• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

“Storm” Worm Makes Anti-Virus Programs Brain Dead

November 29, 2007

The ever-mutating, ever-stealthy Storm worm botnet is adding yet another trick to its vast repertoire: Instead of killing anti-virus products on systems, it’s now doing a modification to render them brain-dead.

The finding was made by Sophos and was mentioned by a security strategist for IBM Internet Security Systems. According to Sophos, the Storm botnet—Sophos calls it Dorf, and it’s also known as Ecard malware— makes programs that interact with Windows, tell the virus every time a new program is started.

The virus then checks the program that started to see if it was an anti-virus or anti-spyware program, and if it is, it will either stop the program from running, or modify the program so that it can’t detect the virus.

Then, when the anti-virus programs run, they simply tell the user everything is ok.

The strategy means that users won’t be alarmed by their anti-virus software not running.

The anti-virus is running but brain-dead, which is worse than shutting it off, since it then opens the door for all sorts of other virus and spyware programs to infect the system.

This new behavior the latest evidence of why Storm is the scariest and most substantial threat security researchers have ever seen. The Storm virus is patient, it’s resilient, it’s adaptive in that it can defeat anti-virus products in multiple ways. It changes its virus footprint automatically every 30 minutes.

It even has its own mythology: Composed of up to 50 million zombie PCs, it has as much power as a supercomputer, the stories go, with the brute strength to crack Department of Defense encryption schemes.

In reality, security researchers in the know peg the size of the peer-to-peer botnet at 6 million to 15 million PCs, and not on par with a supercomputer. And it can’t break encryption keys. Still, it is very dangerous.

Top Mistakes That Make You A Prime Target For Identity Theft

October 26, 2007

The numbers are staggering: according to the 2007 Identity Fraud Report, identity theft cost consumers and businesses a whopping $56.6 billion dollars.

Identity theft occurs when someone steals your name, Social Security number (SSN), bank account number, or credit card to open accounts, make purchases, or commit other fraudulent crimes.

The Methods They Use to Steal Your Identity
The methods identity thieves use include low tech strategies (like going through your trash can, also known as “dumpster diving”) to highly sophisticated phishing scams that include cloned PayPal or bank websites that trick you into giving your username, password, or account number.

Other ways include:

  • Stealing records from an employer or bribing an employee who has access to the records.
  • Hacking into the company’s employee records.
  • Stealing mail, such as bank account or credit card statements, tax documents, pre-approved credit cards, or new checks.
  • Abusing employer’s access to credit reports.

How Identity Theft Affects You
Once someone has stolen your identity, they can use your credit cards or bank account to purchase expensive consumer goods like computers and electronics that can easily be resold for cash.

They can also open and charge up new credit cards, which can be a real mess to straighten out with vendors and credit reporting agencies.

Other criminal activities include taking out auto loans in your name, opening a new phone or wireless service in your name, or writing counterfeit checks to drain your bank account. Some have even used it to file for bankruptcy to avoid paying debts they’ve incurred.

How to Protect Yourself and Your Employees
Never give your personal information, Social Security number, credit card number, or bank account numbers over the phone or online unless you know for certain you are dealing with a legitimate company.

Make sure your employees are given an AUP (acceptable use policy) that educates them on the dangers of phishing scams and spam e-mails designed to either trick you into giving your information or installing a virus that secretly steals the information stored on your PC without your knowledge.

You can recognize a secure website, as it has an https:// at the beginning of the web address (regular web sites only have http: and no “s”) at the top of the page on which you are submitting your information.

It also must have a picture of a lock in the bottom right corner of the page. If you don’t see both of these measures in place, do not submit your information.

And even if you DO see this, use a credit card instead of a debit card or pay by check option because you’ll get security protection from your card’s issuer.

Visa, MasterCard and American Express all have a zero liability policy. If you notify the bank of unauthorized trans-actions, you pay nothing.

Shred all medical bills, financial statements, credit card applications, tax statements, or any other mail that contains confidential information about you before you throw them into the trash.

Never open e-mails or attachments from e-mail addresses you are unfamiliar with, and NEVER respond to e-mails that ask you to verify your account information because your account is being closed, suspended, or charged.

If you want to verify this, call the bank or the company to see if it was a legitimate e-mail.

Signs That You’ve Fallen Victim to Identity Theft  
If you see any unexplained charges or withdrawals from your bank accounts, if you receive credit cards that you did not apply for, or if you start receiving bills or collection letters for items you have not purchased, someone may have stolen your identity.

