Facebook
New MalWare “NotPetya” hits the Net

New MalWare “NotPetya” hits the Net

A New Version Out – Malware Protection Updated

28-06-2017

If you are a KeyTech managed Services Client, your malware detection has been updated to curb this new threat. We made sure our clients are protected and servers were safeguarded.

[shareaholic app=”share_buttons” id=”12025595″]

[one_second]Check attachments before opening
[/one_second]
[one_second]Please make sure the attachments and emails you open are from a reliable domain and a real person.

Always be aware of this kind of threat and secure your systems with actively managed services and updated malware protection. The ransomware locks up Windows PCs and demands a ransom of $$$ to unlock them.

Early reports from a Kaspersky researcheridentified the virus as a variant of the Petya ransomware, although the company later clarified that the virus is an entirely new strain of ransomware, which it dubbed “NotPetya.”
[/one_second]


Kaspersky telemetry indicated that at least 2,000 users had been attacked by the virus as of the eve of 27 June 2017. Two separate firms have reported the new ransomware employs the same exploit used by WannaCry (ExternalBlue), allowing it to spread quickly between infected systems. Published by the Shadow Brokers in April, EternalBlue targets Windows’ SMB file-sharing system and is believed to have been developed by the NSA.

Microsoft has since patched the underlying vulnerability for all versions of Windows, but many users remain vulnerable, and a string of malware variants have employed the exploit to deliver ransomware or mine cryptocurrency.


Microsoft said it was continuing to investigate the attack.

According to research by The Verge, Microsoft stated “Our initial analysis found that the ransomware uses multiple techniques to spread, including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 (MS17-010),” a spokesperson said in a statement.

As ransomware also typically spreads via email, customers should exercise caution when opening unknown files. We are continuing to investigate and will take appropriate action to protect customers.

Extra powers

NotPetya has some extra “powers” that security experts say make it deadlier than WannaCry. While EternalBlue has allowed it to spread via a weakness in Windows’ SMB, it has other tools for moving at speed across networks. For instance, according to former NSA analyst and cybersecurity entrepreneur David Kennedy, the ransomware finds passwords on the infected computer to move to other systems. It does that by extracting passwords from memory or from the local filesystem, he explained.


Call our IT Team for a more up to date system in your office.

1300 755 615


Our Approach to delivering Real I.T. Business Solutions

Key Technologies mission is to partner with Small & Medium sized businesses to help them understand how technology can make the task of doing business easier. Easier business means a more profitable, dependable and valuable business for owners. We aim to do this by demystifying technology using language that makes sense, and offering actual solutions that deliver business improvements rather than selling equipment.


tech improvements to boost your business

Fast WIFI Technology AC

Fast WIFI Technology AC

Fast Wi-Fi just makes life better – it’s a known fact.

You can have the fastest NBN in the world, but you need to be able to access it in every corner of your office.

To this end, you need a good Wi-Fi router. Today Wifi Technology is constantly on the improve. There is a technology called 802.11ac that enables compatible devices to connect on faster Wifi Speeds.

The big difference between 802.11ac and the older 802.11n Wi-Fi standard is in outright speed; where N routers seem to top out at a maximum of around 900Mbps theoretical throughput, we’re seeing new AC routers like the ASUS RT-AC3200 hit 2600Mbps – almost three times as fast.

802.11ac is a relatively new Wi-Fi standard, only having been ratified and approved in January of this year. 802.11ac was finalised in 2013 and you will find it in every major smartphone, laptop and desktop computer and smart television. It succeeds the equally-badly named ‘802.11n’ which has been around since 2007 and brings some major benefits.

What are the notable differences?

Speed, Range and Availability.

There are obvious performance benefits, particularly for single antenna devices like smartphones. Secondly it is more battery efficient because WiFi needs to be active for less time when data transfers can complete more quickly. Thirdly with proliferation comes scales of economy which bring down the price.

Furthermore 802.11n only supports up to four antennas at roughly 100Mbps (12.5MBps) each so when you do the maths for devices using 802.11n antennas the gap begins to widen.

Do Your Devices Support 802.11ac?

There’s not too much point in paying the extra for 802.11ac if you don’t have any devices that can take advantage of it. Of course, a Wi-Fi router is a long-term investment, so you should be planning for the future; an 802.11ac-capable router will also almost certainly provide better 802.11n Wi-Fi than the non-ac competition, purely through it being newer and more powerful.

