Get Instant Computer Support @ 1 800 237 3901

Apple Increases Mac OS X Malware Protection

Friday, June 25, 2010 1 comments

Defenses against the HellRTS Trojan were included -- but not documented -- in the Mac OS X 10.6.4 update this week.

According to antivirus vendor Sophos, Apple this week, in an undocumented move, tweaked its OS X malware defenses.
In particular, OS X 10.6.4 now provides better protection against a Trojan application called HellRTS, aka Pinhead-B, which has been turning up in fake iPhoto software being circulated by attackers.

More Hardware InsightsWhitepapersDigital Color Workflows And The HP DreamColor LP2480zx Professional LCD Display Speakers-on-a-Chip: The Convergence Solution for Audio Entertainment and Voice Communication Peripherals AnalyticsVirtual Servers, Real Risks Private Clouds On The Horizon Videos
Startup's switches ramp up blade server performance "This Trojan can give hackers the green light to send spam e-mail from your computer, take screenshots of what you are doing, access your files and clipboard, and much, much more," said Graham Cluley, senior technology consultant at Sophos, in a statement. "But what's curious to me is why Apple didn't announce they were making this update in the release notes or security advisory that came with Mac OS X 10.6.4. It's almost as if they don't want to acknowledge that there could be a malware threat on Mac OS X."

Despite the existence of HellRTS, which first hit the scene in April, and is a variant of a Trojan first seen in 2004, is there really a clear and present malware threat to Apple's OS X?

Late last year, Symantec predicted that the amount of malware aimed at Mac OS X would continue to increase. In its report predicting security trends for 2010, Symantec wrote: "In 2009, we saw Macs and smartphones targeted more by malware authors, for example the Sexy Space botnet aimed at the Symbian mobile device operating system and the OSX.Iservice Trojan targeting Mac users. As Mac and smartphones continue to increase in popularity in 2010, more attackers will devote time to creating malware to exploit these devices."

But if the primary, if not sole, impetus for creating malware is to steal people's personal information for financial gain -- typically by selling that information to others or using purloined credentials to literally steal cash -- is an operating system with roughly 5% market share screaming "hack me" to potential attackers?

"It's true to say that there are far, far fewer malware threats for Mac than there are for Windows -- but that doesn't mean the problem is non-existent. Unfortunately, many Mac users seem oblivious to security threats which can run on their computers, even though Apple has now built in some elementary protection," said Cluley. "This lack of awareness isn't helped when Apple issues an anti-malware security update by stealth, rather than informing the public what it has done."

Black Hat USA 2010 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 24-29, in Las Vegas. Find out more and register.

Source: Informationweek.com

Computer Virus uses Canada Post Scam

Tuesday, May 18, 2010 0 comments
A new computer virus masquerading as a Canada Post delivery notice has been traced to Malaysia, a Canada Post spokeswoman said Friday.

And even as Canada Post tried to alert customers on its website, Facebook and Twitter, the virus kept morphing into new variants, said Anick Losier.

The official-looking virus, in both English and French, sends a message to inboxes saying, “We missed you, when trying to deliver! Please view the income and contact us with any questions. We will try to deliver again the following business day.

The message contains a PDF attachment which carries the Trojan virus. When opened, it sends a virus through the users’ systems.

The subject line announces: “IMPORTANT: Canada Post Delivery” and then a number, which IT specialists speculate is just random.

“Any email that says you’ve received a delivery, you should be suspicious about,” said Losier. “They’re using our branding quite accurately.”

Canada Post does send email notices to alert a customer about a shipment if they sign up for the notices, she said.

She also recommended users who receive a message with a tracking number cut and paste it onto the Canada Post website tracking device to see if it is valid.

“Our customers have to be vigilant.”

“Postal-themed” viruses started early last week with a British Royal Mail delivery scam, according to one anti-virus alert site, which described the ploy as coming from the “Bredo malware-spammers.”

The Canada Post version began late last week and by this week had been modified to arrive in both official languages.

“The actual attachments are PDF files, which is quite unusual for spam containing malware,” the anti-virus site reports. “Maybe that’s what the bad guys were relying on. There are still many people out there who mistakenly think of PDF as being a ‘safe’ format.”

The Canadian Cyber Incident Response Centre on April 16 sent a Cyber Flash warning to IT departments after detecting the virus and analyzing it. The CCIRC is a division of Public Safety Canada.

The spammers were highly effective, CCIRC reported:

“Anti-virus detection for the associated malware was poor with only 18 per cent of vendors detecting the sample as malicious.”

The centre alert recommended that IT departments block the IP address 59.44.60.152 on their network perimeters.

Source: thestar.com

Diary of a mad McAfee antivirus victim

Tuesday, April 27, 2010 0 comments
As if McAfee's bad antivirus update last week wasn't bad enough, some customers were none too happy with how the security vendor's tech support handled the situation either.

