Wawa introduces free WiFi services

PHILADELPHIA – Wawa began offering free WiFi Tuesday for customers at its 700-plus stores.

Wawa-free-xfinity

 

The service is available through a collaboration between the retailer and Philadelphia-based Comcast, the companies said.

To access the free service, Comcast said, “customers should log on to the ‘xfinitywifi’ SSID in the list of available networks on their devices.”

The service includes public Xfinity WiFi for Wawa customers and private access WiFi for employees and vendors.

Wawa stores operate across the tri-state area, as well as in Maryland, Virginia and Florida. The firm’s WiFi service will be available outside of Comcast’s traditional service areas, the companies said.

Wawa noted it needed “a fast and reliable WiFi solution to enable a consistent in-store experience for its mobile application.” It also said the service allows customers “to take advantage of a free connection without having to rely on their cellular service.”

Bill Stemper, president of Comcast Business, said WiFi has become a vital service for companies looking to improve “the customer experience at their branch locations.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Hacker collects 272m email addresses and passwords, some from Gmail

Security firm announces it has persuaded fraudster to give up database of email addresses along with passwords users use to log in to websites

hacking gmail

The internet on Wednesday gave you another reminder that everyone has been hacked.

Hold Security, a Wisconsin-based security firm famous for obtaining hoards of stolen data from the hacking underworld, announced that it had persuaded a fraudster to give them a database of 272m unique email addresses along with the passwords consumers use to log in to websites. The escapade was detailed in a Reuters article.

It might sound bad, but it is also easily mitigated.

The passwords and email addresses, which include some from Gmail, Yahoo and Russia’s mail.ru service, aren’t necessarily the keys to millions of email accounts. Rather, they had been taken from various smaller, less secure websites where people use their email addresses along with a password to log in.

People who use a different password for both their email account and, say, Target.com, won’t be affected. But those who tend to use the same password for multiple sites as well as their email should change their email password.

“Some people use one key for everything in their house,” Hold Security founder Alex Holden says. “Some people have a huge set of keys that they use for each door individually.”

Holden said there is no way for consumers to check if their emails were included in his firm’s latest find. In 2014, when his firm tried to set up such a service after obtaining a billion hacked login credentials, his site crashed.

The hacker appears to have been largely targeting Russian users. Some 57m of the email addresses were for the country’s largest email provider mail.ru, which claims 100 million monthly users. Around 40m of the addresses were Yahoo Mail, 33m Hotmail and 24m for Google’s Gmail service.

In this case, the hacker had been bragging on internet chat forums that he had a treasure trove of login credentials that he was trying to sell. Holden, who is fluent in Russian, said he wouldn’t pay for the data but would give him “likes” on various social media posts in exchange.

The hacker, who apparently is quite young, agreed. “We kind of call him the collector,” Holden says in a heavy Russian accent. “Eventually, almost everyone gets breached.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Ransomware-as-a-service is exploding: Be ready to pay

RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.

ransomware

It starts with a fast click on a link in a harmless-looking email. Then your PC slows to a crawl. A message suddenly pops up and takes over your screen. “Your files and hard drive have been locked by strong encryption. Pay us a fee in 12 hours, or we will delete everything.” Then a bright red clock begins counting down. No antivirus will save your machine. Pay the fee or lose everything.

You’re the latest victim of a ransomware attack. The scary thing is, you’re not alone. The ransomware market ballooned quickly, from a $400,000 US annual haul in 2012, to nearly $18 million in 2015. The average ransom—the sweet spot of affordability for individuals and SMBs—is about $300 dollars, often paid in cash vouchers or Bitcoin.

The ransomware market scaled up so quickly, claims a recent report by Imperva, due to the rise of ransomware-as-a-service, or RaaS. Here’s how it works:

  • Ransomware authors are marketing on-demand versions of code, using traditional malware distributors in a classic affiliate model.
  • The ransomware author collects the ransom and shares it with the distributor.
  • Malware is distributed through spam email messages, malicious advertisements, and BlackHat SEO sites.
  • According to the Imperva report, “in classical affiliate marketing, the larger cut goes to the possessor of the product. In RaaS … the ransomware author gets a small cut of the funds (5%-25%) while the rest goes to the distributor (affiliate).”
  • Using the deep web, TOR, and Bitcoin, the report says, “this model, based on TOR and Bitcoins, is designed to keep the identity of the author and the distributor hidden from law enforcement agencies.”

