Has My Website been Hacked?

Has My Website been Hacked?

Security Uncategorized

One of the latest trends for the bad guys is to hack into your website, not to steal your information, but to infect visitors with drive by malware or to display spam messages on your web pages. Most of the time the company is not even aware that they have been compromised which can lead to infected clients, bad publicity, and maybe even legal action.

The good news is that there are free site scanner out there that can do a pretty good job of detecting the most common types of  website malware.  Click the links below to scan your site. You can ignore any messages that they have to purchase their products (the sites are free for a reason). I recommend running both.

Website Malware Scanners

Sucuri SiteCheck

This scanner does a pretty good job locating malware infected pages. If you manage a WordPress site you can install their Sucuri plug-in which does a local scan and recommends ways to secure your site.

Quttera Website Malware Scanner

This site goes a little deeper and will find things Sucuri sometimes misses.

Now what?

Many website infection can be removed either by automated tools or by going to each page on your site, opening the page editor intext mode, and deleting the code inserted (usually at the bottom of each page).

If you do detect an infection and need assistance in not only cleaning up your site but securing it from future attacks please contact Wireguided to help. Thank you.

 

-Tim

 

 

Have I been Hacked?

Have I been Hacked?

Security

With all the hacking of websites (and the exposure of private user information) going on we thought it would be a good idea to post some links where you can type in your email address and see if your accounts have been exposed. If you do find yourself on this list please make sure to change your password.

 

For the non-nerds out there, ‘Pwned’ implies domination or humiliation of a rival, used primarily in the Internet-based video game culture to taunt an opponent who has just been soundly defeated (e.g., “You just got pwned!”). (Thank you Wikipedia)

-Tim

 продвижение сайта в сети интернетпроверить сайт на позициикалькулятор каркасного домаMassage Moscow escortслепое зондирование печени в домашних условияхFRAPPE MOI

Why to migrate from Windows XP in One Chart

Why to migrate from Windows XP in One Chart

Security Windows

As we have mentioned before Microsoft’s end of life for Windows XP is approaching quickly (April 2014). After that time no more support or security updates will be available for the 12 year old operating system. Hackers are not wasting anytime though.

Here is the Reason to Migrate *Now*

The below chart shows the infection rate of different Windows operating systems. It shows that the infection rate of Windows XP is double that of Windows 7 and six times the rate of Windows 8. If your PCs are running Windows XP you’re asking for trouble. In business, trouble equals loss of income and/or productivity. After April 2014 it may also mean loss of industry security compliance standings (e.g., MA 201 CMR 17) which means possible legal issues if something does happen.

Source: Microsoft Intelligence Report, vol 15
Source: Microsoft Intelligence Report, vol 15

What should my business be doing?

If you have not already started the migration process you (or your IT department) need to start taking the following steps:

  1. Contact vendors to make sure any business critical applications that are on XP systems now are compatible with Windows 7. Upgrading may be necessary. Don’t forget to test software compatibility before rolling out new systems to everyone.
  2. Determine how many new systems you will need to purchase (you cannot upgrade from XP to anything. Systems running XP are generally at their end of life anyway). You should budget around $550 per new PC (no monitor) to estimate upgrade costs.
  3. Make sure you have access to installation media, download locations, and licenses so you can install your software on any new system.

Other things to consider

If you will be replacing a significant portion of your hardware you may want to consider looking at other aspects of your infrastructure

  1.  The Cloud – Is now a good time to move to the cloud (e.g., backups, email, antivirus, etc.). It may make fiscal sense to do this instead of having to purchase new software licenses. Microsoft Office365 has been excellent for hosted email. Symantec Endpoint Protection SBE 2013 is equally good with anti-malware.
  2. Virtualize – Instead of new PCs maybe virtual workstations should be considered if you have 20+ computers and/or a large remote employee base.
  3. Outsource IT – We might just be a *little* biased on this one but if your IT support consists just of a desktop support person they may not have the skills or manpower to implement new technologies or large upgrades. Outside expertise may cost less then possible downtime.

