Nearly 50% of Android device users are vulnerable to attacks. Downloading applications from third-party app stores could put you at risk. Do you think you're safe while surfing the web? Guess again. A recent study shows that a large percentage of the top 1 million websites have vulnerabilities. Hear about these stories and more on this week's edition of IT Rewind!
IT Rewind Featured Stories:
Did our short segment leave you wanting more? Check out the original articles of stories we covered!
eWeek, @, Sean Michael Kerner
Continuum's Must-Read Blog Post This Week
Cryptolocker. We have all heard it mentioned, be it in the back room of the IT closet or over a drink after a long day of remediation. It’s a malicious attack that is not going away, and dare we say it, continues to improve in its method of hijacking and holding computers, networks, and even gaming files ransom for untraceable funds. And when it hits an unprotected network, it is any client’s and IT pro’s worst nightmare.
With that in mind, and a strong, layered approach to network security in place to protect against future attacks, there are also a few additional steps we would like to provide to help secure your client’s environment. Using information provided by Roy Tobin, Threat Research Analyst for Webroot, here is a small guide that can help establish yet another layer of protection put in place against the nasty cryptoware and ransomwares. Read more »
What Else Is New in the IT Channel?
Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!
Dell Support Tool Put PCs at Risk of Malware Infection
InfoWorld, @, Lucian Constantin, @
Don't call it a comeback:
Will Embedded and Middleware Help Save Blackberry?
Network World, @, Jon Gold, @
The future of the Surface:
The Future of Microsoft Surface: What to Expect From Surface 3 and Surface pro 4
ITWorld, @, Mark Hachman, @
Hello everybody and welcome back to our beautiful Boston studios for this week’s edition of IT Rewind. Lets see that intro!
We have a couple of big stories to cover today, so lets get right into it.
Take out your mobile device for a minute. Is it an Android? If so, your personal data could be at risk. According to Palo Alto Networks, nearly half of Android devices are vulnerable to an attack that replaces downloaded applications with malicious software. The malware is used to collect sensitive data from the phones that it is installed on. The vulnerability is called “Android Installer Hijacking,” for obvious reasons, and could compromise information such as usernames and passwords. The flaw was discovered in January 2014 and at that time affected close to 90 percent of devices. As of now, that number is down to 49.5 percent, but many devices have not been patched. If you do have an Android device, be very cautious when downloading applications from a third-party app store.
Recent studies by Menlo Security revealed that one-fifth of web domains have known vulnerabilities. 750,000 web domains were scanned and 21 percent of those sites had vulnerabilities including web server and PHP issues. The 750,000 selected web domains came from a list of the top 1 million websites. The report went on to break down the 21 percent of vulnerable sites and showed that 10 percent were running a vulnerable version of PHP while 4 percent had vulnerable web server software. Additionally, 4 percent of sites were serving malware and 1 percent were involved in phishing and botnet activity.
We’re just about out of time for this week’s edition of IT Rewind, but once again, if you haven’t already registered, head on over to www.continuum.net/navigate2015 and book your ticket to this year’s user conference in Las Vegas
As always, remember to read the full stories that we covered today by clicking on the links below. Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Google Plus, Spiceworks and YouTube.
Take it easy.
By Lily Teplow
By Lily Teplow
By Brian Downey