Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

0 Comments
Continue reading

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

0 Comments
Continue reading

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Is Your Security Prepared to Stop a DDoS Attack?

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.

0 Comments
Continue reading

Your Computer's Infected... What Do You Do Next?

Your Computer's Infected... What Do You Do Next?

It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that.

0 Comments
Continue reading

What We Can Learn From IT Statistics

What We Can Learn From IT Statistics

Technology plays a pivotal role in the way modern businesses function, and as a result it carries some element of risk. An example of this is how companies store electronic records. While the implementation of measures that are designed to provide greater ease of use and organization for a business’ employees make business move faster, it also makes it that much easier for a hacker to locate and steal data. Small and medium-sized businesses, in particular, are vulnerable, as they may not have dedicated IT security.

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

mobile_ransomware_400

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Tip of the Week: Understanding Spyware is the First Step to Preventing It

Tip of the Week: Understanding Spyware is the First Step to Preventing It

The term ‘spyware’ has some clearly negative connotations to it, and rightly so. This variety of malicious software can cause no small amount of trouble if left unchecked. What follows is a brief overview of spyware, and what measures you can take to protect yourself and your business from it.

0 Comments
Continue reading

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

0 Comments
Continue reading

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

0 Comments
Continue reading

Can Your Firewall Protect You From 304 Million Different Kinds of Malware?

b2ap3_thumbnail_malware_increase_400.jpgSmall and medium-sized businesses continue to have problems shoring up their cyber security. Even with the latest solutions, like antivirus and firewalls, they still need to be wary of impending attacks. New threats are created on a daily basis, all of which want to infiltrate your network and cause harm to your business. In fact, 27.3 percent of all malware in the world was created in 2015 alone. Will we ever escape from the clutches of malware?

0 Comments
Continue reading

Alert: Malware Locks Up Your PC and Offers Fake Tech Support Phone Number

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

0 Comments
Continue reading

Warning: Malicious Adware Finds New Way to Spread on Android Devices

b2ap3_thumbnail_security_for_your_it_400.jpgWith many organizations heavily relying on mobile computing, malicious operators have begun targeting the “low-lying fruit” of a business’ IT infrastructure, which is often a company’s mobile devices. Kemoge, a malicious adware strain designed to corrupt Android mobile operating systems, is the latest mobile threat that your business needs to protect itself against.

0 Comments
Continue reading

The Coding For Your ATM Shouldn’t Be as Dirty as Its Cash

b2ap3_thumbnail_atm_malware_threats_400.jpgMalware that targets ATMs isn’t a new concept. After all, ATMs use internal computers that can be hacked just the same as any old workstation. The prime difference is that hacking into an ATM allows for a direct dispensing of cash, rather than some crafty behind-the-scenes action. A new type of ATM malware, titled GreenDispenser, is a cause for concern in Mexico, and could spread to other countries if left unchecked.

0 Comments
Continue reading

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

0 Comments
Continue reading

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

0 Comments
Continue reading

Find Out What the Word “Hack” and Medieval Horses Have In Common

b2ap3_thumbnail_hacker_attacker_400.jpgIn today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Business Computing Computer Internet Network Security Productivity Microsoft Software Tech Term Google Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Data Management Microsoft Office Browser Managed IT Services Managed IT Services Business Continuity Upgrade Internet of Things Cloud Computing Gmail Windows Data Recovery Facebook Server Office 365 Phishing Word Innovation Disaster Recovery Data Backup Passwords App Outsourced IT Smartphones Mobile Device Windows 10 Managed Service Provider Employer-Employee Relationship VoIP Cybersecurity Encryption Business Management Artificial Intelligence Remote Monitoring Users Big Data Miscellaneous communications Social Media Tip of the week Vulnerability Analytics Office Tips IT Support Government Network Chrome Money BYOD Content Filtering Spam Applications Infrastructure Website Information YouTube Automation IT Management Maintenance Risk Management Wireless Virtual Reality Save Money Paperless Office Firewall Tablet Apple Antivirus WiFi Data storage Customer Service Avoiding Downtime Display Access Control The Internet of Things Employee-Employer Relationship Router Managed Service Hacker Settings Two-factor Authentication Robot Printing Bandwidth Mobile Security Operating System Development Document Management Touchscreen End of Support Computing Search Education Telephone Systems Apps Google Drive IBM Password Mouse Vendor Management Quick Tips Hacking Administration Scam Mobile Device Management LiFi Customer Relationship Management Wi-Fi SaaS Computers Business Intelligence Networking Storage Laptop Retail Augmented Reality Presentation VPN Holiday Unified Threat Management Office Company Culture Data Security HIPAA Safety Gadgets Data loss Business Technology Wireless Technology Outlook Downtime Virtual Private Network Virtualization Recovery Monitors Hosted Solution Server Management Mail Merge Value Tech Support Specifications Compliance Hacks LED Disaster Sports Shortcut Online Hard Drives IoT Budget Cables Computer Care Laptops Knowledge Unified Threat Management Downloads IT Technicians Cryptocurrency File Sharing Onboarding Break Fix Cookies Samsung How To Continuity Mobility Spyware Superfish Cooperation Bring Your Own Device sip Slack Mobile Office Statistics Smart Office Co-Managed IT Address Hotspot Professional Services Websites Charging Identity Theft Black Friday Regulations Uninterrupted Power Supply Patch Management Microsoft Excel Refrigeration Star Wars Wires Training Software as a Service Experience Unified Communications User Error Multi-Factor Security User Mirgation Bitcoin Network Congestion Digital Signage Dark Web Nanotechnology Information Technology Solar G Suite Print Toner Staff Public Speaking Best Practice telephony Automobile Monitoring Running Cable Bluetooth Writing Work Content Corporate Profile Virtual Desktop Language Competition USB Google Docs Cyber Monday Social Networking Solid State Drive Buisness Blockchain Cost Management Voice over Internet Protocol VoIP Google Calendar Chatbots Windows 8 Desktop Net Neutrality Screen Reader Google Wallet Shortcuts How To IT solutions Printer Wearable Technology Business Growth Spying Lithium-ion battery Motherboard Current Events Remote Computing Optimization Streaming WannaCry Computing Infrastructure Dongle Analysis IT service Heating/Cooling Smart Technology 5G Hard Disk Drive Permissions Undo Assessment Legal FinTech Time Management Legislation Identity Update Troubleshooting Marketing FCC Smart Tech Drones Security Cameras Cortana Firefox Alt Codes Dark Data Cabling Halloween Distributed Denial of Service Application Going Green Social Engineering Recycling Human Error Fun Alerts Service Level Agreement Digital Payment BDR Servers Fraud Internet Exlporer Politics MSP Network Management Comparison Social Chromebook Managed IT Title II Connectivity Managing Stress Managed Services Techology SharePoint Typing Collaboration PowerPoint Scary Stories Managed IT Service Modem eWaste Device Digital Lenovo Licensing Deep Learning Humor IP Address Google Maps Cybercrime Emoji Webcam Work/Life Balance Mobile Data Electronic Medical Records Domains Error Point of Sale Black Market Law Enforcement Travel Notifications CrashOverride Mobile Computing Twitter Botnet Regulation Supercomputer Gadget Physical Security Staffing Entertainment Motion Sickness Crowdsourcing Upgrades Taxes Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS 3D Printing IT Consultant Computer Repair Processors Cameras Relocation Tracking Meetings Printers Unsupported Software Cleaning Health Alert CCTV Private Cloud