The FBI is recommending that all small business and home router owners reboot devices, even if they’re not among the brands known to be affected.
The FBI is urging small businesses and households to immediately reboot routers following Cisco’s report that 500,000 infected devices could be destroyed with a single command.
The malware, dubbed VPNFilter, was developed by the Russian state-sponsored hacking group Sofacy, also known as Fancy Bear and APT28, according to the FBI, which last week obtained a warrant to seize a domain used to control the infected routers.
Cisco’s Talos Intelligence researchers revealed in a report last week that 500,000 routers made by Linksys, MikroTik, Netgear, and TP-Link had been infected with VPNFilter.
The malware is capable of collecting traffic sent through infected routers, such as website credentials.
However, the most worrying capability is that malware allows its controllers to wipe a portion of an infected device’s firmware, rendering it useless. The attackers can selectively destroy a single device or wipe all infected devices at once.
Cisco released the report on Wednesday after observing a spike this month in infections in the Ukraine, which accused Russia of planning an attack to coincide with Saturday’s Champions Cup final in Kiev.
The country also blamed Russia for last June’s NotPetya attacks that mostly affected Ukraine organizations but also spread within multinational corporations with offices in Ukraine.
Users with infected routers can remove the dangerous Stage 2 and Stage 3 components of VPNFilter by rebooting the device. However, Stage 1 of VPNFilter will persist after a reboot, potentially allowing the attackers to reinfect the compromised routers.
The web address the FBI seized on Wednesday, ToKnowAll[.]com, could have been used to reinstall Stage 2 and Stage 3 malware, but all traffic to this address is now being directed to a server under the FBI’s control.
The FBI nonetheless is urging all small office and home router owners to reboot devices even if they were not made by one of the affected vendors. This will help neuter the threat and help the FBI identify infected devices.
“The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices,” the FBI said in a public-service announcement.
“Owners are advised to consider disabling remote-management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware.”
Cisco and the Justice Department have also urged all home and small office users to reboot routers.
See: What is phishing? How to protect yourself from scam emails and more
The Justice Department said the FBI-controlled server to which infected devices are now communicating with will collect the IP addresses of each device.
The addresses are being shared with the non-profit cybersecurity group, The Shadowserver Foundation, which will disseminate the addresses to foreign CERTs and ISPs. The FBI and US DHS CERT has also notified some ISPs.
It’s not known how the attackers initially infected the routers, but Symantec noted in its report on VPNFilter that many of them have known vulnerabilities.
“Most of the devices targeted are known to use default credentials and/or have known exploits, particularly for older versions. There is no indication at present that the exploit of zero-day vulnerabilities is involved in spreading the threat,” wrote Symantec researchers.
Known infected devices include:
Source: ZDnet.com
June 18, 2018
IT News
Check out these features added in recent Windows 10 updates, including new features from the April 2018 Update. They’ll help you get things done on your PC and across your other devices.
In the April 2018 Update, continue your recent PC or phone activities instantly from your timeline. Select Task View on the taskbar, or press Windows logo key + Tab, then select an activity to get started. Scroll down to look for past activities, or search to find a particular activity.
In the April 2018 Update, open Photos and select the picture you want to share. Select Share , then select another PC you want to share it to. On the other PC, select Save & Open when the notification appears.
Get beautiful Bing wallpapers that refresh daily, sync your Office docs and calendar, and more with the Microsoft Launcher app. Open the Google Play Store app on your Android phone, type “Microsoft Launcher” in the search box, and then install it.
Start browsing the web, writing emails, and using apps on your Android or iPhone, then continue on your PC, instantly. To link your phone, on your PC select the Start button, and then select Settings > Phone > Add a phone .
Express yourself with emoji wherever you want, including conversations, docs, and even web searches. Press Windows logo key + period (.) to open the emoji panel in a text entry field, then select an emoji.
Talk to write an email or message instead of typing it. Select touch keyboard on the taskbar, select microphone or press Windows logo key + H, and then talk to dictate.
