Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move. Malware on mobile More than two-thirds of the world’s […]
Amidst the current climate of malware, hacks, and phishing scams, the internet really isn’t safe for any company that doesn’t take precautions. Without safeguards, browsers that you or your employees use are vulnerable to cyber attacks that may cripple productivity and profit. There are wise steps that every company should take to browse the net […]
Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks. Here […]
Although the occasional three-minute YouTube video never hurts anyone, wasting hours of your working day on these websites reduces productivity. When it comes to increasing employee productivity, keeping a close eye on their internet behavior reaps various benefits. Time-saving measures Internet monitoring software saves employees from visiting entertainment, gaming, or online shopping sites by restricting […]
In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter recap A team of security […]
You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable to hacking. In fact, researchers have discovered a terrifying strain of IoT malware that can infect your devices. What is the Hide And Seek malware? The Hide and Seek (HNS) […]
Got a call today off our previous article in this series from Branden of Hot Media Group, Inc., aChicago-based web application development, networking, and graphic design firm who found himself with a database full of malware infections, but the characteristics of his attack didn't match what we had written about, so he called us up.
I've gotten two calls from clients (OK, one was a client, the other my mother-in-law) saying they visited the NYTimes website and were attacked by malware.
This is true, they were. My MIL said she was trying to read Maureen Dowd and got hit with a rogue anti-spyware application.
One of our clients picked up some sort of infection over the weekend. The sucker was persistent, and after running the usual battery of utilities -- RootkitRevealer, SDFix, ComboFix, Stinger running inside a WinXP PE shell -- we got rid of the thing.
When I checked the post-infection System Event Viewer log, however, I got an interesting message:
The At46.job command failed to start due to the following error:
The system cannot find the file specified.
NEW AND IMPROVED UPDATE: Cleaning Up After a SQL Injection Attack, Part 2
[UPDATE: Added code to deal with replacing text in the ntext fields of SQL Server 2000.]
One of our clients got hit with a web attack a week or so ago. We're still not quite sure how this particular attack was carried out -- we're thinking an unpatched web server at the hosting facility -- but it did cause me to look at the log file of the web site to see who might have been able to overwrite index.