Phishing in particular, is a highly effective tactic for malware distribution.

The well-worded email appears to come from a legitimate email address and domain name, and raises very few irregularities. The email comes with a demand for money for an arbitrary service, along with a link that purports to be an “overdue invoice.”

Click that link and open the file (which looks like a Word document), and you’ll become the latest victim of ransomware — that is, malware that encrypts your files and locks you out of your computer until you pay a ransom.

Phishing attacks have also helped ransomware move into the enterprise. In 2015 the medical records system at Hollywood Presbyterian Medical Center was attacked. The hospital paid $17,000 in Bitcoin to unlock the sensitive records. In early 2016 the Lincolnshire County Council was snagged by a phishing scheme and held up for 500 dollars.

To prevent your business from attack, make sure the IT department and communication team are in sync, keep your company’s security systems updated, and remind employees to use caution when clicking on email links from unknown addresses.

If you’ve been hacked, the ransomware rescue kit provides a suite of tools designed to help clean particularly pugnacious malware.

Businesses that suffer ransomware attacks face a tough choice. Paying the fee could restore access to mission-critical data, but there’s no guarantee the extortionists will honor the deal. And of course, paying a ransom provides incentive to hackers and validates the attack.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

The BlackBerry platform’s slow fade to black

BlackBerry’s operating system was recently dealt blow by Facebook. Find out how this could be the final nail in the BB10 coffin.

The only reason this headline should surprise anyone is the fact that BlackBerry OS is actually still alive. End of story, right? Truth be told, most assumed BlackBerry’s operating system dead when the company decided to release a device running the Android platform. It seemed to be the only logical step forward for BlackBerry Limited. And yet, BB continues on.

Only now, they continue on without Whatsapp and Facebook support.

When pressed for the reason why they are pulling support, Facebook made their case quite simple, stating that 99.5 % of all smartphone sales are of the Android, iOS, and Windows Mobile platforms.

Makes sense.

What doesn’t make sense is the fact that the BlackBerry OS is still alive and kicking. Yes, I understand BlackBerry was the platform for business users for a very long time, but that time has come and gone and the only relevant platforms are obvious. In fact, even Windows Mobile is barely hanging on to any semblance of relevancy.

What can you expect

If you happen to be a BlackBerry user, you already knew that Whatsapp pulled the plug. Now you can count on the Facebook app functioning (sans updates) until the end of the year. Once 2016 passes, the app will cease to be available in any form.

My guess is, once the Facebook app no longer functions on the platform, the Grim Reaper will swoop into the offices of the BB10 developers and have a field day. Facebook holds a powerful sway over the ebb and flow of the consumer. No Facebook, no platform.

And you may be saying to yourself, “BB10 is a business-centric platform, there’s no need for a Facebook app”. That assumption is false for at least two reasons. First, businesses actually use Facebook as a form of marketing. Second, you’re assuming that business users do not spend any amount of time on Facebook. According to comScore, the average American citizen spends 40 minutes a day on the social network platform. Relatively speaking, that’s a significant amount of time (considering users tend to work on Facebook in a sort of “hit and run” style). And if you factor in the peak Facebook hours of 1 p.m. – 3 p.m., it’s clear that business users do spend time on Facebook.

BlackBerry’s reaction

Of this separation, BlackBerry said:

“We are extremely disappointed in their decision as we know so many users love these apps. We fought back to work with WhatsApp and Facebook to change their minds, but at this time, their decision stands,”

BlackBerry even started a Twitter campaign to change Facebook’s mind, with the hashtag #ILoveBB10Apps. I did a quick Twitter search for that hashtag and found the hashtag (somewhat) backfired on BlackBerry. Tweets ranging from angry users (one user asking how his BlackBerry device could be showing 0% battery, yet still be functioning), to the usual flood of memes and spam. Some users did proclaim they’d be sticking with BlackBerry by way of the PRIV (which, if we’re being honest, at that point you are as much in support of Android as you are BlackBerry). Of course, there were the BlackBerry faithful, extolling the values of BlackBerry 10 multitasking, security, and such to convince Facebook to not pull the plug.