Note
This feature is available in US English only.
In the April 2018 Update, hide distractions while you work—turn on focus assist to send notifications directly to action center. Select action center on the taskbar, then select focus assist.
Get to your favorite websites faster by selecting them from the taskbar. In Microsoft Edge, open a website, then select Settings and more > Pin this page to the taskbar.
In the April 2018 update, local account users won’t have to worry about forgetting their password when they add security questions. While you’re logged in with your local account, select Start > Settings > Accounts > Sign-in options , and then under Password, select Update your security questions.
Source: Support.Microsoft.com
May 9, 2018
IT News
If your organization is running Windows 10, April 10, 2018 marks an important milestone.
For Windows 10 version 1607 (the so-called Anniversary Update), that date marks the official end-of-service date. To continue receiving monthly security and quality updates, you need to install a newer feature update from the Semi-Annual Channel.
If that abbreviated lifecycle seems like a major change from previous versions, welcome to the “Windows as a service” era.
Microsoft has a well-established support lifecycle for its software products. As I’ve noted before, it’s basically an agreement that the company makes with everyone who purchases a license to use its core products, Windows (desktop and server) and Office.
That assurance of support is especially important for business customers, who tend to be conservative in their approach to upgrades.
For more than a decade, the support lifecycle for each new version of Windows or Office was 10 years, with mainstream support for five years and extended support for another five years. (For details on what each support phase means and how end-of-support dates are calculated, see the end of this post.)
Windows 10 privacy guide: How to take control
In this guide, Ed Bott shows you which privacy settings help you create the right balance of privacy and convenience in Windows 10.
Read More
That 10-year support lifecycle is rapidly fading away, as Microsoft moves to its “Windows as a service” and Office 365 subscription models. For a few more years, software sold under the Fixed Lifecycle Policy is still alive and kicking. But it’s rapidly being supplanted by products like the Windows 10 Semi-Annual Channel and Office 365 that follow the Modern Lifecycle Policy. (For details on the differences, see the Microsoft Lifecycle Policy home page.)
A long list of Microsoft products have end-of-support dates in 2018. That comes on the heels of a similarly long list of products whose support ended in 2017, including Windows Vista and Office 2007.
Here’s the rundown on commitments for currently supported client versions of Windows and Office, starting with the newest member of the family.
How long will Windows 10 be supported?
We might need a whiteboard for this one because the story is complicated.
In the run-up to the release of Windows 10, many wondered whether Microsoft would take the opportunity to change its established 10-year support lifecycle. The answer, as announced with the release of the new operating system in July 2015, is no. The Windows 10 support lifecycle has a five-year mainstream support phase that began on July 29, 2015, and a second five-year extended support phase that begins in 2020 and extends until October 2025.
A note to that policy qualifies the support commitment to devices where the OEM continues to support Windows 10 on that device. And that’s where things become complicated.
Windows 10 feature updates (the new name for what used to be full-version upgrades) are delivered via Windows Update automatically. Microsoft released the first major update, version 1511, in November 2015; the second feature update, version 1607 (the Anniversary Update) was released in summer 2016; versions 1703 and 1709 were released in April and October 2017, respectively.
These updates are required for ongoing servicing, and Microsoft supports each feature update for 18 months. That period ended for the initial release of Windows 10 on May 9, 2017. Support for the Anniversary Update ended on April 10, 2018.
For an up-to-date list of end-of-service dates for each Windows 10 version, see the Windows lifecycle fact sheet. (Spoiler: Version 1703 servicing ends on Oct. 9, 2018, and the end date for version 1709 is April 9, 2018.)
Microsoft has made one exception to these dates for customers running Enterprise and Education editions of Windows 10 versions through 1709. For those customers, the end-of-service date is pushed back an additional six months, which means the end date for Windows 10 version 1607 is October 9, 2018.