Always follow up with the business or institution to find out exactly what is causing the situation as quickly as possible. The faster you act on identity theft, the easier it will be for you to clear your name.

Do You Make These Mistakes When Sending E-Mail?

October 26, 2007

In this day and age, it is amazing how many businesses and professionals still violate basic e-mail etiquette rules. Almost everyone uses e-mail to communicate with their clients and friends yet very few give any thought to the importance of those communications.

If you want to make sure you are not offending your clients and friends when sending e-mail, here are 6 basic rules to live by:

1. Never send e-mails to people who have not requested to receive them.
This is also known as spamming and federal laws are getting much tougher in the rules and penalties for sending unwanted e-mail messages. Many businesses make the mistake of thinking that they are free and clear to send e-mail promotions to their clients, even if the client has not specifically requested to get those promotions. When in doubt, it’s always smarter to err on the side of caution and NOT include them in your broadcast; doing so could cause you to lose favor with your clients, or worse yet, lose their business altogether.

2. Don’t attach files unless you’ve gotten permission to from the recipient.
With the looming threat of viruses, it’s considered bad net-etiquette to send file attachments.

3. DO NOT USE ALL CAPS.
Using all caps in an e-mail is the online equivalent of screaming at the top of your lungs. Unless that is what you intended to do, make sure you use lowercase letters.

4. When sending to a large list of people, use the BCC (blind carbon copy) feature.
Otherwise, you are exposing every recipient’s e-mail address to everyone else on the list. Since most people like to keep their personal e-mail addresses private, exposing your entire list will cause you to lose quite a few brownie points.

Here’s another point to consider: I wish I had a nickel for every sales person that sent out a broadcast e-mail to all their clients and prospects and accidentally copied everyone on the list. This is an EASY way for your competition to get their hands on one of your most precious assets.

5. Never send information you wouldn’t want the entire world to know about.
E-mails can quickly spread around the Internet. Never send confidential information, off-color jokes, political opinions, pictures, or gossip that you wouldn’t want made public. This goes double if you are using a business e-mail address. And if you are a business owner, you want to make sure your employees know that it is against company policy to send this type of information through your company e-mail. Even a well-meaning joke can land you in a lot of hot water if taken the wrong way. Always take a minute to think before you hit the “send” button.

6. Avoid fancy formatting, background graphics, and other “cute” pictures and fonts.
What looks great on your monitor may be impossible to read on someone else’s; it also may annoy the reader who has to weed through the fluff to find the content.

FREE Report: 12 Surefire Signs Your Business Is Ready For A Server

October 26, 2007

Is your business limping along using outdated computers or a peer-to-peer network that is constantly giving you problems?

Are you planning on adding employees, opening  a remote location or adding an additional office?

Are you just sick and tired of dealing with conflicts, error messages, and expensive breakdowns and down time?

If so, you might consider upgrading your network to a file-server network for greater security, functionality, and file-sharing capabilities.

At one time, servers only made sense for larger organizations because of their high cost and complexity. But thanks to major advancements in technology, client-server networks are very affordable and easy-to-implement.

To learn more, call our office at 734-457-5000 and ask for Carol.

You can also send us an e-mail to request this report. Just send your request to serverreport@expertsmi.com.

Important Security Alert For Anyone Using Instant Messaging In The Workplace

October 26, 2007

According to the Radicati Group, 85% of businesses—both large and small— are now using instant messaging (IM) as a communication tool.

Unfortunately, hackers are rapidly developing ways to use IM to spread viruses and gain access to computers and networks.

Instant-messaging security vendors FaceTime Communications and IMlogic Inc. have both reported an exceptionally high spike in attacks over recent months.

IM attacks work similar to e-mail viruses; the sender tries to get the user to click on a link that takes them to a website where they’ll be infected with a virus, or it tries to get the user to download a file.

Many of these attacks appear to be from legitimate sources or people on a “buddy” list.

Just recently, FaceTime discovered a threat on AOL’s instant messenger system.  They quickly contacted AOL but tens of thousands of computers had already been infected with a peer-to-peer file sharing program called BitTorrent.

Hackers then used this program to upload movies to the victim’s hard drive and use their computer as a vehicle for sharing it with others.

These attacks are also getting more complex. Savvy IM users will often reply to an IM and ask their buddy if the link or file sent was safe.

However, hackers have now developed an intelligent bot that will actually automatically respond to the message confirming the file or link is safe. One bot actually had 6 different responses depending on the question that was asked by the user.

