• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
A1 Computer Repair

A1 Computer Repair

Computer Services

  • Computer Repair
    • Local Computer Repair
    • Laptop Repair
    • Slow Computer Repair
    • Online Computer Repair
    • Custom Computer Builders
    • Get a Repair Quote
    • Schedule a Computer or Laptop Repair
  • Our Services
    • Cell Phone Repair
    • Backup and Restore Services
    • Managed Services
    • Computer Repair Services
    • Malware Removal
    • Full System Tune-Up
    • Data Recovery Services
    • Cryptolocker Prevention
  • Support
    • Online Malware Removal
    • Create a Support Ticket
    • Remote Support Request
    • Schedule a Computer or Laptop Repair
    • Online Repair Quote
  • Pay Invoice
  • Contact Us
    • Contact A1 Now
    • Schedule a Computer or Laptop Repair
    • Customer Support
    • Remote Support Request
    • Get a Quote
  • Call (530) 903-8838
  • About Us

security

Millions Exposed To Ads That Use Infected Images

December 7, 2016 by admin

Antivirus provider ESET released a report on Tuesday stating that its researchers have discovered malicious code residing within advertisements that are currently in rotation on many “reputable” news websites. Since the beginning of October, these malicious ads have been exposed to millions of web surfers who still use Microsoft’s Internet Explorer browser.

Millions Exposed To Ads That Use Images Infected By Malicious Scripts

According to the report, the ads promote applications called “Browser Defense” and “Broxu.” What’s scary is that the actual graphic used in these ads contain malicious code buried within the parameters of their alpha channel, which is used to define the transparency of each pixel in images. By way of explanation, an alpha channel is what makes the background color of an image transparent so that the focused object can reside as an overlay against any backdrop image or color.

Adding the malicious script to an image’s alpha channel is only a minor modification. The resulting image has a slightly different tone than the original, but if web surfers have no idea what the originating image looks like, then they have no clue the altered, malicious version is on their screen. The sample provided by the ESET researchers is barely indistinguishable from the “clean” original.

Once the advertisement is displayed on the visitor’s screen, the embedded code uses the CVE-2016-0162 vulnerability in Internet Explorer to scan the target PC to see if it’s running on a malware analyst’s machine. If the coast is clear, it will then load a landing page that includes a Flash file built for exploiting three vulnerabilities in Flash Player: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.

“Upon successful exploitation, the executed shell code collects information on installed security products and performs — [in a manner] as paranoid as the cybercriminals behind this attack — yet another check to verify that it is not being monitored,” the antivirus firm reports. “If results are favorable, it will attempt to download the encrypted payload from the same server again, disguised as a GIF image.”

When the encrypted payload is downloaded to the target PC, it is then decrypted and launched through regsvr32.exe or rundll32.exe in Microsoft Windows. The payloads detected thus far have included various trojan downloaders, banking trojans, backdoors, spyware, and “file stealers.”

The attack is based on the Stegano exploit kit, which uses steganography to hide malware out in plain sight. The term is typically used when hiding messages or information within public text and data. However, in this case, the method throws a malicious script within the alpha channel information of an image. The kit was first used in 2014 to target Dutch customers, and moved on to residents in the Czech Republic. New attacks are targeting web surfers in Australia, Britain, Canada, Italy, and Spain.

ESET senior malware researcher Robert Lipovsky pointed out in an interview that web surfers aren’t required to do anything to trigger the malicious script: all they have to do is visit a website displaying the infected ad. The payloads aren’t random either: attackers choose what to download to the target PCs.

Lipovsky added that the firm didn’t release a list of websites affected by the malicious ads because the information didn’t add any value to the warning. Even more, the firm didn’t want to inflict reputational harm to the websites given that they had no clue or control over displaying the ads. Naturally, web surfers can stay safe by keeping their browser, Flash Player, and security software updated regularly.

http://www.digitaltrends.com/computing/eset-malware-images-alpha-channel-browser-defense-broxu-stegano/

Filed Under: Tech Support Blog Tagged With: eset, malvertising, malware ads, malware protection, security, Trojan, virus protection

414,949 D-Link cameras, IoT devices can be hijacked

July 8, 2016 by admin

Shodan has turned up half a million D-Link devices exposed to the internet, and subject to easy hijacking using zero-day vulnerabilities.