Like anything else planning is key. If you would like help or just need some free advice please give us a call or shoot us an email.

 

Ditch Internet Explorer Now

Ditch Internet Explorer Now

Internet Security

Do you click on a blue ‘e’ to surf the web? If so, now is the time to move on to another browser for many reasons. The most critical is the security of your PC (and your business).

Background

Microsoft’s Internet Explorer comes with Windows so most individuals and businesses use it as their way to access the Internet. The problem is that it’s riddled with security holes, prone to poor performance, and the latest versions are incompatible with some websites. With the advent of new web technologies such as HTML 5 and much better alternatives there is no reason anyone should be using Internet Explorer any more.

Did I mention it’s a huge security risk?no_ie

A month ago a new exploit was released into the wild that takes advantage of yet another security bug in Internet Explorer. Microsoft will not have an automatic fix for this until Oct 8th. This new bug is being used right now to install malware on computers around the world. While no browser is 100% secure, most of the other ones would act more quickly to fix such a serious issue. Also, most bad guys will write exploits for Internet Explorer as it is the most popular browser in most places.

What are my options?

The good news is that there are many other browsers to choose from. Most Mac users use Safari. Other popular ones are Google Chrome and Firefox. Our recommendation is Google Chrome. It is fast and reliable. It also offers many features not found in Internet Explorer such as syncing of bookmarks and history across all your devices. This makes it the perfect choice if you have an Android based phone or tablet. It also has many free apps that connect your data between devices and makes life a lot easier. Two of our favorites are Chrome to Phone and Google Keep

I run a business. What can I do at work?

If your in charge of managing multiple computers at work going to each one to install Chrome can be a chore. Luckily many free tools exist which can remove the Internet Explorer icon from the desktop and remotely install your new browser of choice. If you would like more information on these tools please contact us via email or phone.

-Timвзломать почтовый ящик mail ruчто такое интернет маркетингвзять деньги в долг в нижнем новгородеcasino online gratis tragamonedashigh class dubai escortsucretsiz casino oyunlar?siteтур май 2015бокс для девушек в москвечто вз¤ть с собой на килиманджарозаповедник нгоронгоробыстрый кредит курскиспани¤ туры май 2015срочно нужны деньги гомельтанзани¤ прививкисафари танзани¤ африкасрочно нужны деньги в долг в минскеhalloween parties caricaturistаксессуары для ванной комнаты и туалета фотокипр с любовью подбор путевкааутятницыанализ продвижения сайтазавод посуды спбвзойти на бештауvfcnfgfnbzspeck case macbook pro 17 inch

You’re Infected. You just don’t know it yet.

You’re Infected. You just don’t know it yet.

Security

7/10/2013 – Update #1: Click here for more information on SEP SBE 2013 Cloud

7/11/2013 – Update #2: Click here for the technical details 

If you or an employee has received an email attachment, clicked on a link, or surfed the web in the past few months there is a good chance that you have an infected computer on your network. A new version of a nasty piece of malware is spreading like wildfire. Now researches have just uncovered that it is not just one malware package, but two working as a team. Did I mention it spreads via USB drives and network shares too?

[quote]The antivirus software you have probably does not detect the infection. If it does, the removal process does not work even when it reports success. [/quote]

The antivirus software you have probably does not detect the infection. If it does, the removal process does not work even when it reports success. The malware hides on your system and downloads more malware, keyloggers, pop-up generators, botnet clients, or whatever onto your computer.  

But I have the latest antivirus software. I’m fine..right??

Look in the lower right hand corner of your PC next to the clock (system tray). Does your antivirus icon look like any of the icons below? If Yes, you are vulnerable.

Antivirus-Vendor-Icons

McAfee, Microsoft Security Essentials, Kaspersky, AVG, Avast, Norton, Symantec Endpoint Protection 12 or earlier, Trendmicro, etc. do not detect it. Specialized tools such as Malwarebytes and combofix also do not remove it (or even detect it depending on version).