Just like viruses, worms, and other security threats, businesses need to put measures in place to protect themselves from these new threats.

The first step is educating your employees about these threats through your employee’s acceptable user policy. However, since there is always a chance someone will click on a link or download a file, education is not enough.

If you currently use IM, we urge you to contact our office at (734) 457-5000 so we can discuss  installing the proper software and security measures to make sure you don’t fall victim to these growing attacks.

Excel 2007 Has A “Small” Problem Multiplying

October 26, 2007

We all learned how to multiply with pencil and paper, even great big numbers and decimals. But when it comes to something important like a blueprint or a scientific formula we reach for a calculator – or a spreadsheet.

That’s much more reliable, right? Well, not if the spreadsheet is Excel 2007. Technicians have revealed that Excel 2007 thinks that 850*77.1 is 100,000.

What’s the correct answer? It should be 65,535. Other sites have verified that the error carries over into some (but not all) calculations based on the incorrect result.

If it were just 850*77.1 that gave a wrong answer, we could probably work around that. But there are tons of other problem numbers. Set up a spreadsheet to divide 65,535 by every number from 1 to 65,535 itself, then multiply the number by that result.

So, for example, the spreadsheet divided 65,535 by 26 to get 2,520.577. Then it multiplied 26 by 2,520.577 to get… 100,000?! Over ten thousand of these simple calculations gave the wrong answer.

We won’t know just why the problem comes up until Microsoft speaks out, but there is one thing about 65535 – it’s the very largest 16-bit number.

In hexadecimal (the programmer’s friend) it’s FFFF. But converting the “problem” results to hexadecimal in Excel yields FFFE. That’s  a clue.

Meanwhile, if you have any spreadsheets where some results hit the range around 65535, it might be a good idea to double-check with your trusty calculator… or a pencil.

GOOD NEWS: The Excel team has dissected the problem in detail and is working feverishly to swat this Excel bug.

And finally, two weeks after the scary announcement, Microsoft has fixed the bug. Get the hotfix now, or just wait for it to show up in Automatic Updates.

The Best Laptop You Shouldn’t Own

October 26, 2007

For about $200 you’ll soon be able to buy a laptop that comes with a web browser, a word processor, camera, built-in wireless, flash memory, open source operating system, and more.

But this laptop, called the XO, wasn’t made for you, no matter how small your business is. It was “designed for the poorest and most remote children in the world,” by the non-profit group, One Laptop Per Child (OLPC).

Its 433Mhz energy-efficient AMD processor is slow. It has no hard drive, CD, or DVD drive.  Your hands are too big for the child-size keyboard. You’d go nuts trying to run a business using this machine and its puny 7.5” screen.

But you can and should consider making a purchase. The XO will be available to buyers in the U.S. for a two-week period, from November 12  – 26.

Under a program called “Give 1 Get 1,” buyers can purchase two laptops for $399. One would be shipped to a child in a developing nation, and the other to the buyer.  If you have the budget, buy them – just have both units shipped overseas, to kids who can really use them.

On the web: www.laptop.org.

“No Virus Wednesdays” A Huge Hit!

September 26, 2007

More Than 900 Virus And Malware Infections Eradicated Thanks To Tech Experts’ Free In-Shop Scanning Service.

More than 900 virus and malware infections have been eradicated as a result of Monroe-based IT services company Tech Experts’ “No Virus Wednesdays” war on computer viruses, spyware and junk e-mail.

We are incredibly pleased with our results so far!

We’ve had more than a dozen PC users bring in their computers to be examined, and have successfully removed dangerous infections on all of the affected machines.

In July, Tech Experts announced its “No Virus Wednesdays” program, offering computer users basic spyware and virus removal services at no charge each Wednesday in July, August and September.

Since Wednesday tends to be our slowest day of the week, we decided it would be better for our techs to be destroying viruses and spyware instead of sitting around twiddling their thumbs. That’s why we decided to give away this valuable scanning and disinfecting service for FREE on Wednesdays.

It’s clear that PC infections are on the rise, and in many cases, computer users aren’t aware they’ve got a problem.

Several computers we repaired were infected with trojan-horse type malware, which was tracking the users activity on the Internet.

One machine alone had 493 distinct infected files!

Of the computers we have examined, half either did not have anti-virus software installed, or the anti-virus software was disabled or expired.

We’re obviously very concerned about how safe computer users are when they’re on the Internet which is why we’re extending our “No Virus Wednesdays” program through the end of the year.

