Tech News

Apple’s new year comes with new malware

Apple’s new year comes with new malware We love Mac computers as much as anyone does, but even we have to admit the notion of superior cybersecurity can be a bit overblown. Malware still finds its way onto Apple devices, and the only remedy is preparedness. Take a minute to brush up on the first Apple malware of 2017 before it puts a damper on your new year.

Where did it come from?

Dubbed ‘Fruitfly’ by the powers that be at Apple, it looks as though this relatively harmless malware has been hiding inside of OS X for several years. Fruitfly contains code that indicates it was adapted to move from a previous build of OS X to ‘Yosemite,’ which makes it at least three years old.

In fact, there are some lines of code from a library that hasn’t been used since 1998. It’s possible these were included to help hide Fruitfly, but experts have no idea how long it has been holed up inside the infected machines, or who created it.

What does it do?

So far, most of the instances of Fruitfly have been at biomedical research institutions. The administrators who discovered the malware explained that it seems to be written to grab screenshots and gain access to a computer’s webcam.

Considering the specific nature of its victims, and what it can accomplish, Fruitfly seems to be a targeted attack that won’t affect the majority of Mac users. However, Apple has yet to release a patch, and dealing with malware is not something to be put off for another day.

How should I proceed?

We’re always harping on the importance of network monitoring, and now we finally have proof that we are right. Fruitfly was first discovered by an administrator that noticed abnormal outbound network traffic from an individual workstation. Until Apple releases a patch, a better-safe-than-sorry solution is to contact your IT provider about any possible irregularities in your network traffic.

If you don’t have a managed IT services provider, this is the time to start considering one. Despite misconceptions, Apple devices need just as much care and attention as Microsoft and Linux PCs. And it’s not just security; if you want to optimize workstation performance, create a disaster recovery plan, or upgrade your database. Message today to get started.

G Suite’s new updates

G Suite’s new updates Google Cloud’s popular business line of applications, G Suite, has gained traction ever since its inception, thanks to its user-friendly interface and practical features that streamline operations. Better yet, users will be happy to know that Google has just introduced five new updates that will make life easier.

Basic Mobile Management

G Suite’s Basic Mobile Management offers an agentless way to manage iOS devices by allowing admins to mandate basic security on those devices without requiring users to install mobile device management profiles. Admins no longer need to set up an Apple Push Certificate and renew it regularly.

What’s more, admins can now enforce a screen lock, wipe corporate accounts, and view, search and manage their device inventory easily. Should your organization require additional restrictions, mobile audit or application management on iOS devices, you can ensure those settings are adequately achieved using the Advanced Mobile Management option.

Explore

Available in Google Docs, Sheets and Slides, Explore gives you insights, design tools and research recommendations that allow you to easily cite findings by inserting citations as footnotes with the click of a button. You can choose between MLA, APA, and Chicago style formats, too.

Iterative calculation

Iterative calculation is the latest feature in Google Sheets (File >Spreadsheet settings > Calculation > Iterative calculation). This feature allows you to set the maximum number of times a calculation with a circular reference can take place. You can specify a convergence threshold which will stop the calculations when results from successive calculations differ by less than that threshold value, even if the maximum number of calculations has yet to be reached. It sure sounds like a mouthful, but for anyone working with spreadsheets, this is a much needed development.

Sheets Android UI

Ever feel annoyed by the language and menu search of Google Sheets in your Android device? Endure no more, as the app UI has been updated with right-to-left language settings to read and navigate. Searching the menus in Sheets on the web like in Docs and Slides can now be done, too.

Gmail messages

Bounced messages and message headers are now easier to read and understand. When your mail has problems being delivered, the bounce message now features a more user-friendly text as well as translations into your language (if the language has been set on the account). The original message will still be available below the bounce message.

Message headers, on the other hand, will be shown in a table with an easy-to-read format. Message Id, SPF and DKIM status will be right in plain view. Links to download the actual original message and the ability to copy to clipboard are now available, too. The original message header can be found below the table.

Stay tuned for more updates from Google and other cloud solutions that will help enhance productivity for your small business. If you have any questions about G Suite or would like to know about other cloud solutions that can help transform the way you work, just give us a call today.

New virus threatens virtual machines

New virus threatens virtual machines Before some of our clients have even had a chance to wrap their heads around what virtualization is and how it works, hackers have already started attacking the new and exciting technology. By updating a virus from several years ago for virtualized environments, hackers hope to totally wipe the data off your hard drives. If you utilize any sort of virtualization services, it’s imperative that you know how to steer clear of this threat.

What is it?

Back in 2012, a brand new virus called “Shamoon” was unleashed onto computers attached to the networks of oil and gas companies. Like something out of a Hollywood film, Shamoon locked down computers and displayed a burning American flag on the display while totally erasing anything stored on the local hard disk. The cybersecurity industry quickly got the virus under control, but not before it destroyed data on nearly 30,000 machines.

For years, Shamoon remained completely inactive -- until a few months ago. During a period of rising popularity, virtualization vendors coded doorways into their software specifically designed to thwart Shamoon and similar viruses. But a recent announcement from Palo Alto Networks revealed that someone refurbished Shamoon to include a set of keys that allow it to bypass these doorways. With those safeguards overcome, the virus is free to cause the same damage it was designed to do four years ago.

Who is at risk?

As of the Palo Alto Networks announcement, only networks using Huawei’s virtual desktop infrastructure management software are exposed. If your business uses one of those services, get in touch with your IT provider as soon as possible to address how you will protect yourself from Shamoon.

On a broader scale, this attack shows how virtualization's popularity makes it vulnerable. Cyber attackers rarely write malware programs that go after unpopular or underutilized technology. The amount of effort just isn’t worth the pay off.

Headlines decrying the danger of Shamoon will be a siren call to hackers all over the globe to get in on the ground floor of this profitable trend. It happened for ransomware last year, and virtual machine viruses could very well turn out to be the top security threat of 2017.

How can I protect my data?

There are several things you need to do to ensure the safety of your virtual desktops. Firstly, update your passwords frequently and make sure they’re sufficiently complex. Shamoon’s most recent attempt to infect workstations was made possible by default login credentials that had not been updated.

Secondly, install monitoring software to scan and analyze network activity for unusual behavior. Even if legitimate credentials are used across the board, accessing uncommon parts of the network at odd hours will sound an alarm and give administrators precious time to take a closer look at exactly what is happening.

Ultimately, businesses need virtualization experts on hand to protect and preserve desktop infrastructures. Thankfully, you have already found all the help you need. With our vast experience in all forms of virtualized computing, a quick phone call is the only thing between you and getting started. Call today!