Remote Support: Download the client for Client for Windows or for Client for MAC
Phone : (02) 800 777 29
Report your issue via:

Ransom ware: Simple ways to avoiding it.

Posted by on Nov 18, 2016 in Blog | 0 comments

Ransom ware has to be the highest risk associated to any personal or business computer data in this decade. It is simple in its method and sinister in its attack. How’s it work? It arrives as an email with an attachment, once opened it runs a program then proceeds to encrypt all data files on the computer or located networks. The encryption is so high it would take too long to crack by force. Who gets these emails? Even we get ransom ware emails, they are generally emails directed to you and relate to everyday services like delivery of goods or service providers like Telstra, they are now so well constructed that a quick glance its easy to miss the hidden dangers within. What to look for: Simple approach: Ransom ware are primarily emails with attachments. If its not expected it should be assumed its possible ransom ware. If its expected? that is your expecting a delivery of goods, or you have a Telstra account and so might get emails from these service providers about your goods and services. When these providers contact you they don’t send attachments. They will always want you to login to their websites if more action from you is required. If its from them and has an attachment delete it. If not expected delete it. If you delete the good one they will normally contact you in a different method next time. Complex approach: Ransom ware is all about hiding their true nature, they want you to believe they are someone they are not. The key to a Ransom ware email is in its attachment,so checking out the email and who its from is harmless, but don’t click links within the email or touch the attachment. If you mouse over email addresses and links of respective service provider you often will see the hidden address or URL is not from that provider. Eg Australia Post delivery email might have an address like , URL’s will have similar unusual addresses. If unsure reply to the email this will generally get no response which will confirm the nature.  You can just delete it once you see the strange addresses. Also often the subject is already been flagged somewhere on Google as Ransom ware so you can Google “(subject of email) is this ransom ware?” All the best. Adam...

Read More

Don’t let Google punish you for a Non Mobile-Friendly Site!

Posted by on May 13, 2015 in Blog | 0 comments

From April 21st, websites that look and perform better on websites are appearing higher on mobile search results. Google has even created a Mobile-Friendly test where you can see if your (and your competitor’s) website passes the list of criteria. Google changes will give the users relevant and high quality search results that are optimized for their devices. Why did my site not pass? The main reasons why your website wouldn’t pass the test is if the text can’t be read without zooming it, the content doesn’t fit the screen horizontally, you can’t click on links or buttons (too small) or your website is using Flash which is a non-mobile friendly software. My site didn’t pass the test, what should I do? We are here to help! Contact us to see how we can help to make your current website mobile-friendly or to develop a whole new and fresh website for...

Read More

Laws and Ethics Can’t Keep Pace with Technology

Posted by on Feb 2, 2015 in Blog | 0 comments

  Codes we live by, laws we follow, and computers that move too fast to care.   by Vivek Wadhwa Employers can get into legal trouble if they ask interviewees about their religion, sexual preference, or political affiliation. Yet they can use social media to filter out job applicants based on their beliefs, looks, and habits. Laws forbid lenders from discriminating on the basis of race, gender, and sexuality. Yet they can refuse to give a loan to people whose Facebook friends have bad payment histories, if their work histories on LinkedIn don’t match their bios on Facebook, or if a computer algorithm judges them to be socially undesirable. These regulatory gaps exist because laws have not kept up with advances in technology. The gaps are getting wider as technology advances ever more rapidly. And it’s not just in employment and lending—the same is happening in every domain that technology touches. “That is how it must be, because law is, at its best and most legitimate—in the words of Gandhi—‘codified ethics,’ ” says Preeta Bansal, a former general counsel in the White House. She explains that effective laws and standards of ethics are guidelines accepted by members of a society, and that these require the development of a social consensus. Take the development of copyright laws, which followed the creation of the printing press. When first introduced in the 1400s, the printing press was disruptive to political and religious elites because it allowed knowledge to spread and experiments to be shared. It helped spur the decline of the Holy Roman Empire, through the spread of Protestant writings; the rise of nationalism and nation-states, due to rising cultural self-awareness; and eventually the Renaissance. Debates about the ownership of ideas raged for about 300 years before the first statutes were enacted by Great Britain. Similarly, the steam engine, the mass production of steel, and the building of railroads in the 18th and 19th centuries led to the development of intangible property rights and contract law. These were based on cases involving property over track, tort liability for damage to cattle and employees, and eminent domain (the power of the state to forcibly acquire land for public utility). Our laws and ethical practices have evolved over centuries. Today, technology is on an exponential curve and is touching practically everyone—everywhere. Changes of a magnitude that once took centuries now happen in decades, sometimes in years. Not long ago, Facebook was a dorm-room dating site, mobile phones were for the ultra-rich, drones were multimillion-dollar war machines, and supercomputers were for secret government research. Today, hobbyists can build drones and poor villagers in India access Facebook accounts on smartphones that have more computing power than...