But what if your device is incapable of installing a new feature update? That unfortunate situation actually happened to owners of three- and four-year-old devices built using the Intel Clover Trail chip family. Microsoft has blocked those devices from installing the April 2017 Creators Update but eventually agreed to extend the support deadline to match the Windows 8.1 support lifecycle.
The 10-year upgrade cycle for Windows 10 matters most to customers running the Long Term Servicing Branch (LTSB) in enterprise deployments. The 2015 LTSB release shares the support dates shown here. For the 2016 LTSB release, the support dates are pushed out by a year, to Oct. 12, 2021, and Oct. 13, 2026, respectively.
Mainstream support ends: Oct. 13, 2020
Extended support ends: Oct. 14, 2025
How long will Windows 8/8.1 be supported?
Microsoft’s official Windows 8.1 Support Lifecycle Policy treats Windows 8.1 as if it were a service pack for Windows 8. That means the lifecycle calculations start when Windows 8 shipped, in 2012.
Support for the original release of Windows 8 ended “two years after the General Availability of the Windows 8.1 update,” or Oct. 18, 2015.
A similar policy applies to Windows Server 2012 (released at the same time as Windows 8) and 2012 R2 (equivalent to Windows 8.1). Both operating systems are still supported, but the end of support date is identical for both and is based on the release date of Windows Server 2012.
Most PCs that included a preinstalled version of the original release of Windows 8 have long since disappeared from retail channels. For the dwindling population of PC users still running Windows 8, a free upgrade to Windows 8.1 is available through the Windows Store.
Mainstream support ends: No longer supported
Extended support ends: Jan. 10, 2023
How long will Windows 7 be supported?
This is still an incredibly popular release of Windows, although Windows 10 is making serious inroads, especially in the consumer segment of the market. The following support dates require that you install Service Pack 1 (Windows 7 RTM support ended in April 2009)…
Source: ZDnet.com
May 9, 2018
IT News
The following are the 11 best antivirus tools for Android, according to AV-TEST’s March 2018 evaluations of 20 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.) Each Android antivirus software app listed below received perfect protection and usability scores of 6.0. The apps are in alphabetical order.
Overall, the industry average for detection of the latest Android malware in real time is 97.5 percent, and the detection of Android malware discovered in the last four weeks is 97.1 percent.
1. Alibaba Mobile Security 5.8
Like all the other top Android anti-malware tools, Alibaba Mobile Security detected all newly discovered malware and all other previously known malware. It checked all the boxes for usability and gave no false warnings. It has a good feature set including anti-theft, call blocking, message filtering, safe browsing, and an app lock. However, it lacks parental control, personal data backup, and encryption.
2. Avast Mobile Security 6.9
Avast Mobile Security 6.8 managed Android malware detection in real-time 99.9 percent of the time. It found 100 percent of the latest Android malware discovered during the previous four weeks. The app doesn’t negatively affect battery life or cause the device to get sluggish during normal use. It registered zero false warnings during installation and use of legitimate apps from Google Play or third-party app stores.
Mobile Security’s safe browsing features help protect against phishing attacks and malicious websites, and it offers anti-theft features such as remote wipe. Additional features not evaluated by AV-TEST include an app lock, a privacy advisor, and wi-fi security.
3. AVG AntiVirus Free 6.9
AVG AntiVirus Free had a nearly perfect 99.9 percent detection rate for real-time malware detection and a 100 percent detection rate for recently discovered malware. It gave no false warnings. It has a decent set of features including anti-theft, call blocking, an app lock, wi-fi security, and backup of personal data. However, it lacks a message filter, parental control, and encryption.
4. Bitdefender Mobile Security Version 3.2
Bitdefender Mobile Security’s Android malware detection in real-time is 99.8 percent, and it discovered the newest Android threats discovered in the last four weeks 100 percent of the time as well. For usability, the app gets big check marks for not dragging down battery life or device speeds. AV-TEST found zero false warnings during installation/usage of legitimate apps from Google Play and third-party app stores.
