Ransomware

New cybersecurity threat using Remote Desktop Protocol
RDP

We have seen a recent uptick in computer networks being hacked through a common internet protocol called Remote Desktop Protocol or RDP.  This service provides a user with a graphical interface to connect to another computer over a network connection. It is most commonly used to allow remote access to servers. These hacks have been accomplished through brute force, which is a hacking method where the attacker uses common dictionary words or simple variations of dictionary words to break into systems.

Dangerous new ransomware released Friday

You might have seen that a dangerous new ransomware has been reported on over the weekend and I want to make sure you have all the information you need to make informed decisions about it. It has been reported that hackers are leveraging the recently leaked NSA hacking toolkit to infect and cripple systems all around the world.

2016 Tech Review

2016 has been a real banner year for technology. We’ve seen the mainstream finally come to terms with the need to take cyber security seriously with the hacks of Internet of Things devices, email hacking scandals and the rise of ransomware. We’ve learned that not everything you read on the Internet is true with the controversies surrounding “fake news” online. We’ve seen the proclamation that we’ve entered the post-PC era… again. Not to mention the fact that we might be in the post-headphone era.

Advantage Technology Speaks at FBI Infraguard Conference

On November third, I was invited by the FBI’s Infragrad Coordinator, Michelle Pirtle, to present information concerning data security and cybercrime. Michelle is a special agent that travels the country to inform business about the proper measures to take when faced with a cybercrime attack. This meeting featured guest speakers from the Infragrad Partnership for Protection and others that were from surrounding businesses in the IT field.

Mobile devices now at risk for ransomware and crypto viruses

Back in August, Joe Justice discussed ransomware and crypto viruses on our podcast and explained the threat they present to your computer systems. Today, I am going to write about the most recent types of mobile ransomware, what is going on, and what you can expect.

Ransomware and Crypto Viruses. Understanding the threat and how to protect yourself

On Tuesday, August 9, I was invited to appear on 580 WCHS’s Ask the Expert show to talk to their audience about ransomware and crypto viruses. I took the opportunity to inform the audience about the threat and to paint a realistic scenario of the real and present danger these viruses represent.

Put an end to the malware security compromise!

On April 20th, we held our April Advantage Lunch at Edgewood Country Club. (If you’re not familiar with the Advantage Lunch, learn about it at advantagelunch.com) In addition to the pictures below, be sure to check out the Facebook photo album!

A New Ransomware Encrypts Your Entire Hard Drive

UPDATE 4-11-2016: Petya has been cracked, but recovery is technical. If you have been infected give us a call and we'll help you recover your system.

Computer Kidnapping: Ransomware and Crypto-Viruses

As technology continues to grow and make our lives easier, ruthless hackers are evolving their methods to make our lives miserable, and to relieve our pockets of our hard earned cash.

Two new methods of computer terrorism have become very popular; ransomware and crypto-viruses. While they are similar, there are some differences you need to know.

Beware that Word document attachment - It’s A Trap!

We’ve recently gotten reports of a spate of malware infections due to opening Word documents that claim to be reports, invoices, financial records or some other standard business correspondence. Believe it or not, what appears to be standard Microsoft Word documents can contain vicious malware.