802.11ac isn’t just about the router

Pricing

When it comes to pricing most devices you buy have already integrated 802.11ac so you won’t be consciously paying more for it.

Where there is still a jump in price, however, is routers. Wireless AC routers still tend to have a 20-50% premium (depending on model), but as ageing routers risk becoming the speed and range bottleneck for every Internet connected item in your home these much neglected devices are worth a little more investment.

Compatibility

Chipsets featuring 802.11ac are fully backwards compatible with previous WiFi standards.

This means it works perfectly with 802.11a (introduced in 1999), 802.11b (2000), 802.11g (2003) and 802.11n (2007). The bad news is you will be limited to the performance of the older standard and will only get the full benefits of ‘Wireless AC’ or ‘AC WiFi’, as it is also known, if you are connecting from 802.11ac to 802.11ac. That means an 802.11ac router and an 802.11ac device.

Need a tech strategy for your business?
Talk to us about your needs on 1300 755 615

tech improvements to boost your business


To stay up to date with the latest articles connect with us directly on LinkedIn and Google+.
Android O release date

Android O release date

Android O release date

The next Android update comes later 2017. Android O is the next coming version of Google’s mega-popular mobile operating system set to release this year.

This is relevant to a Google Pixel, Google Pixel XL, Nexus 6P, Nexus 5X or Pixel C.

This big Android update for 2017 will continue its beta following the Google IO 2017 presentation and will likely debut in full first on the Google Pixel 2.

Don’t have a Google-branded phone? The company announced Project Treble, an initiative that will ensure that Android O comes to many more devices than previous operating system updates.

Some Features We like:

Faster boot times

Speedy boot times are usually associated with a step-up in hardware – Google unveiled that Android O will bring those benefits to all phones that run the software.

It’s not just the operating system that becomes faster to load up, but the apps on your phone too.

Restricted background activities

This is a power-saving feature that de-prioritizes app functions running in the background, which in turn means that your battery is going to possibly last much longer than it currently does on Android Nougat.

Paired with likely improvements to the Doze function that intelligently saves battery during down-time, it’s feasible that Android O could help squeeze an extra few hours out of your phone battery life from fully charged to depleted.

[shareaholic app=”share_buttons” id=”12025595″]



WannaCry Worm causing mayhem

WannaCry Worm causing mayhem

How to stop WCry ransomware infecting your computers

THIS is what you should do when after you turn on your computer this morning to avoid the massive cyber attack.

15 May 2017


Aussies may have missed the worst of the worldwide cyber attack but small businesses are still at risk of being infected by the WCry ransomware. Here is what you should be doing:

  • Update your Microsoft Software before opening emails.
  • Be vigilant before clicking on links, check urls!
  • Update your anti-virus and security software

If you don’t open or click on to the infected sites then you won’t be impacted.

This type of ransom ware spreads via phishing, which spreads the virus through an email that appears to be from an individual or business that you know.

The virus also has a worm-like features that looks for other vulnerable systems once it’s embedded in your computer, which means it can spread to other computers in a network.

Australia looks to have missed the worst of the attack as it didn’t seem to have infected government agencies or critical infrastructure, people shouldn’t be complacent. The most vulnerable will be outdated pcs and software.

The ransom

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It’s not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

People who have yet to install the Microsoft fix—MS17-010—should do so right away. People should also be extremely suspicious of all e-mails they receive, particularly those that ask the recipient to open attached documents or click on Web links.

Do not pay these criminals.

For IT Support or help with your business cyber security,
call Key Technologies  on 1300 755 615

[shareaholic app=”share_buttons” id=”12025595″]


Phishing notification – fake Docusign email

Phishing notification – fake Docusign email

Phising Emails – why they do damage

Published on: May 10, 2017

“Phishing” specifically describes the process by which a malicious person tries to find out sensitive information about you or your accounts using the a phishing email to try to get you to voluntarily provide information. They do this by creating fake websites and branding to get you to enter details online. They will try to get you to visit a malicious website via a link on that email.