Unlike some Android malware protection apps, Bitdefender’s Mobile Security offers anti-theft features, including remote lock, wipe, and locate, as well as safe web browsing and phishing protection. Like many other Android security tools, it doesn’t include message filtering or call blocking and doesn’t support all types of encryption. Additional features not evaluated include app lock and a privacy advisor.
5. G Data Internet Security Version 26.2
G Data’s Internet Security has more features than many of its other top-rated competitors. AV-TEST checked the boxes for remote lock, wipe, and locate; call blocking; message filtering; safe browsing; parental control; and support for all encryption. The only ‘x’ the app received was for not enabling personal data to be saved to an SD card or cloud storage.
Otherwise, Internet Security’s real-time Android malware detection rate was 100 percent, while it detected threats discovered in the past four weeks 100 percent. The excellent usability score resulted from not negatively affecting battery life, dragging down device performance, or generating too much traffic. The app issued zero false warnings during installation and use of legitimate apps from Google Play and third-party app stores.
6. Kaspersky Lab Internet Security Version 11.15
Kaspersky Lab’s Android malware scanner caught the latest Android malware in real-time 99.9 percent of the time and the latest threats discovered over the prior month 100 percent of the time. The app’s perfect usability score results from not impacting battery life or slowing performance. The feature set is more robust than most, with remote locking, wiping and location; call blocking; message filtering; and safe browsing/anti-phishing protection—though G Data’s Internet Security product offers a few more features. Additional features not tested include privacy protection and anti-phishing protection for texts.
7. McAfee Mobile Security Version 4.9
McAfee Mobile Security Android malware scanner detected bugs in real-time 99.8 percent of the time, but caught malware discovered in the last four weeks 100 percent. As with all other apps in this roundup, usability was stellar. The app’s feature set is strong, including a full set of anti-theft tools, call blocking, safe browsing and phishing protection, and the ability to save personal data to an SD card or the cloud. Mobile Security doesn’t support all types of encryption, however, or text message filtering. Other features not tested include a battery optimizer, privacy, and app lock.
8. PSafe DFNDR 5.4
PSafe DFNDR did a flawless job of Android malware detection for threats discovered in the previous four weeks. For the latest threats discovered in real time, it deteced 99.8 percent. DFNDR also earned high marks for not impacting battery life, slowing the device during normal use, or generating too much traffic on the device. It issued zero false warnings during installation and use of apps from Google Play or third-party app stores.
DFNDR offers safe browsing and protection from phishing as well as the ability to block calls from specific or unknown numbers. It also offers anti-theft features such as remote locking, wiping, or locating your device, according to AV-TEST.
9. Symantec Norton Mobile Security 4.1
Symantec Norton Mobile Security caught 100 percent of all Android malware, including those discovered recently, with no false warnings. It has a good set of usability features, including safe browsing, personal data backup, anti-theft, and call blocking. Features not reviewed include an app advisor, wi-fi security, and an app lock.
10. Tencent WeSecure 1.4
With Tencent’s WeSecure, you won’t get anti-theft features (remote lock, wipe, and locate). AV-TEST didn’t list any additional noteworthy features that weren’t tested, but you’ll get call blocking, safe browsing/anti-phishing protection, and the ability to backup personal data to SD cards or the cloud. The app aced real-time detection of new malware, catching it 100 percent of the time, and it detected new malware reported in the previous four weeks 100 percent of the time. Usability was excellent, with no downsides for battery life or performance and no false warnings.
11. Trend Micro Mobile Security and Antivirus 9.2
Trend Micro’s Mobile Security and Antivirus checks most of the feature boxes: anti-theft, call blocking, text message filtering, safe browsing and anti-phishing protection, and parental control. Plus, there are a privacy scanner, messenger protection, and network protection. The app achieved a 100 percent detection rate for new malware in real-time as well as for threats discovered in the past four months. Usability was excellent, too, with no drag on battery life or performance and zero false warnings.
The state of Android security
Research from the AV-TEST Institute shows that Android malware samples collected have increased sizably every year. In 2014, the total was more than 326 million. The next year, the malware tally reached more than 470 million. In 2016, AV-TEST recorded nearly 597.5 million samples—nearly double the amount from two years earlier.