414,949 D-Link cameras, IoT devices can be hijacked over the net

The stack overflow vulnerabilities affect more than 120 D-Link products, from Wi-Fi cameras to routers and modems, and allow remote attackers to completely hijack the administer account of the devices to install backdoors and intercept traffic.

D-Link has been contacted for comment.

It takes only one command to exploit the flaw, according to Senrio researchers who published a proof-of-concept that changed administrator passwords.

“… the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera,” the researchers say.

“While the thought of strangers watching your sleeping baby is disturbing, the implications for enterprise and infrastructure environments are downright scary.”

Almost 140,000 of the devices are located in the US, with 23,442 in Canada, and 20,982 in Sweden.

Founder Stephen Ridley told Security Week attacking the 120-odd D-Link device models requires to exploit tweaking to suit different firmware.

“An attacker would practically account for this difference in versions [and] devices by fingerprinting a device, and then changing the exploit payload based on the target,” Ridley says.

http://www.theregister.co.uk/2016/07/08/414949_dlink_cameras_iot_devices_can_be_hijacked_over_the_net/

Filed Under: Tech Support Blog Tagged With: d-link, dlink, exploits, hackers, hijacker, malware, security

Uninstall QuickTime for Windows Today

May 7, 2016 by admin

RemoveQuickTimeTrendMicro is putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.

This is for two reasons.

First, Apple is deprecating QuickTime for Microsoft Windows. They will no longer be issuing security updates for the product on the Windows Platform and recommend users uninstall it. Note that this does not apply to QuickTime on Mac OSX.

Second, our Zero Day Initiative has just released two advisories ZDI-16-241 and ZDI-16-242 detailing two new, critical vulnerabilities affecting QuickTime for Windows. These advisories are being released in accordance with the Zero Day Initiative’s Disclosure Policy for when a vendor does not issue a security patch for a disclosed vulnerability. And because Apple is no longer providing security updates for QuickTime on Windows, these vulnerabilities are never going to be patched.

We’re not aware of any active attacks against these vulnerabilities currently. But the only way to protect your Windows systems from potential attacks against these or other vulnerabilities in Apple QuickTime now is to uninstall it. In this regard, QuickTime for Windows now joins Microsoft Windows XP and Oracle Java 6 as software that is no longer being updated to fix vulnerabilities and is subject to ever-increasing risk as more and more unpatched vulnerabilities are found affecting it.

You can find information on how to uninstall Apple QuickTime for Windows from the Apple website here:https://support.apple.com/HT205771

Continue for Full Article

Filed Under: Tech Support Blog Tagged With: malware, quicktime, security, windows security

How To Protect Your Files From Malware

April 11, 2015 by admin

Protect Your Files From Malware and Viruses

Backing up your files is the best way to protect your files and data. Once you have a great backup system installed, you’ve already taken the most important step in protecting your computer – but there are threats beyond data loss that you can prepare for.

How To Protect Your Files From Malware

Malware (short for malicious software) is software that is developed to disrupt or damage a computer system. It can appear in a number of ways and can be used to gather private information, delete data or even lock people out of their own files. According to Kaspersky Labs, there are more than 200,000 new malware threats per day!

One such malware, Cryptolocker, has been making the internet rounds over the past several weeks. The software is called “ransomware”, as it encrypts the files on infected computers so users can’t access them. When someone tries to open a file on a computer infected with this malware, they are alerted that they must pay $300 for their files to be unencrypted so they can access them. Deleting the malware or refusing to pay the ransom will leave their files encrypted.

As a trusted partner in data protection, Carbonite Backup wants to ensure that our customers are aware of these threats and know how to prevent them from infecting their computers and servers. Here are some tips that can help you avoid malware and other types of viruses to protect your files:

  • Be an email skeptic: Malware is often spread through email links or attachments. Don’t open attachments or click on links from people or companies you’re not familiar with.
  • Free software – too good to be true?: Downloading free software is tempting, but it may include spyware and other malicious content. Only download software from trusted vendors.
  • Down with the pop-ups: Block pop-up windows and don’t click on links or buttons within them.
  • Bump up your browser security: Go into your web browser settings and make sure your security settings are set to medium or higher.
  • Beware of illegal downloads: While it’s tempting to watch a movie that’s still in theatres on your computer, many files shared on illegal file-sharing sites have pieces of malware attached to them.

