Archive

Archive for August, 2011

Computer Support – FREE PC Help Online

Free computer support & help – with our 12 month support plan online PC help reliable computer tech support.

We also offer remote PC support and a monthly health checks

Get FREE tech support with our plan today!

Sign up for computer support plan

Advertisements

Computer Health Check – PC Health Check Up £15

PC Health Check – When was the last time you had a Pc health check?  Have you ever had one?

Computer health checks are essential to keep your machine running at optimum performance

All support via remote technician

Please visit our website for more details http://www.it-solutions-site.co.uk/support.html

Don’t hesitate to contact us if you require help and support

Kind Regards

IT Solutions Site Support Team

UK Computer Repair – Tech Support Plan – Call 02921-253536

 

Need help with your computer? you can now get 12 Month Computer Maintenance Support direct from our website for just £69.00 for a 1 year plan per computer.

Why have the 12 month maintenance support? We will schedule Monthly health checks and make sure your computer is covered against threats and malicious software.

All support via remote technician.

Call us anytime in 12 months for help and advice regarding your computer FREE

Buy here: PC Security Services & Health Check http://www.it-solutions-site.co.uk/Support.html

We also do laptop and computer repairs contact us today as we are always happy to help.

Need an upgrade? contact us today!

Kind Regards

IT Solutions Support Team

Koobface Worm Wriggles Out of Social Networks and into BitTorrent

How many times have you been told that when one door closes, another one opens? Probably a whole bunch, but what no one ever bothered to disclose is that this idiom isn’t always an inspirational motivator to carry on with life and can sometimes apply to those with less scrupulous intentions. Case in point: a security firm warns that the Koobface worm is no longer spreading through social networks and is now slithering its way across BitTorrent sites.

According to Trend Micro’s research, the Koobface botnet is spreading through Trojanized torrent files and/or a new Koobface component called tor2.exe. Trend Micro detects the latter as WORM_KOOBFACE.AV, and once a user executes the file, the worm sends an HTTP request to its C&C to download a torrent file. That’s the first step. The next step involves firing up uTorrent unbeknownst to the user as a background process and proceeding to grab the dirty files referenced in the torrent file.

“Unwitting users looking for pirated copies of popular software such as games, PC utilities, or productivity software are in for a surprise, as these Trojanized software torrents are found on popular torrent sites,” Trend Micro warns.

Trend Micro says it’s discovered the Koobface worm lurking in pirated copies of WinRAR, Adobe Lightroom, Dark Ritual, and many more. Those who think they’re safe to download pirated software because they’re sitting behind an AV wall should think again. Trend Micro says Koobface uses several binaries and encryption to avoid detection by AV programs.

Back to School Special Offer – Buy VIPRE Antivirus get TuneUp Utilities FREE!

VIPRE Antivirus is the light-weight and highly effective antivirus program that does not slow down your PC. Using next-generation technology, VIPRE protects your computer from all types of malware threats including viruses, adware, spyware, worms, rootkits, and more.
And VIPRE is supported by a world-class team of experts, with toll-free support and free malware removal assistance! Get VIPRE today and get the peace of mind of the world’s most-loved antivirus product!

Buy today and get TuneUp Utilities FREE  www.it-solutions-site.co.uk/VIPRE-Antivirus.html

Speedy Malware Infects More than 6 Million Web Pages

In less than two weeks, a malware injection that targets e-commerce Web pages has ballooned from 90,000 infected pages to more than 6 million.

The malware, called willysy, exploits a vulnerability in a popular online merchant platform, osCommerce, according to Web application security provider Armorize, of San Francisco.

When the company initially reported the injection on July 24, it found 90,000 infected pages. When it took another look at the malware on August 3, it found the injection had spread to some 6.3 million pages.

Although the identity of the perpetrators of the attacks by the malware could not be identified by Armorize, the company did trace the forays to eight IP addresses, all located in the Ukraine.

The attacks exploit three known vulnerabilities in version 2.2 of osCommerce. The exploits allow the attackers to place an invisible frame (iFrame) on the page and then inject malicious code (JavaScript) into the page, where it will infect visitors to the online store.

Once the infection makes it to shopper’s computer, it targets vulnerabilities in Java, Adobe Reader, Windows Help Center and Internet Explorer. Although the flaws in those programs targeted by the infection are known and have been patched, the attackers are betting that the user hasn’t patched all the programs.

Even the exploitation of osCommerce itself depends on lax patch management by the shopping site, since the holes in the program used by the attackers were patched in version 2.3 of the software released in November of last year. Since that time, two versions of the offering have been released, 2.3.1 and 3.0.1.

According to osCommerce, the open source software is used by some 249,000 store owners, developers, service providers and enthusiasts.

Attacks like the one discovered by Armorize can be especially harmful to small and medium-size businesses (SMB), asserts Frank Kenney, a former Gartner analyst and vice president of Global Strategy at Ipswitch, a file transfer security company in Lexington.

Willysy’s progress (click to enlarge)Those companies typically don’t have the financial resources of larger firms so they’re attracted to open source programs like osCommerce and use off-the-shelf software in their operations. “Whenever you use off-the-shelf software, you have to understand there are data issues and all types of security vulnerabilities that exist.

While the makers of off-the-shelf software patch their programs often, he continued, the business still has to invest in the resources to insure that proper patch work is done.

Such lack of diligence can hurt a business in the long run, because security breaches can invite scrutiny from credit card companies, he explained. A credit card company may refuse to allow the business to use its services until it shows a certain level of security compliance that is out of the reach of the business from a financial or time and resource point of view.