Source: ITnews.com
May 8, 2018
IT News
iOS 11 has been heavily criticized by the security community and there seems to be evidence to back up these concerns. Whenever new and shiny features are rolled out, they often come at the joy of the consumer base while security experts immediately dive into the cracks in the armor.
One of the newest features offered by iOS11 is the ability to toggle Wifi from the Control Center. For those not familiar with this terminology, the Control Center is the menu that is dragged up from the bottom of your home screen with a finger stroke. On this menu, users can control a variety of different aspects of their iPhone. Mobile phones are especially vulnerable to Wifi attacks, which is why it is a good idea to be proactively cautious. Many users will assume that toggling their Wifi off from the Control Center will provide a protective shell from Wifi attacks, which is understandable as iOS11 certainly makes it seem that way. However, this is has proven to be misleading.
Toggling the Wifi off does indeed cut off connections, however this is only temporary. The wrinkle in the design happens when a user approaches a new Wifi-enabled location. As soon as the user’s phone pickups a new Wifi location, the auto-join feature is automatically activated. This is important to note for user’s that believe their toggle action has effectively cut off all wireless internet connections.
While this flaw is not an enormous deal, it could still spell trouble for some iOS users. With this in mind, if you are in a situation where you need to ensure that all wireless internet connections are cut off, your best bet is to navigate to your settings and disable your connection from there.
October 13, 2017
Security
Top Laptops of 2017
We all know how quickly the IT and technology world changes. New innovations mean new devices and at ICC, we really are your full-service IT company. Whether you need technical support, new infrastructure or technology recommendations, we’re here to help.
Buying new equipment can be a daunting process and we want to guide you through the decision. An investment in technology is an investment in your business and should be worth your energy. Here’s a peak into some laptops that have stood out in 2017.
Best Overall Ultrabook: HP Spectre 13.3
The ultrabook is quickly becoming a dominant force in the laptop industry. Their lightweight body, tough exteriors and cloud integration capabilities are evening the laptop playing field and allow your business to be efficient while on the job. They still have their weaknesses, but our experts can help find the ultrabook device that will work best for your needs.
HP’s newest version of the Spectre is equipped with a 15-watt i7 processor. Adding in their two Thunderbolt 3 ports and USB-C port, its easy to see why the HP Specre 13.3 has earned top reviews. Their capabilities are endless and their design is sleek.
Best Overall MacBook: Apple MacBook 12 inch
This year’s version of Apple’s MacBook takes sleek, brushed metal design to another level. Fitted with a 12-inch screen, the resolution is ultimately unchanged. However, boasting a 1.2 GHz Intel Core m3-7Y32 CPI and 256GB SSD, the Macbook offers performance that rivals that of its highest competitors. This year’s version has also compounded on the keyboard structure of last year’s, offering users a better overall experience when using the device. We typically recommend that your business operate on PC devices due to security, mobility and compatibility reasons. The programs that are HIPAA compliant are more often than not built for PC devices and infrastructure. If your company is insistent on using an Apple product, let our experts guide you through which products will work best for your needs.
Best Overall 2-in-1 Laptop: Asus Zenbook Flip UX360
In today’s laptop landscape, it is impossible to create a list of the best laptops of the year without inevitably listing a convertible laptop. Long gone are the days when these 2-in-1 machines were perceived as low-power gimmicks. Now, there is a substantial demand and an increase in use capabilities for these machines, and the Asus Zenbook Flip UX360 delivers on many fronts.
Compared to their performance, their price points are absolutely affordable. We’ve seen them used in industries across the board like dental offices, medical facilities, executive meetings and daily use. The 8GB DDR3L RAM and 13.3 inch, 1920×1080 screen propels this device past its predecessors and into the top class. Combine that with 512 GB SSD storage and it quickly becomes evident why this machine has stood out in the current 2-in-1 market.
