SMS spam more dangerous than email spam

By on September 11, 2013 in Blog, Mobile devices, Security

Malicious text messages are posing a far greater threat to web users than virus-ridden emails, it has been claimed, with six million spam text messages thought to be deployed every day in the UK.

These messages are often used in phishing scams where the SMS will attempt to force the customer into clicking on a link. Once this has been done, it may ask them to ‘verify’ – or hand over – sensitive information such as credit card details or a social security number.

After seeing little evidence of this issue going away, Neil Cook, Chief Technology Officer of security firm, Cloudmark, is now warning that SMS malware could represent a much more pressing danger than malicious emails.

He said that people are much more likely to open text messages than emails and that they tend to be opened quicker as well.

Mr Cook also suggested that the smaller screens on mobile devices could make it harder to spot a malicious SMS, leaving smartphone users in the dark over the real content of their texts.

“As a result it is far easier to get someone to open a message telling them to ring a number or visit a website than on email,” he added.

Phone users’ trust is misguided

Cook went on to highlight that smartphones are currently a more trusted medium than email, making users more susceptible to phishing scams.

A University of Minnesota report has suggested that two-thirds of mobile phone users were subjected to SMS spam last year (2012). Researchers uncovered 350,000 variants of SMS spam sent over the course of 2012 – a period where over 4.5 billion mobile spam messages were deployed.

One of the study’s authors, Yu Kin from AT&T Labs, said this could be resulting in serious financial losses for the victims of the attacks as well as degraded network performance for carriers.

Android the target for 79 per cent of mobile malware

By on September 10, 2013 in Blog, Mobile devices, Security

Android devices are the target for 79 per cent of all mobile malware, according to US authorities. Whilst the operating system is by far the most popular in the global smartphone market, this fame seems to have come at a price for its users.

Public information website Public Intelligence has uploaded findings from the Department of Homeland Security and a Federal Bureau of Investigation memo which suggest that Android devices are the most vulnerable to mobile attacks.

The figures say almost eight in ten forms of mobile malware are designed for the Android operating system, while Apple’s iOS platform held just 0.7 per cent of all attacks. Nokia’s Symbian software made up most of the remaining share by attracting 19 per cent of mobile malware.

Attacks on mobile devices include text Trojans, which see the sending of SMS messages to premium-rate numbers without the phone owners’ knowledge or permission. These accounted for half of the Android attacks on older systems like 2.3.3 – or ‘Gingerbread’ – which are still being used by 44 per cent of users.

Android users take responsibility

One problem is that not all Android users run new versions of the software and, without vital patch fixes, their phones represent an easy target for criminals.

Figures from the report show that just 33 per cent of Android users are running the latest version of the operating system, Jelly Bean. Contrast this with the 93 per cent of Apple users are equipped with the latest iOS 6 system.

“The growing use of mobile devices by federal, state and local authorities makes it more important than ever to keep mobile OS patched and up-to-date,” said the report.

Whilst Android owner, Google, has attributed the findings to its large share of the market, the search giant said its system’s “open source architecture” could also be playing a part in the figures.

After ‘phishing’ comes ‘vishing’

By on September 10, 2013 in Blog, Security

According to new research from Financial Fraud Action UK (FFA), Brits could be scammed out of some £7 million every year by fraudsters targeting unsuspecting victims by telephone.

So-called “vishing” (yes, it’s a portmanteau of ‘voice’ and ‘phishing’) has risen steadily over the past year, with those aged 50 or over thought to be the biggest targets.

Vishing involves tricking people to reveal personal details or financial information over the telephone, which can then be used to make fraudulent payments or set up money transfers using a stolen identity.

Vishing for information

It has now been estimated that around a quarter of all UK adults could have been the victims of vishing in the past financial year, of which 43 per cent were aged 50 or above. In addition, around a third of British adults were thought to have received at least ten cold calls in the same time frame, with 41 per cent of these thinking that at least one was fraudulent or suspicious.

The survey of 2,000 adults by the FFA also found that four in ten people said they found it difficult to determine between genuine calls and those made by fraudsters. Much of this is because these crooks will often claim to be from the bank, local police or even an internet service provider. Under the guise of confirming security questions or matching up data, they can then extract sensitive information such as bank details, names and addresses from the individual.