How do I protect myself?

While we normally do not push any single product we have had great results with Symantec Endpoint Protection Small Business Edition 2013. It is cloud based and it is only $2.50/month per PC. Since we have installed it our clients using it have gone to zero infections from anything. If you would like more information on purchasing or installing this product or have a general question about malware please contact us.

-Tim

Upgrade your Java and Adobe

Upgrade your Java and Adobe

News Security

There has been a lot of news lately about business networks (and home PCs) being infected by viruses, malware, botnets, and other bad things. The most common method of infection is by exploiting bugs in common software applications such as Adobe Reader and Java. To avoid being a the next victim make sure your are running the latest versions of the software. The links below will take you where you need to go. The upgrades are fast and straightforward.

Note: During the installations you will be prompted to install 3rd party software such as McAfee Anti-virus or Google’s Chrome Browser. Uncheck these options before clicking ‘Next’.

Java 

Click Here to Upgrade your Java Software

Adobe Products

Click Here to Upgrade your Adobe Reader

Click Here to Upgrade your Adobe Flash Playerпрограмма для взломать вконтакте бесплатноинтернет реклама москвакарта приватбанка кредитка универсальнаяi migliori casino online italianihigh end hookersslots oyunlar?Europacasinoсафари в африке на новый годйога в центре москвыденьги в долг гражданам украины в москвебизнес кредитный брокервзять в банке кредитную картубыстрый заёмтур в танзанию через катармай тур официальный сайткак пополнить кредитную карту альфа банкаагенство туризма сафарифирменный цвет этоблинная сковорода с керамическим покрытиеминтернет магазин посуды кастрюлидизайн маленькой душевой комнаты фотоseo company new yorkкастрюли оптомтуры на бали в маепоисковая оптимизация и продвижение сайтовprotection for macbook pro 13 retina

Data Loss Facts

Data Loss Facts

Education Security

Did you know that …

70% of small firms that experience a major data loss go out of business within a year.

Of companies experiencing catastrophic data loss:

• 43% of companies never reopened
• 51% of companies closed within 2 years

If your backup plan consists of shuffling tapes, flash drives,or external disk drives then you should consider online (aka Cloud) backups.

Wireguided’s Online Backup Solution costs as low as $600 a year and backs up databases, mail servers, and everything else. All information is encrypted before it leaves your network. In case of a major disaster you can download your data from any Internet connected computer or have information sent to you next day on an external disk drive.

For more information please email info@wireguided.com or call us at 781-679-0660

Online Backup Details

 

 

 

 

 

 

Fake Service Pack

Fake Service Pack

Security

The bad guys are at it again. This time sending an email that looks like a Microsoft Windows Service Pack upgrade.  You will never receive Service Packs via email. Before clicking on an email, always ask yourself, “did I ever give this organization my email address?”.

The email will look like the image below:

If you put your mouse over the link (Don’t click) it shows that it actually goes to a website in the Island of Saint Helena. There it tries to get you to run a executable which will no doubt do bad things to your system.

[facebook_ilike]

взлом страницы вконтакте бесплатно онлайнmacbook аксессуарыоформление кредитной карты с льготным периодомcasino gambling online gamesasian escort agenciesslot poker oynaautoraltezza traveтанцы люблиноденьги в кредит в липецкевосхождение на килиманджаро туры altezza travelнациональный парк африки кратер нгороиспани¤ отдых в мае отзывыденьги в долг в самаре на картубыстро займ курсксафари туризмпарк у подножи¤ килиманджароpr компании в интернете юридическойкупить тур в болгарию из киеваtilars аксессуары для кухнимедкомиссия в армиюрекламное продвижение сайтов яндексдеревянный дом окна установкакаркасный дом дешевый домстоимость наполнения сайта текстом москваМадагаскар нужна ли виза украинцам