The Tech Experts “No Virus Wednesdays” program works like this: Users who would like their computers checked and cleaned of spyware call Tech Experts’ special “No Virus Hotline” at 734-243-1500 and set up an appointment to drop off the computer late Tuesday afternoon, or first thing Wednesday morning.

The computer will be evaluated, disinfected, and available for pickup as soon as it is ready, usually late Wednesday afternoon or Thursday morning.

Computers will be checked for over 1000 types of spyware, thousands of different viruses, as well as Trojans and keyloggers.

Any malicious software that is discovered will be removed, and a complete report provided to the client.

By having users pre-schedule their appointments, the company can plan for this work and provide the service at no charge, while still maintaining its normal weekly workload.

FAIR WARNING: This free service is scheduled on a first-come, first-served basis and limited to Wednesday appointments only. Call right now for your appointment!

Survey: Success Tethered To IT Strategy

September 26, 2007

If you’re not a tech advocate, or realize the value of information technology (IT)  to your small business, it’s very likely your company will not expand as fast as you’d like or expect.

In fact a new survey of entrepreneurial mid-sized businesses, in which respondents shared insight on what moved their business ahead, notes that while recruitment, staff retention and meeting new regs are big business challenges, the top barrier is not understanding the importance of an IT strategy.

The “Business Rearview Mirror” survey ranks “managing IT to the best advantage” as the second key element in entrepreneurial success.

Small and medium sized businesses (SMB) and their tech leaders should integrate IT into the corporate strategy as early as possible. About 18 percent of respondents note that “not integrating technology into business strategy sooner” was the biggest mistake made.

And not only should SMB leaders endorse and support IT, but they should strive to be a techie and learn as much as they can—from what tech is available to what’s being used in the enterprise.

An SMB owner’s technology savvy seems to correlate directly to business success -73 percent of respondents who rate themselves as “total geeks” reported double-digit average annual growth in their businesses over the past five years.

Close to half (48 percent) of “total geeks” reported that their businesses reached the 100-employee milestone with in five years of launch, compared to just one-third of all survey respondents.

Seventy-four percent of respondents were “totally involved” in IT decision making during their companies’ early growth.

However, among the fastest growing firms (those reporting more than 20 percent average annual growth over the past five years) 49 percent reported they had a dedicated IT person or department on the payroll before they reached 100 employees in size, compared to just 24 percent for the entire survey population.

So by now can you guess the biggest business stumble SMBs make when it comes to IT?

The answer: “Not taking advantage of the technology acquired,” despite the fact that a majority ranked major technology applications for having the most significant impact to the bottom line.

That’s why it is so important for small and medium sized companies to have a trusted IT advisor, like Tech Experts.

(Special thanks to Judi Mottl of the Small Business Resource Blog, located at www.smallbizresource.com  for this article. )

Critical Bugs Plague Quickbooks Online Edition

September 26, 2007

The federal government’s cyberdefense arm has warned users of the popular QuickBooks small-business accounting software that they risk losing data and control of their PCs to hackers.

According to two advisories published by the U.S. Computer Emergency Readiness Team (US-CERT), the ActiveX control that enables Intuit Inc.’s QuickBooks

Online Edition contains flaws that attackers can exploit simply by getting users to view an HTML e-mail message or visit a malicious website.

Of the two bugs discovered and reported by US-CERT, the one spelled out here is the most dangerous. Not only could attackers seed a vulnerable Windows PC with malware, US-CERT, but “an attacker can also retrieve files from a victim’s PC.”

Copenhagen-based vulnerability tracker Secunia ApS ranked the vulnerabilities “highly critical,” its second-most serious threat rating.

QuickBooks Online Edition is a Web-based subset of the traditional on-disk software, and it uses a subscription pricing model that starts at $19.95 per month.

According to US-CERT, Version 9, and possibly those prior to that, contain the ActiveX vulnerabilities. US-CERT recommended that users update to Version 10 as soon as possible or, failing that, set the so-called “kill bit” to disable the control.

Doing that, however, means that users won’t be able to access QuickBooks Online through Microsoft’s Internet Explorer, the only browser supported by the service.

Intuit’s support site showed no mention of the bugs today. Ironically, one of the documents in the Online Edition’s support database, entitled “What is the ActiveX control for, and is it safe?” answers: “The short answer is yes, our control is safe.”

ActiveX vulnerabilities in non-Microsoft products are nothing new, of course. Just over a month ago, for example, a critical ActiveX flaw was spotted in Yahoo Widgets, a development platform that runs small, Web-based, gadget-like applications on Windows desktops.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.