Chinese Hackers Exploit IE Vulnerability in a Concerted Attack – Make Sure your Browser is Protected

Chinese Hackers Exploit IE Vulnerability in a Concerted Attack – Make Sure your Browser is Protected

Early January, Google released a report detailing attacks on its infrastructure which it claimed to have originated from China. In the wake of its announcement, another report came out detailing what is purported to be an “organized espionage operation” originating from China. Known as “Operation Aurora”, the attack attempted to siphon information from 33 companies in the US, including Google. The attackers are believed to have exploited a vulnerability in Internet Explorer (IE). The vulnerability affect IE 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and IE 6, IE 7, and IE 8 on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. In the wake of the attacks Microsoft released a patch to address the vulnerability. If you are unsure if this patch has been applied to your systems, contact us for help. Related links: More Security Flaws Found in Internet Explorer (Mashable)

RealPlayer Users Beware

RealPlayer Users Beware

RealNetworks , developers of RealPlayer, a popular real-time streaming media player, recently released an advisory about vulnerabilities that when exploited could trigger remote code execution attacks. The firm reports at least 11 critical vulnerabilities that expose Windows, Mac, and Linux users to malicious hacker attacks. RealPlayer is a favorite target for malware and fraudware writers, and users are advised to download the latest software update. If you don’t use RealPlayer, you’re best advised to uninstall it immediately. Need help in making sure your applications are safe to use? Contact us today. Related links: Bogus IQ test with destructive payload in the wild (zdnet) Tor project suffers hack attack (zdnet) RealPlayer Exploit Infecting Windows Machines (eweek)

Phishing Alert for QuickBooks Customers

IMPORTANT UPDATE FOR QuickBooks Customers: Intuit is receiving reports of individuals receiving fraudulent emails from QuickBooks or QuickBooks Online. The two separate emails ask customers to either download a plug in to assess their security or download a Digital Certificate. Customers should delete either of these emails. As we discover these fraudulent sites (cyber criminals often use the same email repeatedly, although they change web sites), we take them down. More at the Intuit website

Piracy Brings Malware According to Microsoft

Piracy Brings Malware According to Microsoft

malwareQuoting research from various industry analysts, Microsoft warned that users who install unlicensed or counterfeit software on their PCs are 73% more likely to suffer data loss or damage than users of legitimate software. The company also cited a 2006 IDC study that found that 25% of counterfeit software attempted to install unwanted or malicious code when downloaded.

Learn more…

Web Application Security a Growing Threat for Businesses

Web Application Security a Growing Threat for Businesses

security A new report by security vendor Cenzic shares research indicating that security flaws found in Web applications continue to grow and should be a major concern for many businesses, including SMEs, as more and more depend on the Web for their business. According to the report, almost 80 percent of more than 3,000 software security flaws publicly reported this year have been in web technologies such as web servers, applications, plug-ins, and web browsers.

Learn more…

Occasional Update

brettHello friends, this is Brett Passmore.

For some, it has been a long time since we talked, and I apologize for that. I truly hope you are doing well. I will do my best to be in touch on a more consistent basis.

Our family had quite the holiday break. If you ever want to get to know your family and yourself, take
an RV trip. We just travelled to Ohio ……

Read more…

Reach out with MS Publisher greeting cards

Reach out with MS Publisher greeting cards

When you want to thank loyal customers and reconnect with friends, greeting cards offer a great way to reinforce the personal link between you and them. Using Microsoft Office Publisher 2007, you can quickly produce exactly the greeting card that you want. Learn how…

Cloud Computing 101

Cloud Computing 101

cloud computingWith more and more people and organizations accessing the Internet, and as the potential uses of the web grows, the way business is done is naturally evolving as well.

One example of this is the emergence of cloud computing services. In essence, this is the outsourcing of an organization’s IT services to a different company. Everything is managed through the Internet – through “the cloud”, hence the term.

Learn more…

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!