ransomware warning

Hi All,

Most of you properly have heard of the new virus and hacker attacks by now.

The issues last week were with a vulnerability in windows 10, there was a patch released to fix it last year apparently. (Some server users never updated?)

By default users of windows 10 have automatic updates enabled and this looks more like an attack on Microsoft new ‘server’ versions.

But it was mention that the ransomware emails were back again.

(Your Files and network shares will be encrypted, not retrievable – Only a backup copy will be an option.)

This is now even worse as some of the Ransomware can come via a PDF. ?

Please, check emails and email address carefully on incoming mail. If it looks suspect then it could be a ransomware email.

To check the email address In “Outlook”, open the email and just double click the senders email name/address, then check the email address field.

Ie: The “@name.com” should be someone/customer you know, then if your still worried, call the person. It’s safer than the alternative.

Especially if you’re not expecting an email.!

*** Also LINKS in emails, simular as the below link OR it could be just an image Link to a sale item, hold the mouse over the link or image to see the real address.!***

If it is a link to a file or virus, Windows will ask if you want to open it, just click NO.

This is a good time to check Antivirus software and run backups of photos and files to external USB devices.!

Please pass on to Office staff, friends and family.

Heartbleed Bug in SSL (Web security)

Hi Eveyone,
There has been a massive issue found in the SSL (Secure Layer) that we all use online while purchasing and doing banking.
(Dont panic, This may not have affected anyone?)
The main issue was found by a company that is on the side of Good, not eval, so we all can breath a little bit better…
You may not be affected, But the main thing now is with all your major accounts, Banking, Ebay, Paypal etc.. Change the passwords..!
There is also more detail on the website link below.!
Please pass on…!

So what can I do to protect myself?

Since the vulnerability has been in OpenSSL for approximately two years and utilising it leaves no trace, assume that your accounts may be compromised. You should change passwords immediately, especially for services where privacy or security are major concerns.

Meanwhile, the researchers who discovered the flaw let the developers behind OpenSSL know several days before announcing the vulnerability, so it was fixed before word got out yesterday. Most major service providers should already be updating their sites, so the bug will be less prevalent over coming weeks.

Cheers. Alex.