David Hellen, an independent contractor for the U.S. Navy who heads his own SAP configuration business, says last Wednesday when he noticed that his Dell Latitude running Windows XP wouldn't boot straight into Windows, he knew he had to try and figure out what was going on. He saw news stories about the McAfee antivirus update snafu, which involved the faulty DAT 5958 file, and called his McAfee Gold Service phone number for help.

"After waiting 20 minutes in the queue, they connected me to India and I got a service technician," says Hellen, whose business is called David J. Hellen & Associates. "The first thing they said is, 'You have a virus.' I said I think I have that DAT thing. They told me to run scans."

"I phoned the McAfee guy back and we ran the McAfee scan, and we came up with nothing," Hellen says. "We tried the SuperDAT tool and that didn't work, and the 5959 update. It still didn't solve it." The McAfee technician told him he needed to escalate to "Tier 2 support."

Due to his work schedule, Hellen had to postpone more attempts at remediation until the weekend, so when he called McAfee tech support back then, he was surprised to learn that Tier 2 support doesn't work on Sunday. "I said, you have to be kidding me," he notes.

On Monday, April 26, McAfee tech support did contact Hellen and a technician took full control of his computer and uninstalled the antivirus software using what Hellen viewed as a "special cleaner they have to uninstall." McAfee was completely uninstalled and then reinstalled, he says.

While he appreciated that, and McAfee's effort did seem to restore his computer to full service, "what ticked me off' was that he got an e-mail from McAfee about his case, which he believes doesn't accurately represent his interactions with the vendor.

The McAfee e-mail stated: "Customer called in that computer is infected by virus" and that the "severity rating" was "Business not affected."

Hellen is also upset that McAfee CEO Dave DeWalt issued a formal apology for the faulty antivirus update, saying that thousands of McAfee employees were working around the clock. But from Hellen's experience Tier 2 tech support didn't seem to be working on Sunday, even in the wake of a situation that McAfee itself caused.

McAfee had no immediate response related to McAfee Tier 2 support, but a spokesman did say the company is "investigating" Hellen's case.

McAfee does not intend to release the number of customers impacted by the faulty DAT update. The vendor announced Tuesday it will offer a free one-year subscription to its automated security health-check platform, an assessment of the security in the organization, on a case-by-case basis, to eligible corporate customers.


Source: networkworld.com

Computer Desktop and Laptops

Tuesday, April 13, 2010 1 comments
This is one question that asked many people. "Should we get a desktop or laptop?" It’s depending on your requirement. Desktop and Laptop both are same computer.
For and unfortunately, most uses may require the power of a desktop pc. I will list some of the more common uses of a pc and discuss the specs needed.

Office Uses:
Mostly use in office like Microsoft Word, Excel, etc. We also use for mail checking, store data and use like small server. This type of computer have not heavy requirement for extra use. You have able to handle very easy that type of any new desktop or laptop.


Multimedia Applications Uses:

laptops are mostly used for listening to music or watching movies. The only times that it will not be adequate is if you want better components like a much larger and better screen resolution and better sound quality. If you want high resolution viewing, you can connect a laptop to another separate monitor but then you might not be able to go with a higher resolution because of your graphics hardware on the laptop. Also, your sound options are very limited with laptops. All laptops use onboard cards that are adequate for most uses but for the highest sound quality, you will not have it and your external component options are very limited. For desktops, you have a wide range of choices for internal PCI slot upgrades. To sum it up, for high resolution and high definition audio, you may have to go with desktops.

PC Games:
Here I am not talking free in build games in your computer or laptop Solitaire or any other simple game. We are talking about PC Games like Counterstrike, Crysis, Sins of a Solar Empire etc. If you want batter playing of pc games then you have required heavy hardware it will depend on the graphics hardware.

Multimedia Encoding:
If you are looking any video or audio production and encoding, you better go with desktops. You will need lots of hard drive space and most laptops do not have choices for very large drives. You will also need a very good processor and a powerful video card will help too.
The most important are computer installation with Latest OS.

Features of an Operating System

Wednesday, April 7, 2010 1 comments
I will introduce some latest operating system features and what are the features that a particular operating system should have used. Some of these features are a part of all operating systems, while some of them may or may not be available in the computer operating system you are using. So I will give you online computer support 24x7 every time.

Managing Hardware/Software
As already know, it is the operating system that causes the software and hardware in a computer to interact with each other. It is also the platform that causes one software in the computer to communicate with another. Once the computer operating system in a computer loads during the booting up process, other application software’s can be loaded into the computer.

Consistent Application Program Interface
Application Program Interface which software development peoples refer to as APIs allow the applications those run on one computer to run on another computer having the same computer operating system. It is important that the operating system has a consistent API. Undoubtedly, every operating system will have deferent type’s requirements, but it should be enough to support computer hardware’s.