Read More

Mac OS X in the Crosshairs – 18 Malware Scanners Put to the Test

Posted by on Oct 3, 2014 in Blog | 0 comments

For a long time, Mac OS users believed they were safe, that there was no malware for their system. As recent as April 2012 and the flashback attack on over 700,000 Apple PCs, it is clear that attackers also have the Macintosh in their crosshairs. AV-TEST has tested 18 antivirus products for Mac and finds some of them truly superb – others are really horrible. Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014). Security Suites for Mac OS X: A few of the products slow down the system when copying. The strong detection package from Bitdefender hardly slows down the system at all (AV-TEST August 2014). Bitdefender for Mac: The security package detected all the malware sought in the test and, in doing so, hardly strained the System. avast! Free Antivirus for Mac: The freeware for Mac users did a good job, though not a great job, at recognizing the intruders. The universe of known threats for the Mac OS is still not terribly large. This easily leads to the assumption that Mac users don’t have to worry about the topic of security software. What’s more, tests published on the Web with 1 to 20 known Mac intruders, all of which were naturally detected, don’t make the situation any better. In the meantime, however, there are already a few hundred current threats specially targeting the Mac that in particular seek to exploit the security gaps of software add-ons. Everyone says: Mac OS X can protect itself To be sure, since OS X 10.7 or 10.8 there are some good internal security systems such as Gatekeeper, Sandbox and Xprotect. Xprotect, for example, checks the mail and browser downloads. USB sticks, CDs or DVDs, however, are not inspected. The Flashback attack of 2012 caught many users flat-footed, and over 700,000 Macs were infected in a flash. Up to that time, there was a consensus that an antivirus application for a Mac was merely ballast. An opinion that persists to this day, except probably among the some 700,000 Flashback victims. 18 Security suites for Mac put to the test For the maximum protection under OS X 10.9, the AV-TEST lab inspected 18 currently available Internet security suites in terms of their protection function, system load and false positives. In addition, the features of the protection packages were listed. In the first part of the test, 117 specimens of malware targeting the Mac were inspected in the so-called on-demand test. This is the normal scanning routine of security tools for malware. In the second part, the on-access test, the quality of the background antivirus watchdog was inspected. In doing so, an additional...

Read More

The Rise Of Ransomware

Posted by on Jun 19, 2014 in Blog | 0 comments

Cryptolocker, Gameover Zeus, and the nasty new strains of computer viruses holding our machines hostage.               By   Victor Kotsev If you are running a PC with the Windows operating system on it, you may want to consider  another backup–security experts fear the return, perhaps as early as this week, of a vicious computer virus that locks people out of their computers and demands ransom. A massive international operation at the beginning of the month knocked out its main servers but, attesting to how government digital security policy has failed to prevent and in some cases has even encouraged cyber crime, that was able to guarantee only two weeks of respite from it. Attesting to the dark genius of their creators, the viruses turned the very tools that protect people’s privacy online against those very same users. Cryptolocker is a fascinating and terrifying code, the best-known example of a new generation of “ransomware” viruses that encrypt a computer’s entire data with a powerful algorithm and demand a payment in exchange for the password. Estimates say it has already raked in tens of millions of dollars–it was such a commercial success that its creators shamelessly set up a special customer service site that helped people pay the approximately $300 demanded from each affected user. It originally served as the less glamorous counterpart of another highly sophisticated virus, Gameover Zeus, which was used to steal financial information. “Where a computer infected with GOZeuS turns out not to offer a significant financial reward, it can ‘call in’ CryptoLocker, to give the criminal controllers a second opportunity to acquire funds from the victim,” wrote the U.K.’s National Crime Agency in a release. But it has since rivaled and even surpassed Gameover Zeus in its infamy and has spawned a number of imitations, some of them attacking other operating systems and even smartphones. The most common way the viruses have spread so far has been through fake emails containing infected attachments or links to hackers’ sites that exploit vulnerabilities in browsers to install the malware surreptitiously. The infected computers are then linked to form a criminal “botnet”–or a decentralized peer-to-peer network of zombie computers taking commands from remote operators. The scheme is so complex that even after authorities took over the command and control servers–and named one of the alleged perpetrators, the Russian hacker Evgeniy Bogachev–the threat didn’t disappear. Attesting to the dark genius of their creators, the viruses turned the very tools that protect people’s privacy online–such as powerful encryption and decentralized anonymous communications–against those very same users. “For some years now, attackers have been changing the techniques they use to manage their networks of infected computers to be resistant to take-down both from...

Read More

Mozy Helps Beth Lutz Recover From a House Fire

Posted by on Apr 23, 2014 in Blog | 0 comments

“We had a devastating fire that totally demolished our house. I tell all my friends, ‘You really need to make sure that your data is backed up.’ I can’t imagine not having all of those picture and files…. I absolutely recommend Mozy.” Beth Lutz had a lot to worry about when fire consumed her home in October 2010. Everyone got out safely, but her records, photos, documents and computers were a loss. Fortunately, as a MozyHome user since 2007, all her records and images were ready and waiting for her to restore, making it easier to recover from the tragedy and get on with life. “I just couldn’t take the risk that something might happen to client work I was doing,” Lutz says. Lutz had been maintaining regular backups for years but hadn’t needed to call on the service. For a time, she used a conventional, on-premise backup system, but the process was complicated and offered little peace of mind. “What is so fantastic about the Mozy product is that it is so easy to use — with just a few clicks I was able to set up an automatic backup of my important documents, files, music and photo. I could also quickly check online to see that my data was actually being backed up,” she says. “With an external hard drive, it was harder to verify that the files I wanted to back up were actually being saved. It didn’t give me the same kind of confidence.” Lutz actually got a hint about the unreliable nature of conventional, on-premise backup when a flood hit her home office the year before the fire. “It made me realize that if the external hard drive fried, I would have a problem.” After the fire, Mozy’s comprehensive backup ensured that Lutz had all of her vital documents intact. The cloud service also safeguarded and restored the family’s photo and music collection. The extensive photo backups proved invaluable for dealing with her insurance company, thoroughly documenting all her possessions and enabling her to push back against lowball estimates of replacement prices. More important, though, were the personal memories. “I can’t imagine not having photos of my kids growing up. It would have been horrible,” she says. Lutz has become an activist for cloud backup since her unfortunate fire. “I keep telling all my friends: you’ve got to do it, you’ve got to have backup you can rely on,” she says. “Hopefully you don’t need it—I never thought my house would burn down!—but if something does happen, you’re protected.”...

Read More