DOCUSIGN AS A MASK

A new Phishing email scam has come to our attention.  Scammers have now started using Docusign as a mask to install their software on unsuspecting individuals.

phishing

Sample of a fake email

To a busy person it is easy to miss the tell-tale signs of an email scam as it is very close to an original Docusign email. Those that are on Office 365  will already have this picked up for them but other systems may not pick up that this is a scam.

Always hover over a link before clicking on it.  Make sure that the email is from who it says it is by checking out the URL.  Check where the link is taking you to without clicking, hover over it to have a look first.  A legit Docusign email will always take you to the correct url / Docusign webpage to retrieve and view documents.


FRAUDULENT EMAIL & WEBSITES

First and foremost, if you don’t recognize the sender of a DocuSign envelope and you are uncertain of the authenticity of an email, look for the unique security code at the bottom of the notification email. All DocuSign envelopes include a unique security code. If you do not see this code DO NOT click on links or open attachments within the email.

WHAT SHOULD I DO IF I RECEIVE A SUSPICIOUS EMAIL?

First and foremost, if you don’t recognize the sender of a DocuSign envelope and you are uncertain of the authenticity of an email, look for the unique security code at the bottom of the notification email. All DocuSign envelopes include a unique security code.

If you think that you have received a fraudulent email, please contact DocuSign Security immediately at spam@docusign.com.

If there is a security code…

  • Access your documents directly from www.docusign.com, click Access Documents then enter the unique security code.

If there is NO security code…

  • DO NOT click on links or open attachments within the email. This is not a valid DocuSign email and it should be sent to our security team immediately at spam@docusign.com

Docusign email

Sample of a real Docusign email

Spot fraudulent emails and web sites by checking for the following signs:

1. Fake links:

As described above, avoid fake links by accessing your documents directly from www.docusign.com using the unique security code found at the bottom of the DocuSign notification email.

Always check where a link goes before you click on it. You can hover your mouse over the link to look at the URL in your browser or email status bar (they should be hosted on docusign.com or docusign.net). A fraudulent link is dangerous and can:

  • Direct you to a fake website that tries to collect your personal data.
  • Install spyware on your system. Spyware is an application that can enable a hacker to monitor your actions and steal any login IDs, passwords, or credit card numbers you type online.
  • Cause you to download a virus that could disable your computer.
2. A fake sender’s email address:

Fake emails may include a forged email address in the “From” field. This field is easily altered. If you don’t recognize the sender of a DocuSign envelope, contact the sender to verify the authenticity of the email.

3. Attachments:

DocuSign email requests to sign a document never contain attachments of any kind. DO NOT OPEN or click on attachments within an email requesting your signature. DocuSign emails only contain PDF attachments of completed documents after all parties have signed the document. Even then, pay close attention to the attachment to ensure it is a valid PDF file. DocuSign NEVER attaches zip files or executables.

4. Generic greetings:

Many fake emails begin with a generic greeting like “Dear DocuSign Customer.” If you do not see your name in the salutation, be suspicious and do not click on any links or attachments.

5. A false sense of urgency:

Many fake emails try to deceive you with the threat that your account is in jeopardy if you don’t provide immediate updates. They may also state that unauthorized transactions have occurred on your account or that DocuSign needs to update your account information immediately.

6. Emails that appear to be websites:

Some fake emails are made to look like a website in order to get you to enter personal information. DocuSign never asks you for personal information, including login, ID, or password in email.

7. Deceptive URLs:

Check the Web address. Just because the address looks OK, don’t assume you’re on a legitimate site. Look in your browser’s URL bar for these signs that you may be on a phishing site:

  • Incorrect company name. Often the web address of a phishing site looks correct but actually contains a common misspelling of the company name or a character or symbol before or after the company name. Look for tricks such as substituting the number “1” for the letter “l” in a Web address or transposing consecutive letters of the brand (for example, rea1estate.docusign.com instead of realestate.docusign.com or www.docusing.com instead of www.docusign.com).
  • “http://” at the start of the address on DocuSign sign-in pages. A legitimate DocuSign sign-in page address starts with “https://” – the letter “s” must be included. So check the website address for any DocuSign sign-in page.
  • Browser warnings. Your browser has ways of detecting certain types of malicious sites. Always heed these browser warnings, especially when they notify that the site or certificate cannot be trusted.
8. Misspellings and bad grammar:

While no one is perfect, fake emails often contain misspellings, incorrect grammar, missing words, and gaps in logic. Mistakes like this help fraudsters avoid spam filters.