The truth is in the numbers

You really shouldn’t need anything more than that telling number 99.5. That is beyond significant. We’ve watched new (and promising) platforms come and go, thanks to the might that is Android and iOS. Because BlackBerry has been around for a while, doesn’t give them a special hall pass to avoid the apple flavored robotic death hammer.

If BlackBerry wants to continue on, their only hope clearly lies in Android. The BlackBerry faithful will gladly continue on, with their physical keyboards and Android platform. Either that, or they can say goodbye to BlackBerry altogether, because Facebook pulling support could well be the killing blow to the little platform.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The best new features coming to Microsoft’s latest OS: Windows 10

Windows10

Microsoft continues to build out Windows 10 – with a bumper crop of new features announced at its Build conference last week.

These enhancements will be pushed to to Windows 10 users over the coming months, with many arriving in summer when the OS will get a major upgrade dubbed the Windows 10 Anniversary Edition.

Here are the key upgrades heading to Windows 10.

The write stuff

ink-SJTechies

Using a digital pen to write and scribble on the screen of Windows 10 PCs and tablets will get easier.

In a boost to devices that support such pens, such as the Microsoft’s Surface tablet, the OS’ new Windows Ink feature will allow users to jot down notes on the screen without unlocking the device.

Windows Ink will also allow users to write messages on sticky notes and, if appropriate, have them automatically translated into calendar appointments and reminders.

Support for Windows Ink in Microsoft Office, Maps, the Edge browser and other apps will allow users to draw, write and annotate using their pen. Windows Ink will make using the pen in Office more satisfying than it currently is, for example tidying up highlighted marks on documents so they neatly align with text.

Windows 10 will also gain the Ink Workspace, a hub for launching apps that support writing and sketching using the Surface Pen.

Ink everywhere

win10-inking-SJTechies

Support for drawing, writing and annotating using digital pens will likely come to many apps.

Microsoft says that support for Microsoft Ink will be easily added to Universal Windows Platform apps, requiring just two lines of XAML code.

Digital ruler

win10-ruler-SJTechies

It sounds simple, but the new on-screen ruler should prove to be a useful addition for those who want to draw straight lines using a digital pen.

Smarter Cortana

cortana-SJTechies

The attraction of a virtual assistant is the simplicity with which they allow you to carry out tasks.

To ease the process of using Windows 10’s Cortana, the voice-controlled assistant will no longer require you to log into Windows, with users able to make a note, play music or set a reminder from the lock screen.

Cortana will also become more proactive and make suggestions based on a user’s past behaviour – offering to order lunch or to arrange transportation.

More apps will also be able to use Cortana to automatically complete tasks for users or to carry out actions based on context, such as the user’s current location or time of day.

Windows Hello comes to apps and the web

hello-SJTechies

Windows 10 already lets you log into the OS using your face.

The anniversary edition will extend this biometric log-in to Windows apps and websites via Microsoft Edge. As with the OS, users will be able to authenticate their identity using a facial, iris or fingerprint scan.

Another new feature will allow users to unlock a PC running Windows 10 Enterprise Edition by tapping a Windows Hello-enabled phone, although Microsoft has said the feature will only be available on “select premium phones”.

Android app notifications on Windows 10

android-SJTechies

In future, notifications on Android devices will be able to show on Windows 10 PCs.

Any notification popping up on the Android notification panel can, via the Cortana Android app, also appear as a notification on a linked Windows 10 desktop.

Microsoft demoed the ability at its recent Build conference for developers.

Browser extensions

extensions-SJTechies

Microsoft’s Edge browser will soon gain support for extensions.

Extensions are small programs that can be downloaded to add new functionality to a browser, and are already found in Chrome, Firefox and other browsers today.

