Tag Archives: hackers

Apple iMessage Breach Last Month

Internet trolls can breach any type of system if it is not properly secured. Emails and software are just two ways they can infiltrate your pc without your awareness.

The motivations for these attacks range from stealing data to financial gain. They also crash business computers in order to shut them down. One breach, in particular, occurred last month against the software giant, Apple.

Apple’s iMessage Security Breach

Apple has put out a new security update to fix a flaw that caused a software breach for months, The Wall Street Journal (WSJ) reported Monday (Sept. 13).

NSO Group, an Israeli cybersecurity firm, has been exploiting a vulnerability to silently infect iPhones using iMessage since February, WSJ reported, citing research group Citizen Lab, which looks into cyberattacks on “journalists and dissidents.”

The intrusion was ominous to Citizen Lab because it was a “zero click” attack, referring to an attack in which the user doesn’t need to click a link or open a document to be attacked, according to the report.

John Scott-Railton, one of the Citizen Lab researchers, told WSJ that “anyone with iMessage” could be infected unknowingly. He added that the software was “rare and probably expensive,” and that it likely was developed with a substantial amount of work.

Source: Pymnts.com

What can you do?

You can take steps to improve your cyber-defenses, such as making sure your important files and data are backed up to secure cloud storage. We recommend Carbonite online backup solutions which will safeguard your data against any type of attack or dilemma.



If you are needing assistance with any malware issues, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought by our staff at Arlington Computer Repair Service. If you need computer repair in Arlington, TX please call the local office at (817) 756-6008.

The Importance of Multi Factor Authentication

Last month, the RSA had their security conference, and Microsoft shared quite the alarming statistic about user accounts.

They stated that while 95% of users are protected, there’s still 5% that remains compromised. This 5% is what hackers feed upon. And while 5% of users doesn’t seem like a big number, that rounds out to be around 1.2 million logins every month.

Not only that, but Microsoft engineers said that most, if not all, of these risked accounts are not using MFA, or multi-factor authentication. This system allows a lower risk of a possible compromise to your account – which is incredibly important to any personal information you may have stored. For Office 365 users, set up a 2-step verification here.

Using multi-factor authentication is one of the easiest and most effective ways to increase the security of your organization. It’s easier than it sounds – when you log in, multi-factor authentication means you’ll type a code from your phone to get access to Microsoft 365. This can prevent hackers from taking over if they know your password. Multi-factor authentication is also called 2-step verification. Individuals can add 2-step verification to most accounts easily, for example, to their Google or Microsoft accounts.

-Microsoft Docs

For help updating, restoring or dealing with any security issues, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Denver Computer Repair Service, if you need computer repair in Denver, CO please call or text the local office at (720) 441-6460.

Windows 10 Ransomware E-Mails – Do NOT Download

If you get an e-mail telling you to install Windows 10 updates, simply delete it.

Newly discovered malware is asking victims to update to the most recent version of Windows 10. ‘Install Latest Microsoft Windows Update immediately!’ or ‘Critical Microsoft Windows Update!’ appears in the subject line, and when you open it, a file extension attachment appears for you to click on.

This malicious download will infect any computer that downloads the “.jpg” file extension. TechRadar reported that the download, “encrypts all of the files on the infected user’s system and appends their filenames with its own file extension, 777. A ransom note with the filename ‘Cyborg_DECRYPT.txt’ is then left on the desktop of the compromised machine. Finally, the ransomware leaves a copy of itself called ‘bot.exe’ hidden at the root of the infected drive.”

The GitHub file name

The file is called ‘bitcoingenerator.exe’ and the GitHub account is named “misterbtc2020”. This ransomware locks your PC and your files, encrypted. For a ransom, you can receive your files as decrypted.

Make sure your antivirus is up to date on your computer to avoid any and all malicious cyber attacks. Also, remember that Windows 10 updates only push through its operating system and not through e-mails.


If you ever have an issue with any Windows 10 updates, give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you by our staff at the Garland Computer Repair Service. If you need computer repair in Garland, TX please call or text the local office at (469) 299-9005.

Internet Explorer Being Used by Hackers

Microsoft has notified users that cybercriminals are taking advantage of a previously unknown zero-day vulnerability.

This is happening in Windows 10 as well as various Windows Server versions. The exploit might allow unscrupulous people to take control of PCs via compromised websites or malicious Office documents.

“Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.

An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.

Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.”

Source: Microsoft
Any fixes available?

How to Geek states on their website, “We could see an official fix for the exploit on September 14, 2021, when Microsoft is set to do its next “Patch Tuesday” update. In the meantime, you’ll need to be careful and disable the installation of ActiveX controls in Internet Explorer.”


For inquiries about malicious activity, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Denver Computer Repair Service, if you need computer repair in Denver, CO please call or text the local office at (720) 441-6460.

Let’s Discuss Open Source

What is it good for?

Plain and simply, let’s put it this way: Because its design is publicly accessible, open source refers to anything that anyone may alter and share.

It is software that has the source code available for anyone to view, alter, and improve. Anyone who wishes to edit or enhance the code has complete access to the source code. Any changes, however, should be made available to other people as well.

While some users prefer open source software because they have more authority over it, this could also cause major issues.

According to TechRadar, last week, the Jenkins project learned that one of their outdated Confluence servers had been compromised. This was by the newly publicized remote code execution (RCE) vulnerability.

Jenkins is a well-known open source program that aids in the automation of some aspects of software development.

