&#8221;</p>



<p>There&#8217;s little doubt that spyware, malware, and insidious virus attacks make any computer with Internet access vulnerable. But, because not all Internet security breaches are immediately apparent, people are often unaware that their seemingly hassle-free computing is anything but. The Federal Trade Commission offers seven guidelines to help consumers surf the Web safely:</p>



<p><strong>1. Protect your personal information.</strong> For example, when shopping on an eCommerce site, make sure that the page where you enter your personal information is secure, as designated by &#8220;https&#8221; before the URL. It&#8217;s important to stop identity theft before it starts.</p>



<p><strong>2. Know before you click.</strong> For instance, many cyber-criminals impersonate legitimate businesses or send &#8220;phishing&#8221; email that asks you to click a hyperlink. Check out the online merchants and never click on emailed hyperlinks unless you&#8217;re certain of the source.</p>



<p><strong>3. Update anti-virus, anti-spyware, and firewall software often.</strong> Hackers and others who engage in cybercrime seem to always be a step ahead of the good guys. If your computer protection is outdated, you&#8217;re vulnerable.</p>



<p><strong>4. Use a </strong>Web browser and operating system security features. Make sure your browser settings give you optimal privacy and security and ensure that you update your operating system regularly to take advantage of security patches.</p>



<p><strong>5. Safeguard your passwords.</strong> For example, create a unique password for each site you visit, and keep them in a secure place. Use letter, number and symbol combinations that can outsmart automated password detection programs.</p>



<p><strong>6. Always do backups</strong>. If your computer does get a virus or a worm, your files may be goners. Make sure to regularly back up any important files and store them in a secure place.</p>



<p><strong>7. Prepare for emergencies.</strong> If something does go wrong, such as your computer being hacked or infected, or if you accidentally divulge personal information, know what courses of action you should take to remedy the situation and prevent further problems.</p>



<h2 class="wp-block-heading">A1 Computer Repair Services Can Help</h2>



<p>Protecting your computer from all of the threats in cyberspace can seem like a full-time job. Our <a href="http://a1computerrepair.com/computer-repair-services/">computer repair service</a> provides full system optimization, problem diagnosis and repair, installation assistance, and a full complement of security services for your home or business like backup and cloud computing. You pay a small monthly subscription fee and in turn can surf the Web knowing that your computer is locked down and that you&#8217;ll never again have to stay abreast of the latest security software or lug your computer down to a high-priced repair center. <a href="http://a1computerrepair.com/contactus/">Contact us</a> for more information on securing your personal or business computer today.</p>
<p>The post <a href="https://a1computerrepair.com/personal-computer-security-the-threats-and-solutions/">Personal Computer Security, The Threats and Solutions</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