9. Unsafe sites:

The term “https” should always precede any website address where you enter personal information. The “s” stands for secure. If you don’t see “https,” you’re not in a secure web session, and you should not enter personal data.

10. Pop-up boxes:

DocuSign will never use a pop-up box in an email as pop-ups are not secure.

If you think that you have received a fraudulent email, please contact DocuSign Security immediately at spam@docusign.com

[shareaholic app=”share_buttons” id=”12025595″]


For more information, please call our
IT team on 1300 755 615.

Telstra Internet Direct

Telstra Internet Direct

TELSTRA INTERNET DIRECT

Internet access you can rely on Telstra Internet Direct is a secure, high-performance internet service with exceptional availability and scalability. It is designed to support business-critical operations and provide a consistent, quality experience for your staff and customers.

With Telstra Internet Direct, you have a dedicated, carrier-grade link to one of the largest internet backbones in Australia – providing greater national coverage – as well as the global internet. We offer more Points of Presence in Australia than other providers, plus more than 900 Points of Presence world-wide for ease and speed of access.

Our high capacity network has full redundancy and inbuilt security, backed by proactive monitoring and management. You also have the assurance of 24/7 helpdesk support, while an online portal lets you view, troubleshoot and manage your service. Telstra Internet Direct gives you the flexibility to choose from a wide range of carriage types, speeds, usage and pricing, the option of IPv6 addressing, as well as a range of additional services.

FeaturesBenefits
An individual, secure, uncontested carrier-grade connection to the internetHelps you avoid congestion and configuration issues
Direct access to one of Australia’s largest internet backbones through more than 88 Points of Presence locally. All capital city access points are connected with minimum 10 Gbps links
to the core network with a maximum of only two hops
Ease of access to your business across all Australian capital cities and many regional areas with faster speeds
Dedicated internet infrastructure in over 15 countries and more than 900 Points of Presence globally through our partnersMinimised hops internationally for better performance
High levels of clear bandwidth capacity over optical fibreHelps to reduce latency and packet loss during data transit
Built in security measures at multiple layers and devicesHelps keep your communications and online transactions safe and private
24/7 monitoring and management of our network plus full redundancyHigh levels of availability to support your operations
Technical helpdesk, plus a dedicated online helpdeskHelps to ensure any issues are resolved quickly
A wide choice of data access methods including ADSL, Ethernet Lite, IP Gateway, E-Line, Optic Wave™ and Ethernet MAN (with the exception of satellite and cable)Flexibility to have the access type that suits different site requirements
A wide range of speeds from 512kbps with Ethernet Lite to 1Gbps with Ethernet MAN and 10Gbps with E-Line and Optic Wave™Choose the speed that matches your business needs at each site
A choice of pricing plansEnables you to combine economy with performance.
For Unlimited Plan Users: have greater flexibility through on-demand bandwidth features and your routers will have an enhanced feature for allocating bandwidth to your users.
For ‘Limited’ Plans Users: gain greater flexibility from shared bandwidth allowances.
CustData online portal – a secure portal accessible by most web browsers with easy navigation lets you:

  1. check monthly usage reports
  2. manage usage threshold alerts
  3. configure services eg routing
  4. test services
  5. log faults
  6. use performance reporting tools
  7. manage contact details
View and manage your service performance, plan network capacity and budget requirements
Network Visibility online toolAllows you to assess your network path and routing information, and self-diagnose network issues without needing to contact us.
Static IP addressingEnables you to host your own content – additional IP addresses are available on request
Option of IPv6 addressing across Ethernet MAN, Ethernet Lite, or Ethernet LineFuture-ready – use the new addressing protocol when you need to
Optional services – Telstra Internet Direct
can integrate with compatible Telstra services, such as Security Services, Cloud Services (through Co-location), and equipment via Managed Data Networks
Combine extra services to suit your business and have the simplicity of one contact point

Things you need to know

To connect to Telstra Internet Direct, you must have a Telstra carriage service. The range of connecting carriage services that support Internet Direct include ADSL (Multi-Site), Ethernet Lite, Ethernet MAN, Ethernet Line, Optic Wave™, IP Gateway, and Managed Facilities-Co-location.
Refer to http://www.telstra.com.au/customer-terms/business-government/internet-services/internet-solutions/