Sterling IT Offering Free Technology Training for you and your company.

It is important to ensure that you, your staff and company, are aware of increasing technology threats, best practice and usage of systems. This also includes working closely with Sterling IT and understanding new and upcoming technologies. Some items we can include are new and ongoing threats, especially in Australia.

Please see this link from the Aust Govt (Aust Institute of Criminology) which outlines a lot of definition on just some threats in Australia and around the world.

If you and your staff are aware of the threats to your business, hopefully the damage will be little or none.

How can Sterling IT Help YOU ?
We are offering FREE training to all our Managed Service Clients (SITMS). All you need to do is click here and provide a couple of dates and times, and we will do our best to accommodate these.

Not a Managed Customer, no worries. Contact our office, ask for Mark and we will be happy to arrange a quotation for you.

 

Thousands of Aussies hit by Westpac trojan

Source CRN.COM.AU
By Darren Pauli on Mar 15, 2013 12:30 PM

Huge phishing campaign hits inboxes.

 

Trojan-laden phishing emails bearing the Westpac name have deluged hundreds of thousands of Australian inbox’s this morning.

The trojan backdoor slipped past almost all anti-virus engines placing victims at heightened risk of infection.

Specific details of the malware or its method of obfuscation are not yet known. However Fortinet and DrWeb today classified the sample as W32/Kryptik.KZ!tr and BackDoor.Slym.1498 respectively.

Continue reading “Thousands of Aussies hit by Westpac trojan”

Apple hit by hackers

Exploited Java flaw.

Apple was recently attacked by hackers who infected the Macs of some employees, in the widest known cyber attacks against Apple-made computers to date.

Unknown hackers infected the computers of some Apple workers when they visited a website for software developers that had been infected with malicious software. The malware had been designed to attack Mac computers, the company said in a statement.

The same software, which infected Macs by exploiting a flaw in a version of Oracle’s Java software used as a plug-in on web browsers, was used to launch attacks against Facebook this week.

The malware was also employed in attacks against Mac computers used by “other companies,” Apple said, without elaborating on the scale of the assault.

But a person briefed on the investigation into the attacks said that hundreds of companies, including defense contractors, had been infected with the same malicious software, or malware.

The attacks mark the highest-profile cyber attacks to date on businesses running Mac computers. Hackers have traditionally focused on attacking machines running the Windows operating system, though they have gradually turned their attention to Apple products over the past couple of years as the company gained market share over Microsoft.

“This is the first really big attack on Macs,” said the source, who declined to be identified. “Apple has more on its hands than the attack on itself.”

National security

Cyber-security attacks have been on the rise. In last week’s State of the Union address, US President Barack Obama issued an executive order seeking better protection of the country’s critical infrastructure from cyber attacks.

Over the weekend, cyber-security specialists Mandiant reported that a secretive Chinese military unit was believed to have orchestrated a series of attacks on US companies, which Beijing has strongly denied.

White House spokesman Jay Carney told reporters on Tuesday that the Obama administration has repeatedly taken up its concerns about Chinese cyber-theft with Beijing, including the country’s military. There was no indication as to whether the group described by Mandiant was involved in the attacks described by Apple and Facebook.

An Apple spokesman declined to specify how many companies had been breached in the campaign targeting Macs.

“Apple has identified malware which infected a limited number of Mac systems through a vulnerability in the Java plug-in for browsers. The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers,” the statement said.

“We identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple,” it continued.

The statement said Apple was working closely with law enforcement to find the culprits, but the spokesman would not elaborate. The Federal Bureau of Investigation declined to comment.

Apple said it plans to release a piece of software today, which it said customers can use to identify and repair Macs infected with the malware used in the attacks.

 

Source : https://www.crn.com.au/News/333756,apple-hit-by-hackers.aspx?eid=4&edate=20130220&utm_source=20130220&utm_medium=newsletter&utm_campaign=daily_newsletter

By Jim Finkle and Joseph Menn on Feb 20, 2013 8:03 AM (42 minutes ago)
Filed under Security

Important security updates for iPads, iPhones and iPod touch devices VER 6.1 iOS

On 29 January 2013, Apple released an update (6.1) for its popular iOS operating system, used by mobile devices including the iPhone, iPad and iPod touch.

The update brings some new functionality, but importantly, it also addresses a number of security concerns.

These vulnerabilities could be exploited by someone with malicious intent. You are advised to update your devices as soon as possible. Updates are generally available for the iPhone 3GS and later, iPod Touch (4th generation) and later, iPad 2 and later.

More detail about the security aspect of the update is available on Apple’s website.
https://support.apple.com/kb/HT5642

Advertising Identifier Reset Button
Also of note in this update is Apple’s introduction of a button to reset the device’s Advertising Identifier. It means you’ll be able to better control the ability of advertisers to track your device and target their ads accordingly. You can find this under Settings > General > About > Advertising

 

How to update your iOS device:

https://support.apple.com/kb/HT4623

Apple provides the following information about this update:
https://support.apple.com/kb/HT5642

Forget Hotmail.com and go to Outlook.com

Microsoft yesterday showed off its new cloud-based personal email application Outlook.com, its first personal email client since it launched Hotmail in 1996.

Outlook.com runs alongside the new Outlook desktop application and it uses Exchange ActiveSync to power email across various devices.

Microsoft has included free Office Web Apps – Word, Powerpoint, Excel and OneNote – within the email client. Emails are automatically sorted depending on the sender, while SkyDrive is integrated into Outlook.com for extra file size.

The service offers social media integration with Facebook, Twitter, LinkedIn and Google. Personal email comes with photos of friends, recent status updates and Tweets as well as the ability to chat and video call. Skype is in line for future integration.

Microsoft was keen to tout its security credentials to assuage any fears about privacy with the new social media integration.

“We don’t scan your email content or attachments and sell this information to advertisers or any other company, and we don’t show ads in personal conversations,” it said in a blog post.

“We let you decide whether to connect your account to social networks, and which ones you want to use – and you’re in control of who you friend or follow.”

The release marks the first step in the phasing out of the Hotmail service. Hotmail users, and others, can upgrade to Outlook.com, and the accompanying @outlook.com email address, from today.

OSX AND WINDOWS : DNS Changer to impact on 9 July 2012-Alert Services (Advisory)

Approximately 10,000 Australian internet users are currently infected with DNS Changer (malware).
If your computer is infected you need to remove it. If you don’t remove it by 9 July 2012, you won’t be able to connect to the internet.
DNSChanger is malicious software (malware) that may have been installed on your computer without your knowledge.

How to check you’re safe?

The Australian Communications and Media Authority, CERTAustralia and the Department of Broadband, Communications and the Digital Economy have collaborated to develop a diagnostic website that, in most cases, shows you whether or not you are infected with DNSChanger. This website is dns-ok.gov.au. It only takes a second to check.

If you are infected, dns-ok.gov.au provides links to tools and detailed documentation that may help you remove the infection.