iTecs IT Outsourcing and Support Blog
We are urging all of our clients to uninstall CCleaner from all workstations due to a recent malware injection found by security experts. Hackers have successfully implemented malware into the app and have distributed it to millions of users. Security researchers at Cisco Talos discovered that download servers used by Avast, which is the company that owns CCleaner, were compromised.
If you installed CCleaner before version 5.33, you're still at risk because the software can automatically update itself and by doing so, download the malware infected version of CCleaner from the software developers servers. This hack is an unusual attack since CCleaner is trusted by consumers to remove adware, not install malware and compromise your digital security.
It's not fully understood what the malware does once your computer is infected, but that doesn't matter since it's always best practices to assume the worse. We do know that your system joins a botnet of other infected computers used for several malicious tasks including Denial of Service Attacks.
Uninstall the software immediately! If your computer is part of our managed IT services, we maintain your system, and you don't need CCleaner since we perform everything it does plus more. How do you know if iTecs maintains your system? Look for our company logo in your taskbar, if you see the red triangle your system is updated and maintained daily.
The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.Read More
There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.Read More
The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.Read More