Black Rock threat can attack Microsoft Outlook, Gmail, Uber, Amazon, Netflix and Google Pay.
Smartphones are just as vulnerable as computers are to malware. Apple iPhones are vulnerable but have more protection because of built in protection.
CCleaner, a popular application used to clean trash and duplicate files from computers was recently hacked, but only its 32 bit version of the application was affected and its enterprise use for the 64 bit version. The application acted a vehicle for malware, which it would secretly put on a user’s computer. Most home computer users use the 64 bit version and so this hack would not affect them. If you think you have the 32 bit version check to see if you have the version number: 5.33.6162.
Cyber threats have increased dramatically during 2016. According to the FBI, there’s an average of 4,000 ransomware attacks per day. Wow! A lot of people must be losing a lot of money. 13 billion a year is spent by the private sector to protect against cyber threats and more is spent every year.
CyberCrime has different forms. Locking your computer is the most difficult to handle because it involves encryption. The FBI, Moneypak virus is an example of this in action.
It never ceases to amaze me how malware can get into your computer. The other day I was downloading Google Chrome for a customer from a malicious website. I was in a hurry and did not check the website URL. Before I knew it, I had downloaded 75 malware programs and viruses in a few seconds. I then spent the next 15 minutes removing them. It seems that hackers are using malware to take over the cyber world. 8 million new variants per month are infecting computers. That’s right, malware does mutate to catch your computer and anti-virus protection off guard.
Dangerous Malware and Malware Scams, how to spot them and keep them from infecting your computer. Prevention and using a layered security approach is best.
My big repair today was the removal of a rootkit virus that damaged my customer’s computer. The rootkit apparently changed permissions on his folders and apps. This rootkit virus also stole my customer’s data.
In my second installment of viruses, I will describe different types of viruses. Identifying the type of virus is an important first step in the removal of the virus. Knowing what kind of virus infection you have may point to different removal steps. Also, if the virus is the type that steals password information, then changing your passwords may be an important step to protect your banking and financial data. Removal of viruses will be addressed in future blog posts.