In a statement, DCI Dave Carter, head of the Dedicated Cheque and Plastic Crime Unit told esecurityplanet.com: “Fraudsters can use personal information gleaned from vishing in a number of ways including to access a victim’s bank account, make fraudulent purchases and commit identity theft.

“Always be wary of cold callers who suggest you hang up the phone and call them back. Fraudsters will keep your phone line open by not putting down the receiver at their end,” says DCI Carter, referring to these criminals’ ploy to try to put their victims at ease.  While you think you are making a new call to a genuine number, you are, in fact, being kept on the line on the same call – they may even have a recording of a dial tone to make it seem genuine.

Carter added: “Remember that it takes two people to terminate a call, so try and use a different phone line if you are asked to ring back.”

Windows XP and Office 2003 Support Ends April 8, 2014

By on August 28, 2013 in Blog, Microsoft

Why is Microsoft ending support for Windows XP and Office 2003?

In 2002 Microsoft introduced its Support Lifecycle policy based on customer feedback to have more transparency and predictability of support for Microsoft products. As per this policy, Microsoft Business and Developer products, including Windows and Office products, receive a minimum of 10 years of support (5 years Mainstream Support and 5 years Extended Support), at the supported service pack level.

Thus, Windows XP SP3 and Office 2003 will go out of support on April 8, 2014. If your organisation has not started the migration to a modern desktop, you are late. Based on historical customer deployment data, the average enterprise deployment can take 18 to 32 months from business case through full deployment. To ensure you remain on supported versions of Windows and Office, you should begin your planning and application testing immediately to ensure you deploy before end of support.

What does end of support mean to customers?

It means you should take action. After April 8, 2014, there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates.

Running Windows XP SP3 and Office 2003 in your environment after their end of support date may expose your company to potential risks, such as:

  • Security & Compliance Risks: Unsupported and unpatched environments are vulnerable to security risks. This may result in an officially recognised control failure by an internal or external audit body, leading to suspension of certifications, and/or public notification of the organisation’s inability to maintain its systems and customer information.
  • Lack of Independent Software Vendor (ISV) & Hardware Manufacturers support: A recent industry report from Gartner Research suggests “many independent software vendors (ISVs) are unlikely to support new versions of applications on Windows XP in 2011; in 2012, it will become common.” And it may stifle access to hardware innovation: Gartner Research further notes that in 2012, most PC hardware manufacturers will stop supporting Windows XP on the majority of their new PC models.

Get current with Windows and Office. This option has upside well beyond keeping you supported. It offers more flexibility to empower employees to be more productive, while increasing operational efficiency through improved PC security and management. It also enables your organisation to take advantage of latest technology trends such as virtualisation and the cloud.

How do I begin my migration?

Enterprise Customers: Microsoft offers large organisations in-depth technical resources, tools, and expert guidance to ease the deployment and management of Windows, Office and Internet Explorer products and technologies.

Small to Medium Business:  There are many options for small and medium businesses considering moving to a modern PC with the latest productivity and collaboration tools. Small to mid-size organisations should contact us as soon as possible  to understand the best options to meet their business needs.

To learn more about migration and deployment programs, please contact your M2 Computing sales representative on 01293 871971 or via email sales@m2computing.co.uk.

 

Security fears prevent businesses from recycling

By on August 13, 2013 in Blog, Security

New research has indicated that concerns over the leaking of confidential data by British businesses are leading the vast majority to dispose of their IT equipment in an irresponsible manner.

Recycling company Business Waste surveyed 500 customers and prospects to find that a staggering 95 per cent of machines are going straight to landfill rather than to dedicated electronic waste recycling centres.

The survey claimed that by adopting such a careless approach to electronic waste recycling, many businesses are displaying their lack of knowledge of UK and Europe-wide regulations for the disposal of electronic equipment.

Mark Hall, commercial director of Business Waste, says that his own company is seeing “more and more” electronic waste being inappropriately discarded.

He attributes this to concerns amongst British businesses over data security, with many deciding to destroy their computers to prevent the leaking of sensitive data.