Program Execution
The operating system to execute all the types of computer programs running in it. It is a rather more complicated process. It allows to multitasking and allows different programs to run at the same time and share the many types of computer system resources. Here, it requires allotting RAM space to different computer applications running on the computer. The execution of more than one program may also require the computer operating system to prioritize the operations running on the computer system.

Memory Management
we already defined in the part on program execution, it is up to the computer operating system to provide memory to the different programs running on the computer system. It has to prioritize and allocate memory to each application. Even when data is saved in a secondary storage device, it is the computer operating system that decides how that particular chunk of information should be stored.

Networking
Computers need to communicate with each other via networking. A computer without Internet is not even imaginable. It is the task of the computer operating system to provide the required networking features. It allow to you used two or more computers to connect and form a network or connect to the Internet. More on computer networking.

Security
Computer system security that an operating system should provide is undoubtedly one of its most important features. We used passwords setting for logging in, to providing firewall protection; everything comes under the tasks of an operating system. Many network utilities may require printer sharing, file sharing and using TCP/IP protocols. Hence, it becomes very important for the computer operating system to provide proper security so that the computer's security is not compromised in such cases.

Computer Troubleshooting Through Online Support

Monday, March 15, 2010 0 comments
PC repair
From past few days, I was facing several technical issues with my computer like, blue screen error, system slow down, applications taking long time in launching, system crash, etc. I decided to contact iYogi Technical Services for troubleshooting my computer related technical issues, and one of its tech experts resolved my problems in few minutes via remote connection.
Features
Numerous services are offered through online technical support for troubleshooting computers. These services include resolving Internet browsing issues, troubleshooting software and hardware errors, configuration of many applications like Office suite, e-mail, PC optimization, software installation, re-installation and un-installation, Windows upgrade, resolving registry issues, diagnostic and repair services for hardware and software, spyware and virus removal, driver update, etc.
All these services are offered anytime and anywhere. It means you can access online services from any location, provided you have an Internet connection.
Usability
Computer troubleshooting via remote connection offers many benefits like cost effectiveness, availability, instant access, etc. In online technical support, a tech expert accesses your PC via remote connection, after getting your permission. Once he gets access on your system, he starts diagnosing it for finding out the possible causes behind the technical issues.
After completion of diagnosing process, tech expert will carry out the necessary steps to root out your technical issues. In this way, process of computer troubleshooting via online support gets completed.
Limitations
Online technical support offers many benefits as compared to on-site support. In on-site support, you either have to take your system to any service centre, or you have to call any technician at your premises. If you will take your system to any service centre, it would take three to four days in troubleshooting your computer. If you will call any technician at your home, then you have to pay extra for the services.
Therefore, it is wise to go for online tech support to resolve the issues related to computer troubleshooting.

Windows 7 Data Recovery

Thursday, March 11, 2010 0 comments
windows 7 security
Features
There may be manual fault or some unavoidable circumstances related with technical issues, when you lost your important home or business files (such as MS Word, MS PowerPoint, MS Excel, Bkf, Zip), e-mails, photos, music and other rare things.
Although this happens very rarely, but the data once lost can take long time to recover or may be not be recovered at all, so there should be adequate management for data backup to assure that you access important files and folders anytime.
You would be considering me too much obscene, but I have suffered from data lost on my Windows 7 computer recently, that’s why I want to discuss with you about some important data recovery methods for Windows 7 and you must add the data recovery agent.
First I want to tell you about prevention, because it is an old saying that “prevention is better than cure”. As you do Ctrl+S with your word document every time to ensure it is saved regularly, similarly you should make a practice to take data backup of your hard drive memory on an external hard disk or other optical device, which can be used to combat such situations.
Next, when you are trapped under the situation and you don’t left with much of options, then Windows 7 recovery software is a better alternative. Some of the best recovery software available in the market are Stellar Phoenix Windows Data Recovery v4.1, Advance Windows 7 Data Recovery Software and Recover My Files data recovery software.

Usability
Windows 7 data recovery software can effectively restore or recover entire data of your hard disk including deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, infection with computer viruses, and unexpected system shutdown or software failure. You can also recover your data, which is located in corrupted partition, such asFAT12, FAT16, FAT32, NTFS & NTFS5 of Windows 7 based hard drive. Windows 7 data recovery software are also compatible enough for recovering data from other types of data storage media such as floppy drives, flash drives, USB digital media, pen drive, zip drive, memory stick, multimedia card, secure digital card & many more.
Limitation
Data recovery is not possible with Windows 7 Recovery tools if it has been physically overwritten by low level disk format. You may face issues while recovering files located on hard disk which is well encrypted.