Recently a proof-of-concept exploit code for the Confluence vulnerability, tracked as CVE-2021-26084, became public, and it didn’t take long for threat actors to begin scanning and exploiting vulnerable instances of the popular collaboration platform, for nefarious purposes like installing cryptominers.

Source: TechRadar

Synopsys, a technology business responsible for the open source security management system, Black Duck stated that 84% of codebases contain an open source vulnerability.

Just remember, open sourced software can become vulnerable if you are not controlling it.


For help with any computer issues, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Denver Computer Repair Service. If you need computer repair in Denver, CO please call or text the local office at (720) 441-6460.

Received a Phone Call from Microsoft, Don’t Answer

If you ever receive any phone calls from someone who says they work for Apple, Google, or even Microsoft, just hang up.

While it sounds rude to do, here is why. Cyber hackers are always figuring out ways to scam potential victims. The norm was through e-mails, however they’ve found that calling customers, claiming to be the software/hardware companies, they can dupe those into giving credit card or other personal information over the phone. These people may sound completely legit and may even know what software you’re using.

According to Microsoft Security, “Once cybercriminals gain your trust, they might ask for your user name and password or ask you to go to a legitimate website (such as www.ammyy.com) to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information are vulnerable. “

Here’s the thing to remember: Apple, Google, and Microsoft will never ever call you. If for whatever reason you have issues with your phone, you can easily look on the company’s website for any information regarding particular problems. What if that doesn’t work? It’s best for you to reach out to their customer service.

If you are having issues with your PC, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you from our staff at the Plano Computer Repair Service, if you need computer repair in Plano, TX please call the local office at (469) 299-9005.

Hackers Exploit OS Bugs

When updates become available, bugs and vulnerabilities follow behind. These, while nuisances, are usually quickly handled and fixed by the development teams. The time in between, however, is an opportunity for hackers to steal information.

For example, back in August 2020 Cyberscoop shared a blog post, explaining that hackers can exploit bugs:

“The bugs are in a software product known as Citrix Endpoint Management or XenMobile, which allows clients to remotely connect to corporate networks with their mobile devices. Exploiting one of the bugs could let a hacker steal domain account credentials for a corporate network, according to Andrey Medov, a security researcher at Positive Technologies, which found the flaw during a security audit for a client. From there, an attacker could target other company resources like corporate mail and web applications.” 

These flaws in computer technology cost companies millions of dollars. According to Capita.com, the recovery cost last year of a data breach was $3.86 million. So software development teams have to work fast to shorten the vulnerability window for hackers.


If you are having issues with your PC, please give us a call at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities.  This blog post is brought to you from our staff at the Plano Computer Repair Service. If you need computer repair in Plano, TX please call the local office at (469) 299-9005.

Protect Your Data with Carbonite

Working from home has a lot of advantages. However, it is not without security threats. Cybercriminals target home networks far more than corporate networks. As a result, clicking on an unknown link at home may have unfavorable consequences.

For example, scam links are often sent by e-mail. To ensure that the sender’s email is legitimate, double-check the sender’s email address. Furthermore, customers should not click any links unless they are confident that they were sent by the company. You may also spot grammar mistakes in the text, which is a sign that it’s a phishing email.

The good news is that you can take steps to improve your cyber-defenses, such as making sure your important files and data are backed up to a secure cloud storage. We recommend Carbonite online backup solutions which will protect your data regardless of any type of attack or problem.



If you would like us to secure and and backup your computer or if you are having any problems, call us at 1-800-620-5285 or book an appointment online at www.karlstechnology.com.

Amazon Emails May Contain Phishing Scam

With the holidays here, and the pandemic continuing, more people are ordering gifts online. Amazon, being one of the leading online retail stores in the world, is often mimicked by hackers to steal customers personal information. Not only that, but they’re mimicking delivery emails, which is quite disturbing and dangerous.

According to Check Point, “they are not just trying to target consumers with fake shopping-related emails and websites.  They are also ramping up phishing and fraud attempts to take advantage of the shipping services that will deliver the goods we have purchased.”

With the spike in purchases, there has been a higher amount of phishing emails. These emails claim that errors have evolved with delivery, including a link or download button to fill out a form to resubmit information.

Do not click links

It’s important to double check the sender’s email information to verify its legitimacy. Also, the customer should not click any links unless they know for certain if the company themselves had sent it. You may notice grammar errors in the email as well, which would indicate a phishing email.

To amend the situation, customers should contact the retailer. This will protect any and all personal information on your computer.

For help with computer issues, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Mesa Computer Repair Service, if you need computer repair in Mesa, AZ please call the local office at (480) 240-2950

Update Google Chrome ASAP

There is an incredibly serious vulnerability in Google Chrome. Experts are pushing users to update the browser as soon as possible.

According to Forbes, “Within the space of just three short weeks, Google has patched no less than five potentially dangerous vulnerabilities in the Chrome web browser.”

They explain that these issues are what’s called a zero-day. This means that Google can begin to alleviate the issue once it’s caught. However, the hackers are already ahead of Google.

“Google has released Chrome version 86.0.4240.198 for Windows, Mac, and Linux. This version addresses CVE-2020-16013 and CVE-2020-16017. An attacker could exploit one of these vulnerabilities to take control of an affected system. These vulnerabilities have been detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following resources and apply the necessary updates.

Google Chrome Release

Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory 2020-154

Source: CISA

If you use Google Chrome, be sure to update the browser as soon as you’re able to. This security vulnerability is to be taken seriously.

For any security inquiries, call us at 1-800-620-5285.  Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Arvada Computer Repair Service. If you need better SEO or computer repair in Arvada, CO please call or text the local office at (720) 441-6460.