How to secure your online email accounts

If you use an online email account such as Gmail or Hotmail, there are some simple steps that you can take to ensure that you account is secure and your data is kept private.

AVG’s Michael McKinnon has some security tips to help keep you safe:

 

Video

How to Secure your Online Email

 

Here are Michael’s Tips:

1. Make sure you are using a long, strong and unique password that isn’t used anywhere else.

2. Enable two-step verification.

3. Look at your account history and sent items folder to see if anyone, other than you, has accessed your account recently

4. Backup and delete any old email that you no longer need, especially email that might contain sensitive data like old passwords or financial information.

 

For more online security tips, visit the AVG Academy on YouTube

 

Until next time, stay safe out there.

A new strain of ransomware is on the loose! Watch out!

Our colleagues at PandaLabs have detected a new strain of ransomware: Trj/RansomCrypt.B. Known as CTB-Locker, what is different about this example is that if you pay, you can access all the locked files.

This type of malware normally reaches users via email, convincing the user that it’s a legitimate message and getting them to run the file. When run, the malware encrypts image files and documents on the victim’s computer and changes the desktop wallpaper for the following image. It also creates a text file with the same information.

However, if you have any of our Internet security software, you can rest assured, as Panda Security detects and blocks this threat.

RansomCryptB

The following screen then appears, demanding a ransom before the specified time. If the ransom is not paid in time, the amount of money demanded increases.

files encrypted

Clicking ‘Next’ leads to the following window informing victims that if they pay, the files will be unlocked. To demonstrate that this is true, five documents are released.

CTB Locker ransomware

personal file encrypted

How to recognize CTB-Locker?

  • This malware comes in an email with an attachment. This is either a Word file with a .doc or .rtf extension, or a compressed file (.zip) containing a .scr file.
  • Some variants, in addition to encrypting files on the computer, also steal the address book to identify new potential victims. Worse still, they fake the address of the sender so the message may appear to have been sent from a known contact.
  • You can see some examples of these emails here.

How to avoid Ransomware?

  • Keep your operating system up-to-dateto prevent security flaws.

Make sure you have antivirus software installed and up-to-date.

  • Don’t open emails or files from unknown sources.
  • Don’t browse suspect web pagesor those with unverified content.

The post A new strain of ransomware is on the loose! Watch out! appeared first on MediaCenter Panda Security.

RHSA-2015:0074-1: Important: jasper security update

Red Hat Enterprise Linux: Updated jasper packages that fix two security issues are now available for
Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2014-8157, CVE-2014-8158