Did someone that you know just lose their computer guy? Be a hero and recommend Cyber Tech Cafe :)

Uncategorized
In the past 3 days, we've had a number of folks tell us that they or someone that they know is 'losing their computer guy' and wanted to know what we did and if we may be able to take over.  I wanted to take a moment to confirm that we are accepting new clients and give some quick details about what we do / can do:   - Residential computer support - Customers can drop computers by our shop on Main Street in Cartersville for repair or we can come on site.  We can take care of anything from hardware repair and upgrades, software installation or just basic tune-ups (which are $35 and typical turn around is 2 to 3 day)   - Business computer and network support -…
Read More

October is National Cyber Security Awareness Month

Uncategorized
October is National Cyber Security Awareness Month.   Ok, before you get the glazed over eyes, bear with me a minute here.  This is going to be another of those 'you should do your updates' posts, but my hope is that it's also a reminder of the seriousness of [a lack of] security on your personal computer.  One thing that we hear over and over is something like 'Oh, I don't do my banking online, so I'm not too worried about it'.  The truth is though, attackers rarely want the $12.00US that you've managed to amass in your checking account (or the $13.00US that you've been able to scrape togeher in savings), they want to use  your computer to rip other folks off, or to host child porn, or to…
Read More

New vulnerability in Java could impact 1 billion computers

Uncategorized
According to this article, Security Explorations has identified a new vulnerability (they are calling it a zero day but, as I understand it, it's just a proof of concept at this point) in the latest version of Java.  There's ample detail in the linked story but I wanted to touch base on just two key points: What does this mean for me?  Basically, if you have Java installed on your computer, even the latest version, an attacker can create a program that, when you run it, will give the attacker the ability to control your computer with the same rights and permissions that you have.  If you are a limited user, the attacker will be able to operate as a limited user.  If you are an administrator on your computer (or…
Read More

Forging new relationships

Uncategorized
Our focus on relationships is a key to our company's success Customer Relationships Vendor Relationships New Relationships Customer Relationships We understand and appreciate that there are a lot of options for technology support and work hard to be a resource for our clients, not just a computer or network support company. Approach any new opportunity as a long term engagement rather than short term project Vendor Relationships Extensive list of vendors from previous experience Long standing relationships with existing account managers Ability to 'pick' proven vendors from a wide range of choices based on field experience with the products and / or services and long standing relationships with account managers.  Ability to leverage these relationships to bring enterprise class products, services and pricing to small business and even residential clients. New Relationships…
Read More

New twist on Apple / Mac base malware that doesn’t like Wireshark

Uncategorized
There's a new variant of the Imuler malware for Apple / Mac computers that apparently doesn't like Wireshark.  Not really big news but it is worth noting and is a good reminder that just having a Mac doesn't make you immune from viruses, malware, etc. Additional Information Imuler.a - http://www.f-secure.com/v-descs/backdoor_osx_imuler_a.shtml Imuler.b - http://www.f-secure.com/weblog/archives/00002432.html
Read More

Beware of snake oil salesmen using fear to capitalize on the GoDaddy outage

Uncategorized
I have received *several* emails since news of the GoDaddy attack yesterday from vendors trying to use fear to sell products or services.  One of the biggest tools that they have used is claiming that a 'hacker' hacked GoDaddy and took the site down.  The story that I have seen in each of these stories was that an 'evil hacker' broke into GoDaddy's servers and 'did bad things'.  Immediately following is typically some product or service that the vendor has that can protect potential victims from the same fate.  Every one of these email warnings that I have seen to date has been snake oil, nothing more.  It's important to understand what most likely happened and learn a lesson from that. What we know so far is: Yesterday, at approximately…
Read More

What’s up with the GoDaddy outage and how does it affect me?

Uncategorized
What's up with the GoDaddy outage?  It's still early on in the game to say for sure but, at this point, it seems as though the group Anonymous has taken the GoDaddy site and services offline.  I have not seen any indication at this point that there was a breach or exposure of user data, but that's not to say that we won't hear of that later on.  Some other sites that have fallen to Anonymous include The Pirate Bay, Sony and others.  This email is kindof thrown together (and I apologize for that), but it seemed important to get the information out there sooner rather than later. How does it affect me and what are my options?  That will depend heavily on what GoDaddy services you use.  I've made…
Read More

GoDaddy Down

Uncategorized
If you are hosting your website and / or email with GoDaddy, you are most likely experiencing issues right now.  According to this article from CBS News (not really a tech news source, but they seem to have nailed this), Anonymous is taking responsibility for taking the site down.
Read More

New iteration of the Zeus crimeware toolkit hits the market as Gameover

Uncategorized
According to this article from F-Secure, there's a new version of the Zeus crimeware that's making the rounds that's evolved yet again, possibly from the source code for version 2.0.8.9 was leaked.  According to the article (and the threat report that it notes as it's source), this new iteration of the Zeus code makes extensive use of a peer-to-peer network to further complicate tracking down and eliminate. Article is available here. Threat report is available here.
Read More

Computer criminal sentenced to 30 months in prison followed by 3 years of supervised release for renting botnet

Uncategorized
We've spoken many, many times about botnets and the many uses cyber criminals have for them and try to make the discussions as realistic as possible but it's always good to hear an instance where it's happening in 'real life'.  According to this article at the BBC, that's exactly what happened with Joshua Schichtel of Phoenix, Arizona.  Schichtel was convicted of renting his botnet of 72,000 computers for $1,500 to an unnamed buyer.  There's additional information in the article.  Suffice it to say, just because you don't 'do your banking online', that doesn't mean that your computer isn't a target.  Update.  Have good antivirus.  Update.  Don't do stupid things.  Update.  Then, update. "In a brief statement about the case, the US Department of Justice said Schichtel pleaded guilty to one count of…
Read More