“Nervous bosses are worried that their data could fall into the wrong hands if it is sent for recycling. Scares over identity theft and corporate crime mean that they’d rather completely destroy computer goods themselves than hand [them] to a third party to be disposed of correctly.”

Mark Hall, commercial director, Business Waste

Hall says that companies are wasting money, energy and resources by disposing of their electronic waste incorrectly. Instead, he recommends they wipe all data from their equipment before sending it for recycling.

As he highlights, it takes around a quarter of a ton of fossil fuel, 48 pounds of chemicals as well as a ton and a half of water to make one computer, meaning companies would be doing their bit for the environment by recycling their machines.

Campaign against passwords

By on August 9, 2013 in Blog, New technology, Security

What don’t we want? We don’t want passwords. When don’t we want them? Well, right now there is a group of online lobbyists calling on internet users everywhere to join their crusade against the use of passwords to log into websites.

The Petition Against Passwords was set up in an attempt to move the industry away from its current reliance on passwords and towards a different, more technologically-advanced technique.

The trouble is that, as things stands, there is no feasible alternative to passwords that can be rolled out on a global scale. That’s why many are calling for investment to be thrust into discovering new solutions since passwords are notoriously insecure – as has been illustrated in recent high profile breaches on sites including Twitter, Evernote, Living Social and Drupal.

Now, rivals Clef and LaunchKey have teamed up alongside Tech Freedom to create the Petition Against Passwords. After gaining a few hundred signees almost immediately, the group soon realised this was an issue the public feels quite strongly about.

Alternatives are either expensive or experimental

As yet, however, the only feasible alternatives are either expensive or still in their infancy. Fingerprint or iris scanners, for example, require additional hardware, whilst the more ‘out there’ alternatives such as brainwave measurements and electronic tattoos are still firmly in the development stage.

Explaining why the petition was set up in the first place, Clef co-founder Jesse Pollak told pcworld.com: “If we can combine all the voices of the people who in the past have been silent about their issues with passwords and bring them together and be like “Hey, this is an issue that we need to be talking about”, then as a group, we can enact a lot more change than we would be able to individually.”

He went on to add, however, that as only 250 sites currently support the technology used by Clef, there was still a long way to go.

Heatwave puts backup against the wall

By on August 6, 2013 in Blog, Infrastructure

The record temperatures we have seen in recent weeks have been making life uncomfortable for many UK workers, but they are also testing the resolve of your battery backup systems.

Many businesses install uninterruptible power supplies to servers and other critical devices to protect against power surges and provide vital backup in the case of a power cut.

UPS batteries can last for up to 5 years if looked after properly. But did you know that performance is affected significantly by ambient temperature with battery life being reduced by as much as 50% for every 10 degree rise above recommended operating temperatures?

Most manufacturers state optimal operating temperatures of between 19 and 22 degrees, so in recent weeks, where temperatures have risen into the thirties, the life of your battery backup could be seriously compromised if it is not stored in an air-conditioned room and away from direct sunlight.   If you have any other questions regarding UPS protection for your IT equipment please call us today.

5 handy Word tricks

By on August 5, 2013 in Microsoft, Productivity, Tips & tricks

Most of us know how to use Microsoft Word and do so regularly. But often our knowledge of everyday programs barely scratches the surface of their capabilities. Here are 5 things you may not realise you can do in Word.

1. Configure paste options

When you paste text into a document, Word tries to lend a helping hand by automatically keeping the source formatting and offering the option to change it to match your document’s formatting.

Rather than having to select this every time, you can click on the ‘Office’ button then on ‘Word Options’ and go to ‘Advanced’. From the ‘Cut, Copy and Paste’ heading choose a default setting for format pasting using the four dropdown menus. Untick the ‘Show Paste Options Buttons’ box and you won’t be prompted to select formatting in the future.

2. Change how justification displays

Applying full justification to text in Word will vertically align it flush to the sides of the page. But this can sometimes mean there is so much white space between words that it doesn’t look quite right.

Did you know there is an option to use a different style of justification, where spacing is distributed between lettering rather than words.? To activate this, click on the ‘Office’ button, then ‘Word Options’. Click on ‘Advanced’ and find and expand the ‘Layout Options’ entry at the bottom. Tick the box called ‘Do Full Justification the Way WordPerfect 6.x For Windows Does’ then ‘OK’.

