Author Archives: activetech

Loading
loading...

Video – A new player – AI

The video explains why AI is the new tool for hackers to improve their attacks.

This video was created using AI – so much for all of the training looking for bad English.

What is an APT and why should I worry about it.

What is an APT and why should I worry about it.

APT stands for Advanced Persistent Threat. An APT is a sophisticated and targeted cyber attack that is typically carried out by a group of highly skilled hackers or a nation-state actor with significant resources. The goal of an APT attack is to gain unauthorized access to a specific target, typically a government agency or large corporation, in order to steal sensitive information or disrupt critical operations.

APTs are considered a serious threat because they are often difficult to detect and can go undetected for months or even years. APT attackers typically use a variety of techniques, including social engineering, spear-phishing, and zero-day exploits, to gain access to their target’s systems. Once they have gained access, they use a variety of tactics to maintain persistence and evade detection, such as using encrypted communication channels and avoiding detection by anti-virus software.

There are several reasons why you should worry about APTs. Firstly, APTs are often designed to steal sensitive information such as trade secrets, financial data, and intellectual property. This can have significant financial and reputational consequences for the victim. Secondly, APTs can be used to disrupt critical operations, such as those in the energy, healthcare, or transportation sectors. Finally, APTs can be used to carry out cyber espionage or cyber warfare against government agencies, which can have significant geopolitical implications.

To protect against APTs, organizations should implement a variety of security measures, including network segmentation, two-factor authentication, intrusion detection and prevention systems, and security awareness training for employees. It’s important to remain vigilant and to monitor for any suspicious activity on the network, as APTs can be difficult to detect. In addition, organizations should conduct regular security assessments and penetration testing to identify and remediate any vulnerabilities in their systems.

In summary, APTs are a serious and persistent threat to organizations of all sizes, and they should be taken seriously. By implementing strong security measures and remaining vigilant, organizations can protect themselves against this type of cyber attack.

Best Practices Opening Attachments in Emails

Best Practices opening attachments in Emails

Opening attachments in emails can be a common source of cybersecurity threats, such as malware infections or phishing attacks. In order to protect yourself from these threats, it is important to follow some best practices when opening attachments in emails. Here are some tips:

  1. Verify the sender: Before opening any attachment, make sure that you know the sender and that the email is legitimate. Check the sender’s email address and confirm that it is from a reputable source. Be wary of emails from unknown senders or those that contain suspicious-looking addresses.
  2. Scan the attachment for viruses: Use antivirus software to scan the attachment for any viruses or malware. This is an important step in protecting your computer from potential harm.
  3. Be cautious of unexpected attachments: If you receive an email with an unexpected attachment, do not open it. Instead, contact the sender and ask them to confirm the attachment’s contents and purpose.
  4. Use a separate email account for subscriptions: If you frequently sign up for newsletters or other online services, consider using a separate email account. This can help keep your primary email account free from potential threats.
  5. Be wary of links in attachments: Links in attachments can lead to malicious websites or downloads. Before clicking on any links, hover over them to see the actual URL and verify that it is legitimate. If in doubt, do not click the link.
  6. Keep software up-to-date: Make sure that your computer and any software you use are up-to-date with the latest security patches. This can help protect against known vulnerabilities that could be exploited through email attachments.

By following these best practices, you can help protect yourself from potential threats when opening email attachments. It’s important to stay vigilant and to always err on the side of caution if you receive an email that seems suspicious.

Smishing and Using Compromised Devices on Company Networks

Smishing and Using Compromised Devices on Company Networks

In today’s digital age, it’s becoming increasingly important for companies to be vigilant about the security of their networks. While many companies focus on protecting against external threats such as hackers and malware, it’s important not to overlook the risks posed by internal threats, such as employees using compromised devices and falling victim to smishing attacks.

Smishing, which is a type of phishing attack that is conducted via text message, is becoming more common as people increasingly rely on their mobile devices for communication. Smishing attacks typically involve the attacker posing as a legitimate entity, such as a bank or a service provider, and sending a text message with a link or phone number that the victim is encouraged to click on or call. Once the victim clicks on the link or calls the number, they are redirected to a fake website or automated phone system that is designed to steal their personal information.

