Author Archive

Why do they still use Windows XP?

A lot of Large organizations still use Microsoft Windows XP.

Riddled with security vulnerabilities, is there really any excuse for running an obsolete operating system?


Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Why you need ransomware protection

Protect your computers …
MALWAREBYTES 3 & ESET Internet Security

MalwareWhy you need ransomware protection
In 2016, the U.S. Department of Justice revealed that the Internet Crime Complaint Center (IC3) had received nearly 7,700 public complaints regarding ransomware since 2005, totaling $57.6 million in damages. Those damages include ransoms paid—generally $200 to $10,000, according to the FBI—as well as costs incurred in dealing with the attack and estimated value of data lost. In 2015 alone, victims paid over $24 million across nearly 2,500 cases reported to the IC3.

Reports of two massive, global ransomware attacks are dominating the news. As workers in Europe are heading home for the weekend, ransomware is shutting down their systems. Here’s what we know so far.

The ransomware is spread using a known, and patched, vulnerability (MS17-010) that came from a leaked NSA set of exploits that we reported on our blog in April. Our research shows the encryption is done with RSA-2048 encryption. That means that decryption will be next to impossible, unless the coders have made a mistake that we haven’t found yet.

The demanded ransom of $300 per device and the potential risks to the public that come with the targets being big utility and healthcare companies seem to be in shrill contrast. We can only hope that the companies that were hit will be able to get their backups deployed quickly and can start the recovery from this cyberattack.

Computer DangerProtection
Consumers and businesses alike should be sure their systems and software are updated with all current patches in order to stop the spread of infection. Both our consumer product, Malwarebytes, and our business product, Malwarebytes Endpoint Security, already provide proactive protection against this threat. Malwarebytes signature-less anti-exploit technology blocks the infection vector, while our anti-malware technology blocks the payload pre-execution. Our anti-ransomware technology prevents users’ files from being encrypted and will stop any future unknown ransomware variants. Malwarebytes combines multiple security layers with the best-informed telemetry to block an attacker at every stage of the kill chain.

https://www.malwarebytes.com/

https://www.eset.com/us/

JungleComputer.com

Another WILD Software Recommendation

Store passwords and more with LockBox …
SecurityA secure, digital vault for protecting your private details.

You can generate ultra-secure passwords, using stronger, more complicated passwords is more important now than ever because “password123” just won’t do anymore!

Save login credentials, add notes, links, account info, registrations details, files and store them privately and securely.

  • Protect everything in your digital vault using 448-bit encryption.
  • Save logins, account info, important files, and other private data.
  • Quickly generate strong and secure passwords.
  • Safely share info with other LockBox users in your trusted network.
  • Only $29.00. – Wow!

http://www.coffeecup.com/lockbox/

Order now

So What Is Malware

Jungle ComputerSo what is malware? It comes in a bewildering variety of forms. Computer viruses are probably the most familiar type of malware so named because they spread by making copies of themselves. Worms have a similar property. Other types of malware, such as spyware, are named for what they do: In the case of spyware, it transmits personal information, such as credit card numbers.
So after asking “What is malware?” the next logical questions are, “who is creating it, and why?” The days when most malware was created by teenage pranksters are long gone. Malware today is largely designed by and for professional criminals.

These criminals may employ a variety of sophisticated tactics. In some cases, as technology site Public CIO notes, cybercriminals have even “locked up” computer data making the information inaccessible then demanded ransom from the users to get that data back.

But the main risk that cyber criminals pose to heavy computer users is stealing online banking information such as banking and credit card accounts and passwords. The criminal hackers who steal this information may then use it to drain your account or run up fraudulent credit card bills in your name. Or they may sell your account information on the black market, where this confidential information fetches a good price.

learn more


Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Pennsylvania Contractor License:
# PA114006