SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page
Huawei 3G/4G USB sticks put users’ security at risk

Huawei 3G/4G USB sticks put users’ security at risk

by Joseph Forbes | Mar 28, 2013 | Blog Entry, HACKING, HARDWARE, INTERNET, Internet Scam Notices

The security presentation had a provocative title Source: Uli Ries At the Black Hat Europe conference that is currently in progress, Russian security expert Nikita Tarakanov has presented the results of his analysis of the driver software that Huawei ships with its...
Ramnit – The renewed bot in town

Ramnit – The renewed bot in town

by Joseph Forbes | Mar 25, 2013 | HACKING, KnowledgeBase (KB), Microsoft's Malware Protection Center, SECURITY, Technicals

Ramnit is one of the most prevalent threat families still active in the wild today. Two years ago, we talked about the infection method it uses in the Microsoft Malware Protection Center (MMPC) blog Little red Ramnit: My what big eyes you have, Grandma! by Scott...
MSRT March ’13 – Wecykler

MSRT March ’13 – Wecykler

by Joseph Forbes | Mar 13, 2013 | HACKING, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY

Wecykler is a family of worms, that shares some similarities with the Worm:Win32/Autorun family, in that it takes advantage of removable drives attached to an infected system in order to propagate to other machines. They target users’ familiarity with the...

When fake malware phones

by Joseph Forbes | Mar 12, 2013 | Blog Entry, Internet Scam Notices, SECURITY, Technical Support, Technicals

Below is written by a Microsoft MMPC person, to which I had to copy it because it is verbatium the same situation I encountered awhile back.  The FTC and FCC have made it clear that these are scams, even going as far as shutting down the money flow for these scams to...
Comcast Punishes BitTorrent Pirates With Browser Hijack

Comcast Punishes BitTorrent Pirates With Browser Hijack

by Joseph Forbes | Mar 6, 2013 | INTERNET, Internet Scam Notices, LAW, MONEY, NERD NEWS, POLITICAL, Technical Support, Technicals

Comcast revealed today how it will deal with customers who receive multiple warnings under the newly launched “six-strikes” anti-piracy system. After four alerts the ISP will “hijack” web-browsers of suspected serial pirates with a persistent pop-up notification,...

Identity Theft Attempt In Progress; How To Respond?

by Joseph Forbes | Mar 5, 2013 | Blog Entry, Data Recovery, HACKING, INTERNET, Internet Scam Notices, PRIVACY, SECURITY, Technicals

from the burrs-on-the-heel-of-the-foot-would-be-mercy dept. It appears that two weeks ago my email address got into the wrong database. Since that time there have been continuing attempts to access my accounts and create new accounts in my name. I have received emails...
« Older Entries
Next Entries »

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy