<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Stellar Solutions &#187; Malware</title>
	<atom:link href="http://stellarsolution.net/category/malware/feed/" rel="self" type="application/rss+xml" />
	<link>http://stellarsolution.net</link>
	<description>Stellar solutions for Business, IT, Energy and Home</description>
	<lastBuildDate>Thu, 08 Oct 2015 20:20:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Lenovo admits to putting tracking software on PCs, Superfish software installed,  Hijacks all your secure web connections, Security breach remains after uninstall</title>
		<link>http://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/</link>
		<comments>http://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/#comments</comments>
		<pubDate>Fri, 20 Feb 2015 20:27:42 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Search engines]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Hijacks all your secure web connections]]></category>
		<category><![CDATA[Lenovo admits to putting tracking software on PCs]]></category>
		<category><![CDATA[Security breach remains after uninstall]]></category>
		<category><![CDATA[Superfish software installed]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=112</guid>
		<description><![CDATA[Lenovo admits to putting tracking software on PCs, Superfish software installed, Hijacks all your secure web connections, Security breach remains after uninstall &#160; From Sovereign Man February 20, 2015. &#8220;“We messed up badly here”: Lenovo admits to putting tracking software on your PC&#8221; &#8220;Lenovo Group, the largest computer manufacturer in the world, has made a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Lenovo admits to putting tracking software on PCs, Superfish software installed, Hijacks all your secure web connections, Security breach remains after uninstall</p>
<p>&nbsp;</p>
<p><strong>From Sovereign Man February 20, 2015.</strong><br />
&#8220;“We messed up badly here”: Lenovo admits to putting tracking software on your PC&#8221;</p>
<p>&#8220;Lenovo Group, the largest computer manufacturer in the world, has made a rather stunning admission that they have been pre-installing tracking software on their PCs.</p>
<p>The tracking software is made by a company called Superfish, which apparently paid some “very minor compensation” to Lenovo for putting the software on people’s computers.</p>
<p>The Superfish program is a total disaster.</p>
<p>It has image recognition algorithms which essentially monitor what a user is looking at… then suggests relevant ads based on what it thinks you might like.</p>
<p>This is not only REALLY high up on the creepy scale, it also completely destroys Internet security.</p>
<p>Whether you’re buying something online or accessing Internet banking, the Superfish program essentially cuts the secure link between you and sensitive websites that you’re trying to access.</p>
<p>According to the first user who found the vulnerability a few weeks ago, “[Superfish] will hijack ALL your secure web connections (SSL/TLS) by using self-signed root certificate authority, making it look legitimate to the browser.”</p>
<p>This means that the tracking software basically fools a web browser into believing that a connection is secure when it’s not… all for the purpose of pushing more ads in your face.</p>
<p>This scheme is so powerful that even if users uninstall the Superfish software, the security breach still remains.&#8221;<br />
<a href="http://www.sovereignman.com/personal-privacy/we-messed-up-badly-here-lenovo-admits-to-putting-tracking-software-on-your-pc-16144/">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2015/02/20/lenovo-admits-to-putting-tracking-software-on-pcs-superfish-software-installed-hijacks-all-your-secure-web-connections-security-breach-remains-after-uninstall/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</title>
		<link>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/</link>
		<comments>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/#comments</comments>
		<pubDate>Mon, 19 Jan 2015 20:49:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[Change passwords]]></category>
		<category><![CDATA[Firmware updated]]></category>
		<category><![CDATA[How to Video]]></category>
		<category><![CDATA[Securing your router from hackers cyber attacks]]></category>
		<category><![CDATA[Use MAC addresses if possible]]></category>
		<category><![CDATA[WiFi security]]></category>
		<category><![CDATA[WPA2]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=96</guid>
		<description><![CDATA[WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible &#160; If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking. Read more So, what can you do to improve your odds of not being [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WiFi security, Securing your router from hackers cyber attacks, How to Video, Firmware updated, Change passwords, WPA2, Use MAC addresses if possible</p>
<p>&nbsp;</p>
<p>If you read our article yesterday, January 18, 2015, you know that no router is safe from hacking.</p>
<p><a href="http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/">Read more</a></p>
<p>So, what can you do to improve your odds of not being hacked?</p>
<p><strong>From We Live Security July 22, 2014.</strong></p>
<h3>&#8220;Wi-Fi security – steps you can take now</h3>
<p>A We Live Security <a title="Wi-Fi security" href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">video guide offers basic tips on how to secure home routers </a>- and offers a good starting point for ensuring a Wi-Fi network isn’t vulnerable to snoopers and other unwanted ‘guests’.</p>
<p>Harley says, “Firstly, ensure your firmware is kept updated.” Firmware is the code and data which allows routers to function – similar in some ways to a computer operating system, but with the crucial difference that updates (to protect against bugs) often have to be installed manually.&#8221;</p>
<h3>&#8220;Check your settings again</h3>
<p><a href="http://www.welivesecurity.com/videos/router-attacks-five-simple-tips-lock-criminals/" target="_blank">Changing passwords is an essential first step</a> – but it’s worth checking back that your router’s settings haven’t changed, as this can be a problem with some models.</p>
<p>Harley says that users should always, “Change default router administrator usernames and passwords, and change the default SSID.” The SSID is the name of the network – which is broadcast to anywhere within Wi-Fi range. Leaving it as a default can broadcast information that is useful to an attacker – such as the model of router you are using, or whether you are using one supplied by your ISP. When choosing a new network name, avoid any personally identifying information such as your name or house number.</p>
<p>It’s worth considering making yours a “hidden network” – disabling the broadcast of the SSID’s name. That way you’re less visible to attackers – and to connect new devices, simply type in your network’s name on the gadget.</p>
<p>Harley warns that these precautions can be wasted if your router’s software is updated – which can occasionally revert settings to the default. “After any update, check these settings have not reverted,” he says.</p>
<h3>WEP is not your friend</h3>
<p>If your family or business has had the same router for  a long time, you may be using WEP – an outdated form of encryption that can be cracked easily, even by unskilled hackers. Most new routers will use the more secure WPA2 standard – but if your router has been around for a while, it’s possible family members may have chosen WEP to connect older devices such as Nintendo’s first DS handheld. “Don’t use WEP encryption, if anyone still is,” Harley says. “If the router doesn’t allow anything else, time to change it. WPA2 is reasonably secure.”</p>
<p>Even if you’ve had trouble connecting mobile devices to a network, leaving it “open” is always a bad idea. Harley says, “ If you’re not using encryption at all, fix it.”</p>
<h3>Know who is connecting to your network</h3>
<p>Harley says that controlling which devices can connect to a network offers another layer of reassurance. “MAC filtering reduces the risk from intruder machines using your network,” he says.</p>
<p>Any PC or mobile computing device has a unique identifying number known as a MAC address. If you access your router’s settings, you can select which devices can and cannot connect to your network – meaning for instance, a neighbor couldn’t log in, or a teenage visitor could not access unsuitable sites via a smartphone.</p>
<p>Add the MAC addresses of all authorized devices in the home – iPhones, tablets, laptops etc. – to the router’s authorized list. No other device will then be allowed on the network. You can find the MAC addresses of mobile phones and other portable devices under their network settings, though this will vary for each device. Check with the manufacturer.&#8221;<br />
<a href="http://www.welivesecurity.com/2014/07/22/wi-fi-security-2/">Read more</a></p>
<p><iframe width="1170" height="658" src="https://www.youtube.com/embed/bu0vlpfxfnI?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2015/01/19/wifi-security-securing-your-router-from-hackers-cyber-attacks-how-to-video-firmware-updated-change-passwords-wpa2-use-mac-addresses-if-possible/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded</title>
		<link>http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/</link>
		<comments>http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/#comments</comments>
		<pubDate>Sun, 18 Jan 2015 14:53:11 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical support]]></category>
		<category><![CDATA[Any router can be hacked]]></category>
		<category><![CDATA[CNET warning from 2013 goes unheeded]]></category>
		<category><![CDATA[Router security 101]]></category>
		<category><![CDATA[Security not optional when buying or using routers]]></category>
		<category><![CDATA[WPA2 not foolproof]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=90</guid>
		<description><![CDATA[Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded &#160; &#160; Computer system security, especially in regard to internet access, is in the forefront of technical and business reporting. We are constantly being told about major corporations being hacked [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Router security 101, WPA2 not foolproof, Security not optional when buying or using routers, Any router can be hacked, CNET warning from 2013 goes unheeded</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Computer system security, especially in regard to internet access, is in the forefront of technical and business reporting.</p>
<p>We are constantly being told about major corporations being hacked and sensitive data being breached.</p>
<p>Target and Sony are some of the more prominent examples.</p>
<p>What is less conspicuous is the hacking of routers, used by businesses and many homeowners.</p>
<p>From setting up my own routers I was aware of important details when configuring them.</p>
<p>What I was not so aware of is the frequency of router hacking and just how vulnerable they are.</p>
<p>A friend of mine owns a coffee shop in NC. Recently 2 of his routers were hacked. He knew this because of performance and setup problems and ultimately by confirmation from the tech support at Linksys.</p>
<p>Of course this has more far reaching consequences such as potential compromise of customer debit and credit card information.</p>
<p>And don&#8217;t forget, when you are using someone&#8217;s WIFI internet access, you should be mindful of this fact and probably not enter or access important information while using their router.</p>
<p>From what I have uncovered from research over the past several days, this problem has not been taken seriously enough by the public and router manufacturers.</p>
<p>A great article from CNET in 2013 explains the extent of the problem and provides a clear warning.</p>
<p><strong>From CNET April 17, 2013.</strong></p>
<p>&#8220;Top Wi-Fi routers easy to hack, says study<br />
The most popular home wireless routers are easily hacked and there&#8217;s little you can do to stop it, says a new study by research firm Independent Security Evaluators.&#8221;</p>
<p>&#8220;The Wi-Fi router you use to broadcast a private wireless Internet signal in your home or office is not only easy to hack, says a report released today, but the best way to protect yourself is out of your hands.</p>
<p>The report, written by research firm Independent Security Evaluators of Baltimore, found that 13 of the most popular off-the-shelf wireless routers could be exploited by a &#8220;moderately skilled adversary with LAN or WLAN access.&#8221; It also concludes that your best bet for safer Wi-Fi depends on router vendors upping their game. All 13 routers evaluated can be taken over from the local network, with four of those requiring no active management session. Eleven of the 13 can be taken over from a Wide-Area Network(WAN) such as a wireless network, with two of those requiring no active management session.&#8221;</p>
<p>&#8220;Before you dismiss router hacks as exceptionally rare, it&#8217;s important to note that they&#8217;ve been a small but growing segment of computer security threats. In 2011, one firmware vulnerability affecting six hardware manufacturers combined with two malicious scripts and 40 malicious DNS servers to attack 4.5 million Brazilian DSL modems, with the goal of stealing bank and credit card information.</p>
<p>Craig Heffner, a vulnerability analyst at Maryland-based Tactical Network Solutions, said that he isn&#8217;t familiar with the Brazil story but isn&#8217;t surprised by it. &#8220;In a lot of countries, there&#8217;s only one or two ISPs, and you get whatever router they give you,&#8221; he said. &#8220;They often enable remote administration by default, so any vulnerability would be amplified.&#8221;</p>
<p>And just yesterday, ReadWrite reported on wireless router hacking, based in part on research conducted by security firm Rapid7. ISE&#8217;s study, while similar, reports &#8220;all-new findings,&#8221; said ISE&#8217;s marketing head, Ted Harrington.</p>
<p>Harrington further explained why router hacking could turn into a big problem. &#8220;What&#8217;s notable about this is that if you compromise the router, then you&#8217;re inside the firewall. You can pick credit card numbers out of e-mails, confidential documents, passwords, photos, just about anything,&#8221; he said.</p>
<p>He added that ISE plans to release additional information from the study in the coming weeks, following the routine security community best practice of giving vendors a chance to respond to vulnerabilities that have been uncovered before publishing them.</p>
<p>&#8220;We notified all vendors about all vulnerabilities that we found,&#8221; said ISE security analyst Jake Holcomb. &#8220;We&#8217;re in the process of receiving Common Vulnerability and Exposure (CVE) numbers&#8221; for tracking information security vulnerabilities.</p>
<p>Some vendors, Holcomb said, got back to ISE quickly and had beta firmware with fixes ready to test within 72 hours. &#8220;Other vendors escalated their Tier 1 support up the chain but we never heard back from them,&#8221; he said.&#8221;</p>
<p><a href="http://www.cnet.com/news/top-wi-fi-routers-easy-to-hack-says-study/">Read more</a></p>
<p>I have been referring to PC Magazine in print and on the internet for 30 years. They have some pretty good reviews. However, the following article on purchasing routers is an example of downplaying the importance of security.</p>
<p><strong>From PC Magazine January 31, 2014.</strong></p>
<p>&#8220;First, ask yourself how high-end you want to go with a router. If you need nothing more than to create a wireless network, you can get away with a fairly cheap router—spending less than $100 should do. If you want extras such as security, parental controls, and the ability to connect USB printers and external storage drives for sharing data, you&#8217;ll want to look at higher-priced premium routers.</p>
<p>What Type of Security?<br />
Most of the newer routers support the highest level of security, WPA2. If in the market for a new router, make sure it supports WPA2.&#8221;</p>
<p><a href="http://www.pcmag.com/article2/0,2817,2347539,00.asp">Read more</a></p>
<p>&#8220;extras such as security&#8221;</p>
<p>Really??</p>
<p>Selecting WPA2 for security is important. However, apparently, WPA2 scurity and the latest firmware cannot be counted to stop hackers.</p>
<p>Just this morning I was discussing this with a friend who owns a tax/accounting business.</p>
<p>Forget the bells and whistles that PC Magazine focused on.</p>
<p>When I am purchasing a router, I first want it to be reliable, i.e, keep functioning and be secure.</p>
<p>I spoke to another friend a few hours ago. He is charge of network security for a NC company. In college he was taught to expect routers to be hacked.</p>
<p>Here are some more warnings and useful precautionary steps.</p>
<p><strong>From Tom&#8217;s Guide.</strong></p>
<p>&#8220;Your Router&#8217;s Security Stinks: Here&#8217;s How to Fix It&#8221;</p>
<p>&#8220;Earlier this year, <a href="http://www.tomsguide.com/us/malware-spreading-worm-linksys,news-18316.html">a router worm called TheMoon</a> used the HNAP protocol to identify vulnerable Linksys-brand routers to which it could spread itself. (<a href="http://www.tomsguide.com/us/how-to-update-linksys-router,news-18325.html">Linksys quickly issued a firmware patch</a>.)</p>
<p>&#8220;As soon as you get home, this is something you want to do with all your routers,&#8221; Horowitz told the tech-savvy crowd. &#8220;Go to /HNAP1/, and, hopefully, you&#8217;ll get no response back, if that&#8217;s the only good thing. Frankly, if you get any response back, I would throw the router out.&#8221;</p>
<h3><strong>The WPS Threat</strong></h3>
<p>Worst of all is Wi-Fi Protected Setup (WPS), an ease-of-use feature that lets users bypass the<a id="itxthook4" class="itxtnewhook itxthook" href="http://www.tomsguide.com/us/home-router-security,news-19245.html#" rel="nofollow"><span id="itxthook4p" class="itxtrst itxtrstspan itxtnowrap"><span id="itxthook4w" class="itxtrst itxtrstspan itxtnowrap itxtnewhookspan">network</span><img id="itxthook4icon" class="itxtrst itxtrstimg itxthookicon" src="http://images.intellitxt.com/ast/adTypes/icon1.png" class="grouped_elements" rel="tc-fancybox-group90" alt="" /></span></a> password and connect devices to a Wi-Fi network simply by entering an eight-digit PIN that&#8217;s printed on the router itself. Even if the network password or network name is changed, the PIN remains valid.</p>
<p>&#8220;This is a huge expletive-deleted security problem,&#8221; Horowitz said. &#8220;That eight-digit number will get you into the [router] no matter what. So a plumber comes over to your house, turns the router over, takes a picture of the bottom of it and he can now get on your network forever.&#8221;</p>
<p>That eight-digit PIN isn&#8217;t even eight digits, Horowitz explained. It&#8217;s actually seven digits, plus a final checksum digit. The first four digits are validated as one sequence and the last three as another, resulting in only 11,000 possible codes instead of 10 million.</p>
<p>&#8220;If WPS is active, you can get into the router,&#8221; Horowitz said. &#8220;You just need to make 11,000 guesses&#8221; — a trivial task for most modern computers and smartphones.&#8221;&#8221;</p>
<p>&#8220;Regardless of whether a router is commercial- or consumer-grade, there are several things, varying from easy to difficult, that home-network administrators can do to make sure their routers are more secure:</p>
<p><strong>Easy fixes<br />
</strong></p>
<p><strong>Change the administrative credentials</strong> from the default username and password. They&#8217;re the first things an attacker will try.</p>
<p><strong>Change the network name, or SSID</strong>, from &#8220;Netgear,&#8221; &#8220;Linksys&#8221; or whatever the default is, to something unique — but don&#8217;t give it a name that identifies you.</p>
<p>&#8220;If you live in an apartment building in apartment 3G, don&#8217;t call your SSID &#8216;Apartment 3G,'&#8221; Horowitz quipped. &#8220;Call it &#8216;Apartment 5F.'&#8221;</p>
<p><strong>Enable WPA2 wireless </strong><a href="http://www.tomsguide.com/us/-encryption-definition-sndmp,news-17507.html"><strong>encryption</strong></a> so that only authorized users can hop on your network.</p>
<p><strong>Disable Wi-Fi Protected Setup</strong>, if your router lets you.</p>
<p><strong>Set up a guest Wi-Fi network</strong> and offer its use to visitors, if your router has such a feature. If possible, set the guest network to turn itself off after a set period of time.</p>
<p>&#8220;You can turn on your guest network, and set a timer, and three hours later, it turns itself off,&#8221; Horowitz said. &#8220;That&#8217;s a really nice security feature.&#8221;</p>
<p><strong>Do not use cloud-based router management</strong> if your router&#8217;s manufacturer offers it. Instead, figure out if you can turn that feature off.</p>
<p>&#8220;This is a really bad idea,&#8221; Horowitz said. &#8220;If your router offers that, I would not do it, because now you&#8217;re trusting another person between you and your router.&#8221;</p>
<p><strong>MORE: </strong><a href="http://www.tomsguide.com/us/pictures-story/514-security-fixes-right-now.html"><strong>7 Computer-Security Fixes to Make Right Now</strong></a></p>
<p><strong>Moderately difficult<br />
</strong></p>
<p><strong>Install new firmware</strong> when it becomes available. Log into your router&#8217;s administrative interface routinely to check. With some brands, you may have to check the manufacturer&#8217;s website for firmware upgrades. But have a backup router on hand if something goes wrong.</p>
<p><strong>Set your router to use the 5-GHz band</strong> for Wi-Fi instead of the more standard 2.4-GHz band, if possible and if all your devices are compatible.</p>
<p>&#8220;The 5-GHz band does not travel as far as the 2.4-GHz band,&#8221; Horowitz said. &#8220;So if there is some bad guy in your neighborhood a block or two away, he might see your 2.4-GHz network, but he might not see your 5-GHz network.&#8221;</p>
<p><strong>Disable remote administrative access</strong>, and <strong>disable administrative access over Wi-Fi</strong>. Administrators should connect to routers via wired Ethernet only.</p>
<p><strong>Advanced tips for more tech-savvy users</strong></p>
<p><strong>Change the settings for the administrative Web interface</strong>, if your router permits it. Ideally, the interface should enforce a secure HTTPS connection over a non-standard port, so that the URL for administrative access would be something like, to use Horowitz&#8217;s example, &#8220;https://192.168.1.1:82&#8243; instead of the more standard &#8220;http://192.168.1.1&#8243;.</p>
<p><strong>Use a browser&#8217;s incognito or private mode</strong> when accessing the administrative interface so that your new URL is not saved in the browser history.</p>
<p><strong>Disable PING, Telnet, SSH, UPNP and HNAP</strong>, if possible. Instead of setting relevant ports to &#8220;closed,&#8221; set them to &#8220;stealth&#8221; so that no response is given to unsolicited external communications that may come from attackers probing your network.</p>
<p>&#8220;Every single router has an option not to respond to PING commands,&#8221; Horowitz said. &#8220;It&#8217;s absolutely something you want to turn on — a great security feature. It helps you hide. Of course, you&#8217;re not going to hide from your ISP, but you&#8217;re going to hide from some guy in Russia or China.&#8221;</p>
<p><strong>Change the router&#8217;s Domain Name System (DNS)</strong> server from the ISP&#8217;s own server to one maintained by OpenDNS (208.67.220.220, 208.67.220.222, 208.67.222.220, 208.67.222.222) or Google Public DNS (8.8.8.8, 8.8.4.4).</p>
<p><strong>Use a </strong><a href="http://www.tomsguide.com/us/what-is-vpn,news-18480.html"><strong>virtual private network (VPN)</strong></a><strong> router</strong> to supplement or replace your existing router and encrypt all your network traffic.</p>
<p>&#8220;When I say VPN router, I mean a router that can be a VPN client,&#8221; Horowitz said. &#8220;Then, you sign up with some VPN company, and everything that you send through that router goes through their network. This is a great way to hide what you&#8217;re doing from your Internet service provider.&#8221;</p>
<p>Finally, <strong>use Gibson Research Corp.&#8217;s Shields Up</strong> port-scanning service at<a href="https://www.grc.com/shieldsup" target="_blank">https://www.grc.com/shieldsup</a>. It will test your router for hundreds of common vulnerabilities, most of which can be mitigated by the router&#8217;s administrator.</p>
<ul>
<li><a href="http://www.tomsguide.com/us/scariest-security-threats,review-2144.html">7 Scariest Security Threats Headed Your Way</a></li>
<li><a href="http://www.tomsguide.com/us/identity-theft-what-to-do,news-18696.html">Identity Theft Victim? Here&#8217;s 6 Things You Need to Do</a></li>
<li><a href="http://www.tomsguide.com/us/secure-facebook-privacy-security-settings,news-18864.html">10 Facebook Privacy and Security Settings to Lock Down</a></li>
</ul>
<p><em>Follow Paul Wagenseil at </em><a href="https://twitter.com/snd_wagenseil" target="_blank"><em>@snd_wagenseil</em></a><em>. <em>Follow Tom&#8217;s Guide at </em><a href="https://twitter.com/tomsguide" target="_blank"><em>@tomsguide</em></a><em>, on </em><a href="https://www.facebook.com/Tomsguide" target="_blank"><em>Facebook</em></a><em> and on </em><a href="https://plus.google.com/u/0/113097864502537730990/posts" target="_blank"><em>Google+</em></a><em>.&#8221;</em></em><br />
<a href="http://www.tomsguide.com/us/home-router-security,news-19245.html">Read more</a></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2015/01/18/router-security-101-wpa2-not-foolproof-security-not-optional-when-buying-or-using-routers-any-router-can-be-hacked-cnet-warning-from-2013-goes-unheeded/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</title>
		<link>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/</link>
		<comments>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/#comments</comments>
		<pubDate>Sat, 20 Dec 2014 15:01:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Cyber attack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[FBI claims North Korea source of attack]]></category>
		<category><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack]]></category>
		<category><![CDATA[The Interview comedy about CIA attempt to assassinate Kim Jong Un]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=56</guid>
		<description><![CDATA[Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un &#160; &#160; From Reuters. The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources. &#8220;Sony [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Sony hires FireEye Inc. Mandiant forensics unit to clean up massive cyber attack, FBI claims North Korea source of attack, The Interview comedy about CIA attempt to assassinate Kim Jong Un</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From Reuters.</strong></p>
<p>The FBI claims to have evidence that the Cyber attack upon Sony computer systems came from North Korean sources.</p>
<p>&#8220;Sony hires Mandiant to help clean up after cyber attack&#8221;</p>
<p>&#8220;Pictures Entertainment has hired FireEye Inc&#8217;s Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio&#8217;s computer network nearly a week ago, three people with knowledge of the matter said on Sunday.</p>
<p>Computer systems at the Sony Corp unit went down last Monday after displaying a red skull and the phrase &#8220;Hacked By #GOP,&#8221; which reportedly stands for Guardians of Peace, the Los Angeles Times reported.</p>
<p>Technicians are making headway in repairing damage caused by the attack and expect to have the email systems back online Monday, said one of the people, who were not authorized to publicly discuss efforts to deal with the attack.&#8221;</p>
<p>&#8220;Mandiant is an incident response firm that helps victims of breaches identify the extent of attacks, clean up networks and restore systems.</p>
<p>The technology news website Re/code reported on Friday that Sony was investigating to determine whether hackers working on behalf of North Korea might be responsible for the attack, possibly in retribution for the studio&#8217;s backing of the film &#8220;The Interview,&#8221; which is to be released on Dec. 25 in the United States and Canada.</p>
<p>The movie is a comedy about a CIA attempt to assassinate North Korean leader Kim Jong Un.&#8221;</p>
<p>Read more:</p>
<p><a href="http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130">http://www.reuters.com/article/2014/11/30/sony-cybersecurity-mandiant-idUSL2N0TK0R920141130</a></p>
<p><strong>From Fireeye:</strong></p>
<div class="title entrytitle">
<div class="entrytitle_wrap">
<h2>&#8220;Security Predictions</h2>
</div>
<div class="entry-meta-block selfClear"><time class="entry-date">December 19, 2014</time> <span class="sep">| </span><span class="by-author">By <a title="View all entries filed under 'Fireeye - Authors : Bryce Boland'" href="https://www.fireeye.com/blog/executive-perspective.html/category/etc/tags/fireeye-blog-authors/cap-bryce-boland">Bryce Boland</a></span></div>
</div>
<div class="summary entrytextteaser"></div>
<div class="par parsys">
<div class="section entrytext">There’s no crystal ball, but based on what we saw in 2014, we can predict trends we’re likely to see in the coming year. Here are a few technical and business insights from our experts to help security professionals prepare for 2015.&nbsp;</p>
<p>1)    <b>The rate of &#8220;cataclysmic events&#8221; such as Heartbleed and Shellshock will likely increase in 2015.  </b>It won&#8217;t be just one thing, but a combination of unrelated events that have the capability to destabilize &#8220;the internet of things.&#8221;  Organizations need to get better at dealing with these storms. We believe that 2015 will bring more of these far-reaching attacks that are tough to patch and cause widespread damage. Our advice: Put processes in place to discover vulnerabilities and react immediately with patches as needed.</p>
<p>&nbsp;</p>
<p>2)    <b>Linux POS malware increases. </b>We’ve seen plenty of Windows-based Point-of-Sale (POS) malware. Watch for Linux-based POS to become a new playground for attackers. Linux-based POS systems are in use all over the world, some are even free, open source or far less expensive than their Windows-based counterparts. Operators likely have minimal experience and in-house expertise to address threats and maintain updated configurations. Our advice: Understand the attack surface of your Linux hosts, the attack vectors they are exposed to, and initiate robust operational processes to manage, monitor and maintain their security.</p>
<p>&nbsp;</p>
<p>3)    <b>No more AV for me</b>.  IT security organizations will stop paying third-party vendors and consider Microsoft-provided AV as &#8220;good enough.&#8221; Instead, they’ll spend more on other endpoint solutions to address advanced detection, response and forensics. Our advice: Evaluate your security investments, considering both how your organization has changed and how the threat landscape has matured. Focus your investments on threat detection and protection.</p>
<p>&nbsp;</p>
<p>4)    <b>Supply chain attacks will increase</b>. Attackers will leverage less-mature companies that are the weak entry point into the more-mature enterprises – making the supply ecosystem an increasingly key part of cyber strategies. Our advice: Build security requirements into your MSAs with suppliers to improve their security, and require them to demonstrate that your supply chain is operationalizing their security. Look for measurements of security effectiveness such as a time to detect a new threat, and time to remove the threat.&#8221;</p>
<p><a href="https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html">https://www.fireeye.com/blog/executive-perspective/2014/12/security_predictions.html</a></p>
<p>&nbsp;</p>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/12/20/sony-hires-fireeye-inc-mandiant-forensics-unit-to-clean-up-massive-cyber-attack-fbi-claims-north-korea-source-of-attack-the-interview-comedy-about-cia-attempt-to-assassinate-kim-jong-un/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sucuri Security Website Firewall (CloudProxy) plugin for WordPress, Installation instructions, WordPress websites infected by SoakSoak.ru malware, Cloud based IPS, Security Filtering all traffic, Blocking all security related issues before hitting website web server</title>
		<link>http://stellarsolution.net/2014/12/17/sucuri-security-website-firewall-cloudproxy-plugin-for-wordpress-installation-instructions-wordpress-websites-infected-by-soaksoak-ru-malware-cloud-based-ips-security-filtering-all-traffic-bloc/</link>
		<comments>http://stellarsolution.net/2014/12/17/sucuri-security-website-firewall-cloudproxy-plugin-for-wordpress-installation-instructions-wordpress-websites-infected-by-soaksoak-ru-malware-cloud-based-ips-security-filtering-all-traffic-bloc/#comments</comments>
		<pubDate>Wed, 17 Dec 2014 20:40:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Blocking all security related issues before hitting website web server]]></category>
		<category><![CDATA[Cloud based IPS]]></category>
		<category><![CDATA[Installation instructions]]></category>
		<category><![CDATA[Security Filtering all traffic]]></category>
		<category><![CDATA[Sucuri Security Website Firewall (CloudProxy) plugin for Wordpress]]></category>
		<category><![CDATA[WordPress websites infected by SoakSoak.ru malware]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=48</guid>
		<description><![CDATA[Sucuri Security Website Firewall (CloudProxy) plugin for WordPress, Installation instructions, WordPress websites infected by SoakSoak.ru malware, Cloud based IPS, Security Filtering all traffic, Blocking all security related issues before hitting website web server &#160; &#160; From the WordPress Dashboard. Click on Plugins link. Click on Add New link. In the search box, enter &#8220;Sucuri Security [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Sucuri Security Website Firewall (CloudProxy) plugin for WordPress, Installation instructions, WordPress websites infected by SoakSoak.ru malware, Cloud based IPS, Security Filtering all traffic, Blocking all security related issues before hitting website web server</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>From the WordPress Dashboard.</p>
<p>Click on Plugins link.</p>
<p>Click on Add New link.</p>
<p>In the search box, enter &#8220;Sucuri Security &#8211; SiteCheck Malware Scanner&#8221; then click Search.</p>
<p>Sucuri Security &#8211; SiteCheck Malware Scanner will appear.</p>
<p>Click on Install Now link.</p>
<p>Message appears.</p>
<p>&#8220;Are you sure you want to install this plugin?&#8221;</p>
<p>Click on OK button.</p>
<p>&#8220;Installing Plugin&#8221; message appears.</p>
<p>Click on Activate Plugin link.</p>
<p>Sucuri Security &#8211; SiteCheck Malware Scanner now installed.</p>
<p>*** Please note ***</p>
<p>Sucuri Security &#8211; SiteCheck Malware Scanner is only available via a paid subscription.</p>
<p>For more information on pricing:</p>
<p><a href="https://sucuri.net/website-firewall/signup">https://sucuri.net/website-firewall/signup</a></p>
<p>These instructions are believed to be correct as of today.</p>
<p>For more information visit WordPress help or</p>
<p><a href="https://sucuri.net/">https://sucuri.net/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/12/17/sucuri-security-website-firewall-cloudproxy-plugin-for-wordpress-installation-instructions-wordpress-websites-infected-by-soaksoak-ru-malware-cloud-based-ips-security-filtering-all-traffic-bloc/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru</title>
		<link>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/</link>
		<comments>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/#comments</comments>
		<pubDate>Wed, 17 Dec 2014 20:08:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[computers]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Website]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[Free SiteCheck scanner]]></category>
		<category><![CDATA[Google blacklisted over 11k domains]]></category>
		<category><![CDATA[Javascript malware from the SoakSoack.ru]]></category>
		<category><![CDATA[SoakSoak malware decoder]]></category>
		<category><![CDATA[WordPress websites infected by SoakSoak.ru malware]]></category>

		<guid isPermaLink="false">http://stellarsolution.net/?p=46</guid>
		<description><![CDATA[WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru &#160; &#160; From ars technica December 15, 2014. &#8220;More Than 100,000 WordPress Websites Reportedly Infected by Russian Malware&#8221; &#8220;Over 100,000 WordPress sites have been infected by a Russian virus called SoakSoak, which loads [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WordPress websites infected by SoakSoak.ru malware, Google blacklisted over 11k domains, SoakSoak malware decoder, Free SiteCheck scanner, Javascript malware from the SoakSoack.ru</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>From ars technica December 15, 2014.</strong></p>
<p>&#8220;More Than 100,000 WordPress Websites Reportedly Infected by Russian Malware&#8221;</p>
<p>&#8220;Over 100,000 WordPress sites have been infected by a Russian virus called SoakSoak, which loads an attack code onto webpages created through the uber-popular blogging platform, according to a report by Ars Technica.</p>
<p>Google has already flagged roughly 11,000 malicious domains &#8212; though it is likely that many more than that have been compromised.</p>
<p>According to Gizmodo, more than 70 million total sites use WordPress as a content-management system &#8212; from personal blogs to Time.com. However, only self-hosted sites that use WordPress have been affected by the malware &#8212; meaning personal blogs are okay.</p>
<p>The aim of the hackers and the consequences of the virus &#8212; whether to steal data or otherwise &#8212; remain unclear.</p>
<p>Related: 5 Lessons Leaders Can Learn From the Sony Hacking Scandal</p>
<p>The malware infiltrated WordPress through a vulnerability in a slideshow plug-in called Slider Revolution. While Slider Revolution has since fixed the bug with updates &#8212; it knew about the vulnerability earlier this fall, according to Gizmodo &#8212; the older version of the plug-in is still bundled with many WordPress themes.</p>
<p>“The biggest issue is that the RevSlider plugin is a premium plugin,” wrote Sucuri, an online security firm that was first to identify the infection. “It’s not something everyone can easily upgrade and that in itself becomes a disaster for website owners.&#8221;&#8221;</p>
<p>Read more:</p>
<p><a href="http://arstechnica.com/security/2014/12/some-100000-or-more-wordpress-sites-infected-by-mysterious-malware/">http://arstechnica.com/security/2014/12/some-100000-or-more-wordpress-sites-infected-by-mysterious-malware/</a></p>
<p><strong>Sucuri free website scanner:</strong></p>
<p><a href="http://sitecheck.sucuri.net/">http://sitecheck.sucuri.net/</a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://stellarsolution.net/2014/12/17/wordpress-websites-infected-by-soaksoak-ru-malware-google-blacklisted-over-11k-domains-soaksoak-malware-decoder-free-sitecheck-scanner-javascript-malware-from-the-soaksoack-ru/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