These three devices are just a few of many on the market that can perform and operate in a way that makes sense for you. Like we mentioned, having a device that works best for your business is crucial to your overall success and we are here to guide you. We can offer you expert advice on your next laptop, phone system, email network and more so that your IT is made easy with ICC.
Give us a call at (877) 463-0781 or email sales@iccusa.net for more information.
September 12, 2017
IT News
Meet our team and get to know a little bit more about Bryan!
In a nutshell, my job entails: Fixing anything that comes my way: Servers, workstations, applications. I love building new solutions as well.
How long you’ve been with ICC: I started working at ICC a little over a year and a half ago.
Hometown: Spottswood, VA (You’ve never heard of it)
In my spare time, you can find me: Reading, writing, and playing with my family.
Pets? A six month old rescue pup, and a six year old goldfish.
If you looked at my desk right now, you’d find: A bunch of old computer parts, carefully stacked.
Fun facts about me: In my spare time, I write sci-fi comic books.
Preferred OS? I like Windows 10 just fine.
Connect with me on LinkedIn here!
August 21, 2017
ICC Team Members
IT Cloud Hosting presents our clients with the opportunity to streamline all their data needs. By shifting to cloud based hosting, businesses can reduce their capital expenditures, boost efficiency and have simpler access to data from any place at any time. ICC’s priority is to meet our client’s needs and help create efficiencies whenever possible.
Included in our IT Cloud Hosting Services is a Hosted Exchange/Office 365 Email system. This system is fully functional and multi-device friendly. As with all ICC services, security is a key component of our Cloud Email System. To manage and monitor the status of antivirus, Cloud Antivirus is also included with our IT Cloud Hosting Services.
If consistency or data loss is a concern for your company regarding cloud based services then ICC’s Offsite Backup System should put those worries to rest. This component of our IT Cloud Hosting Services allows your company to send and store all data to an offsite, certified data center. We also provide the opportunity for clients to use Secure File Collaboration, which allows your business to share files on a secure Cloud platform.
Website Hosting and Hosted Servers are at the core of our IT Cloud Hosting Services. As servers continue to move towards the Cloud, allow ICC to help determine a qualified host and configure appropriate applications to meet your IT needs.
An additional benefit of our IT Cloud Hosting Services is our Virtualization component. This infrastructure helps balance issues relating to team members using personal devices in the office. It reduces the need for work-specific devices to be distributed to employees and allows them to use their own personal devices, increasing the flexibility, scalability and efficiency of staff.
Give us a call at 970-419-0602 to keep your online security and IT maintenance in prime condition.
August 8, 2017
IT Services
ICC offers a complete range of services to assist with all your business’s IT needs. Our number one goal is to ensure that you and your company’s technological needs are met and that maximum safety is maintained online. We’d like to take a moment to discuss one of our many services so that we may better assist you in the future: IT audits.
When ICC does an IT audit, we do a complete analysis of the functionality and reliability of your infrastructure. Once we evaluate the results, we can share important information about your IT situation and see which areas need to be improved.
If you’re wondering whether or not your company could benefit from a professional IT audit, here are a few questions to ask yourself:
When your business is expanding quickly and managing large volumes of content, it is important to ensure that your IT and technology infrastructure are working as quickly and efficiently as your business. ICC will cover all your technology bases to make an accurate evaluation when performing an IT audit. Each audit includes:
Give us a call at 970-419-0602 to keep your online security and IT maintenance in prime condition.
July 20, 2017
IT Services
Password managers can be extremely effective, but should you use them to keep track of your passwords for everything? Probably not. While these systems have proven to be safe, using them to store sensitive information like bank account logins, personal identification information or company records is not recommended.
Here is a quick guide to all things password protected or managed:
Keeping certain account passwords logged in certified, password management systems won’t necessarily harm your business. Be sure that you and your employees are aware of your internal security system for how your business protects the keys to your content.
Contact us today for recommendations on where and how to store your passwords.
July 14, 2017
Education