These are just a few tips that can help you avoid the headaches to protect your files and other negative effects of malware. Need more information on backup software? Contact Us or Open a Support Ticket, we are here to help.

Reprinted from an article

Filed Under: Tech Support Blog Tagged With: anti cryptolocker, anti malware, apple security, back up, backup, computer help, Computer Tips, Cryptolocker Prevent, e-mail fraud, internet security, malware protection, ransomware removal, remove hijacker, remove malware, security, windows security

Panda antivirus problems

March 18, 2015 by admin

Panda antivirus software labels itself as malware

Affected users were warned not to reboot their machines

An antivirus program labeled itself as malware, causing some computers it was running on to stop working.

Panda antivirus software labels itself as malware

After an update, essential components in two Panda Security antivirus programs became corrupted, leading them to be mistakenly identified as malign and quarantined.

Panda said a fix had been released and warned that rebooting affected systems could exacerbate the issue.

Steps to Fix You Computer: http://www.pandasecurity.com/uk/homeusers/support/card?id=100045

It asked those affected to get in touch so it could help fix their machines.

One security expert noted the irony. “People’s first response is to turn [their computer] off and back on again, but in this case, it seems like the wrong thing to do,” said Prof Alan Woodward, of Surrey University.

The “last thing” people would expect to cause their computers to break down was its security software, he said.

Corrupted files

Panda Security said that the signature file in both its PCOP and its Retail 2015 packages became corrupted.

Read the Full Story at: http://www.bbc.com/news/technology-31851125

Filed Under: Tech Support Blog Tagged With: anti malware, Computer Tips, computer virus removal, internet security, malware, security, Virus Removal, windows tips

End Of Free Windows 7 Support Coming Soon

July 9, 2014 by admin

Microsoft is warning customers that the end is soon coming for free Windows 7 support. Microsoft will end free mainstream support for Windows 7 on January 13, 2015.

End Of Free Windows 7 Support Coming Soon

This covers all versions of Windows 7, Mary Jo Foley points out.

The end of support generally means no more updated features or performance improvements, unless you are covered by extra “extended support.”

UPDATED: Microsoft has promised to provide security patches even after it ends mainstream support, through 2020. What is ending is design changes, warranty claims, and no-charge incident support.

This move will mostly affect consumers. Businesses that pay for extended support for Windows 7, as most of them do, will get all updates for another five years, until January 14, 2020.

That’s important because many businesses are right now in the process of upgrading their old Windows XP PCs, but they’re moving to Windows 7, not Windows 8.

There’s some speculation that, given the popularity of Windows 7, Microsoft might change its mind as the date nears and continue to support it a bit longer as it did for Windows XP. All told, Microsoft supported XP for about 13 years.

That kind of extension doesn’t seem likely at this point. Remember, Windows 8 basically includes a full version of Windows 7, called Desktop mode. With Windows 8.1, it’s possible to run a Windows 8 machine in Desktop mode and almost avoid the new-and-confusing Windows 8 part of the OS.

And Microsoft really needs to nudge consumers into buying Windows 8 machines. More Windows 8 machines mean more developers will want to write software for Windows 8, which will make more people want to buy it.

By the way, Microsoft also set the end-of-life of mainstream support for Windows 8 (including the latest version, Windows 8.1), for January 9, 2018.

This is another hint that Microsoft should have its next version of Windows ready in 2015, code-named “Threshold” (sometimes referred to as Windows 9).

If Microsoft plays its cards right, Windows 9 will be to the unloved Windows 8 what Windows 7 was to Vista, which InfoWorld ranked No. 2 on its list of the 25 biggest tech flops (also PCWorld’s “Biggest Tech Disappointment” of 2007.)

Here’s the chart from Microsoft’s Lifecycle Support page.

Filed Under: Tech Support Blog Tagged With: internet security, microsoft, microsoft support, security, windows, windows 7, windows security, windows tips, windows upgrade

  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Call Today: (530) 903-8838

(530) 903-8838

Find A1 on Social Media

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

a1 computer repair google reviews

yelp reviews

Copyright © 2025 A1 Computer Repair · Serving the Placerville area since 2014 - Website Design and Website Hosting by WebOvative

  • Get Quote
  • Customer Support
  • Computer Repair
  • Laptop Repair
  • Computer Services
  • Cell Phone Repair
  • Blog
  • Privacy Policy
  • Terms and Conditions