Support Now

Thursday, February 18, 2016

Beware of new Locky ransomware

There is a new ransomware called "Locky" that is on the attack.  Please make sure your entire office is aware of it.  It comes in the form of a Word Attachment.  If you are not expecting an email with a Word Attachment call and ask the sender if it in fact came from them and was it actually meant for you. 

What the "Locky" ransomware does is rename your files, scrambles them and then encrypts them. Locky also removes any Volume Snapshot Service (VSS) files also known as shadow copies that you may have.  Shadow copies are Windows way of making backup snapshots.

Once seeded on a host, the ransomware can spread quickly across your network.  Then when it is ready, it instructs you via a screen to pay a ransom to get your data back. 

The best defense is a good offense.  

  • Make sure you have a good backup solution.
  • Check your backup and make sure you have a good backup every day.
  • Make sure your staff does NOT click on random emails that they were not expecting.  If something looks suspicious, it probably is suspicious.
  • Make sure you have a good Antivirus and it updates automatically.

Friday, February 12, 2016

Microsoft's Patch Tuesday for February, 2016

As you know every first Tuesday of the month is patch Tuesday for Microsoft.  This month Microsoft released 13 bulletins, 6 of which they rate critical.   These patches apply to all versions of Internet Explorer, operating systems and other Microsoft products.

Many of these updates affect Windows 8.1 and Windows 10.   A lot of updates involve Internet Explorer or Edge which is a part of Windows 10. 

The complete list of updates can be found by clicking Here.  If windows updates are enabled on your computer, your machine should update automatically.  As always, if you have any questions, please feel free to contact our office at 516-762-0155


Tuesday, February 9, 2016

Emergency Java Update


Java which is from the US based software company Oracle has today released an emergency patch for Java in an effort to fix a flaw that happens during installation on Windows platforms. 

This vulnerability could cause an exploitation of a critical vulnerability allowing someone to manipulate a user into going to a website containing malicious code and files and downloading them to the user’s system before Java gets installed.   This applies to Java versions 6, 7 or 8. 

Basically this site appears to be a Java site even though a user may be nowhere near the actual Java site.

Because the exposure exists only during the installation process, users need not upgrade existing Java installations to address the vulnerability. However, Java users who have downloaded any old version of Java prior to 6u113, 7u97 or 8u73, should discard these old downloads and replace them with 6u113, 7u97 or 8u73 or later.

Java home users should visit to check that they are using the most recent version of Java. 

← Newer1 2 3Older →

© 2018 Glasser Tech
366 S Oyster Bay Rd., Hicksville, NY 11801
| Phone: 516-762-0155
About Glasser Tech LLC | Our Services | Solutions | Testimonials

Law Firm Website Design by
Amicus Creative