3. Hide the ribbon

Whilst many love the ribbon, others find it irritating. If you fall into the latter category, you’ll be pleased to learn you can hide it.

Simply click on the down arrow at the end of the ‘Quick Access Toolbar’ and untick ‘Minimize the Ribbon’. You can also navigate to this by right-clicking anywhere on the ribbon.

An alternative way to hide the ribbon quickly is to hold down [Ctrl] and [F1] on your keyboard – perform the same action to retrieve it.

4. Adjust the spacing in headings

You can adjust the text space in headings to ensure it fits without wrapping into another line.

All you need to do is select a line of text, right-click, then choose ‘Font’ from the menu that appears. You can then use the up and down arrows in the ‘Spacing’ section to expand or contract the text.

5. Compare documents on your screen

If you wish to compare two documents, you can do so by opening them side-by-side. If you are using Word 2007 or 2010, open both documents then click on the ‘View’ tab on the ribbon. Next click on ‘View Side by Side’ and ‘Arrange All’. So that you can navigate your way through both documents, click on ‘Synchronous Scrolling’.

How we feel about online privacy

By on August 2, 2013 in Blog, Internet

No doubt there’s a US citizen holed up in Moscow airport who already knew this to be the case, but research now confirms three quarters of consumers are unhappy with current online privacy.

ComRes polled more than 10,000 people in nine countries including the UK and found that 75 per cent of respondents were concerned about their privacy. Two out of every three who took part in the survey believed that national regulators should do more to force the likes of Google to comply with current privacy laws.

Nick Pickles, director of Big Brother Watch, which commissioned the study, said: “The widespread support for EU regulators to do more to ensure Google complies with existing privacy regulations highlights how people want to see real, concrete action taken to protect their privacy.”

Over 40 per cent of respondents said consumers are being harmed by big companies gathering large data sets for internal use. Although, in Germany, a country with some of the most stringent data protection laws in the world, the concerns fell significantly. Only 44 per cent said they were worried about their online privacy.

71% of UK respondents feeling uneasy

In India, 95 per cent of respondents said they were concerned about their data, followed by Brazil and Spain (90 per cent). In the United Kingdom, 71 per cent felt uneasy about how their data was being handled.

Recently, the Information Commissioner’s Office (ICO) took legal action against Google with regards to some of the data collected by the Street View cars.

Rather than issue a fine, the ICO ordered Google to delete the data in question within 35 days; a move which many say was too soft of on the tech giant.

“Online privacy is a global issue of real importance to people and the overwhelming message is that citizens do not feel their authorities are doing enough about the desire of large companies to collect vast amounts of data on them,” Pickles concluded.

 

Eleven more towns enjoy 4G

By on July 8, 2013 in Blog, Internet

UK mobile operator EE continues to capitalise on its first mover advantage by extending its 4G network to 11 more towns this week.

The expansion into Aldershot, Basildon, Basingstoke, Bracknell, Hitchin, Horsham, Leatherhead, Letchworth, Stevenage, Warrington, and Weston-Super-Mare means that the carrier’s 4G network now covers 55 per cent of the population.

In 2012, EE – formerly Everything Everywhere – managed to gain approval from Ofcom to use its surplus spectrum for 4G, despite other operators arguing that it was not in the interest of fair competition.

Half a million 4G subscribers so far

While EE met criticism over the pricing of the service, this head start has unarguably put it in a commanding position. The network now extends over 85 cities and towns and has half a million active subscribers. It is also planning to double its download speeds in ten major cities by the end of the summer – with average speeds of 20Mbps and headline speeds of 80Mbps.

Meanwhile, the other operators are slowly but surely drawing their plans against EE. Vodafone spent more money at the 4G auction than any other operator and looks like the strongest contender to give EE a run for its money. The company has said that it expects to launch sometime towards the end of summer, to coincide with the launch of the next iPhone.

Three, which was allocated a portion of the 4G spectrum in the interests of fair competition, has announced that it will have unlimited data plans; a move which the other operators have dubbed unsustainable. Meanwhile o2, which arguably came out worst from the auction, has struck a deal with BT which could see some form of 4G merger take place – although very few details have been released.