Horne & Benik Networks Blog

Horne & Benik Networks has been serving the Marlborough area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What It Means To Disinfect Your Computer

What It Means To Disinfect Your Computer

We have no problem going on the record as saying that there are more than enough strains of malware to go around. As such, it’s important that you know what to do if your workstation is struck by an infection.

0 Comments
Continue reading

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

0 Comments
Continue reading

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

1 Comment
Continue reading

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

0 Comments
Continue reading

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

0 Comments
Continue reading

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

0 Comments
Continue reading

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

0 Comments
Continue reading

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

0 Comments
Continue reading

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

A Classic Example of Why You Should Only Allow Trusted Apps to Access Your Data

If your employees are given an Android device to use for work, or if they bring in their own as a part of a Bring Your Own Device strategy, you may want to pay special attention to what follows.

0 Comments
Continue reading

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpg
Ransomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

0 Comments
Continue reading

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpg
Today’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

Study: 2015 Saw a 27.3% Increase In New Malware

b2ap3_thumbnail_malware_everywhere_400.jpg
Cyber security continues to be a major pain point for small and medium-sized businesses, even if they’re taking the fight to the latest threats with solutions like antivirus and firewalls. Significant progress has been made, yet new threats are born every day. In fact, you might be surprised to find out that a monstrous 27.3 percent of all malware in the world was created just last year. 

0 Comments
Continue reading

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpg
Any business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpg
Computer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpg
ATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

0 Comments
Continue reading

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpg
Malware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

0 Comments
Continue reading

Warning: CryptoWall Targets Businesses and It’s Just as Nasty as Its Cousin, CryptoLocker

b2ap3_thumbnail_cryptowall_400.jpg
In the wake of a ransomware takeover, it seems like the world can’t go a few months without some sort of data loss disaster occurring. The antics of hackers grow more dangerous and difficult to dodge, and IT departments have their hands full dealing with the fallout. What’s keeping you from contracting this ransomware, and how can you keep your business from suffering its consequences?

0 Comments
Continue reading

Blog Archive

Mobile? Grab this Article

QR Code

Customer Login


News & Updates

Horne & Benik is proud to announce the launch of our new website at www.horne-benik.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Horne & Benik can do for your business.

Horne & Benik
2 School Street - PO Box 305
Marlborough, New Hampshire 03455