Compromised devices, on the other hand, refer to devices such as laptops, smartphones, and tablets that have been hacked or infected with malware. These devices can be used by attackers to gain unauthorized access to a company’s network, steal sensitive data, or launch attacks on other devices on the network.

Both smishing and compromised devices pose significant risks to companies, as they can be used by attackers to gain access to sensitive data and cause significant damage to the company’s reputation and finances.

To mitigate the risks posed by smishing and compromised devices, companies should implement the following best practices:

  1. Educate employees on the risks of smishing and the importance of not clicking on links or calling phone numbers in unsolicited text messages.
  2. Implement a device management policy that requires all devices used on the company’s network to be updated with the latest security patches and protected with anti-malware software.
  3. Use network segmentation to limit the damage that can be caused by a compromised device.
  4. Implement two-factor authentication on all devices and applications to reduce the risk of unauthorized access.
  5. Regularly conduct security audits and penetration testing to identify vulnerabilities in the company’s network.

By implementing these best practices, companies can help protect themselves against the risks posed by smishing and compromised devices. However, it’s important to recognize that no security measure is foolproof, and companies should remain vigilant and proactive in their efforts to protect their networks from internal and external threats.

First for LaSRS and Medisoft

Released a new version today that will include better communications for the first clients.

What I am up to

I decided that it would be a good idea to start a blog that can be used to see what I have going on

08/13
Issue with office on RDP upgrade to office 365 and test for multiple sign ons.

08/13
Working on word press for g&r Manufactured solutions., Find Content. add video header.

UNWELCOME

Something for people to start thinking about..

 

You and 10 other people have managed to get wireless access on your network.

everyone walks in the door for your android device to connect to wireless what happens next

is something no one really thinks about..  AUTO SYNC. suddenly the network is a buzz with

activity from mobile phones.

That doesn’t sound like a problem except all downloadupstream speeds are a fraction of download speeds except when the upload stream is maxed the download stream stops too.

 

If you must allow employees with mobile devices on your network,  ask them to turn off syncing while on your network.

 

 

I’ve seen a onecloud account virtually stop network activity except uploading thousands of images to the cloud at full speed.

RANSOM

Over the past few days I have been recovering from ransom ware at a clients.

The ransom ware managed to encrypt the host computer and the server shares both of them and

some misc shares throughout the network,  I don’t condone many network shares so the problem wan’t

completely devastated.  The Inventory system is written in VFP  (My best language)  about 30 tables were corrupted before I

killed the share on the server.  Then I found the PeachTree server share had been corrupted also :<

2 register shares were corrupted 1 we lost the data all together.

as far as the servers are concerned  ——- 100% RECOVERED  thanks to persistent backups (multiple per day)

 

So,  I have created a program that does nothing but monitor the inventory files, if any file becomes ‘NOT A TABLE’

the share will be shut down and data preserved except the table that triggered the problem.

 

today is 03/04/16 ,

 

RANSOM – NOT PAID !!!

 

Hard Drive Recovery

IMG_20160217_164535749I have recently created a laminar hood that I can open and service hard drives.  I have opened and successfully changed the heads on hard drives and have one waiting for a platter swap to a donor  hard drive with a good motor.  The heads have had extended contact with the platter due to a motor malfunction the results are a large swath of platters (all 4) with magnetic material scorn off. The bright line close to the hub and outer band about 1/4 inch on the outer rim (are BAD)

 

I removed the heads and replaced with donor heads I doubted would work after seeing the damage.

 

 

 

 

Wed Feb 17 17-35-38looking at the heads through a microscope showed that every platter has been damaged

My next rout is to change the platters to another good working motor.

Welcome

Today I am making this site..

Layout mode
Predefined Skins
Custom Colors
Choose your skin color
Patterns Background
Images Background
Supportscreen tag