Support for extensions has already been added to Edge for those testing pre-release builds of Windows 10 under the Insider program.

The first extensions to be supported by Edge are Microsoft Translator, an extension that automatically translates pages in over 50 different languages, an extension to augment mouse gestures support, and a preview version of the Reddit Enhancement Suite.

Microsoft promises more extensions will be added later this year, including AdBlock, LastPass and Evernote.

Pinned browser tabs

pinned-tabs-SJTechies

Microsoft is also adding to Edge the ability to pin your favorite sites and web apps so they always have a tab open in the browser.

Updated Maps app

maps-app-pc-SJTechies

The Maps app has several new features, as well as UI and performance improvements.

Additions include one-tap access to search and directions, the ability to view multiple searches and directions at the same time, labels for search results on the map and turn-by-turn directions read by Cortana.

The improved app is available now to those testing Windows 10 under the Insider program.

Access Linux command-line tools in Windows

bash-win10-SJTechies

More one for developers, Microsoft is also bringing the ability to run the Bash shell to Windows.

The Bash shell is a command line interpreter that is available on many different Linux distributions, as well as Mac OS X.

The shell includes a host of tools that allow power users to carry out and orchestrate complex chains of commands.

Bash will be available via a Universal Windows Platform app, which will provide an image of the Linux distribution Ubuntu and run on the Windows 10 desktop.

Users will be able to use the Bash shell to download and install programs from the command line, as they do from inside Ubuntu. Microsoft says Ubuntu software will run as fast in the Windows app as it does natively, thanks to a software subsystem for handling Linux system calls.

Microsoft has described the app as offering a developer toolset. While it has access to the files on the Windows PC, the app only provides access to a command line — not a graphical desktop — and reportedly has limits on what it can be used for, such as not being able to run a server.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

3 new iOS 9.3 features business users will love

iOS 9.3 offers several features that might appeal to business-oriented Apple users.

Apple introduced a new version of iOS on Monday. The update includes several new features, including updates to CarPlay and HealthKit, as well as a feature to make it easier for iPads to be used in schools for educational purposes. There are several other new features which are particularly appealing to the business-oriented user.

Here are 3 new features business users should check out.

ios93SJTechies

Night Shift

The proliferation of devices like tablets and smartphones means that some sort of screen is never far away. For many, looking at a screen is the first and last thing they do in the morning and evening.

The problem with that is screens emit blue light, which reduces the amount of melatonin produced in the body. Melatonin is a chemical that helps people fall asleep. The light emitted from smartphones can also cause eye strain, which carries symptoms like headaches and blurred vision.

With this latest version of iOS 9, Apple introduced Night Shift, a feature that automatically adjusts the colors of your display at night. You can schedule times for it to go into effect, manually turn it on and off, and adjust colors on a scale of less warm to more warm.

You can access Night Shift through Settings | Display & Brightness, or through the menu that swipes up from the bottom of the device’s screen.

ios9SJTechies

Password-protected Notes

Notes is iOS’ app for taking, well, notes. iOS 9.3 updates it by allowing users a layer of security. Now, users can lock their notes using either a password or the Touch ID, which makes the app that much more useful.

In order to lock a note, tap the button in the top right corner (the one you might use if you were going to email the note) and then tap Lock Note. When prompted, enter a password, confirm it, and decide if you want to enable the Touch ID. A lock button will appear at the top of the note and in the future if you want to open it, enter the password or use the Touch ID.

ios92SJTechies

More personalized News

The News app now offers more personalization for users, and on a range of topics and publications. So for example, you can select a topic like mobile apps or internet privacy. You can access news by opening the News app, or by swiping right from your main screen.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

South Jersey Cyber Crime

The hackers used “ransomware” to lock the hospital out of its own medical records.

Not all kidnappers grab your loved ones.

A growing online threat – ransomware – essentially abducts your computer system, putting data and services off-limits to users and demanding a payment to restore access.

“We are seeing more cases of this – sometimes almost on a daily basis,” said New Jersey State Police Capt. Steve Jones. “And we’re not seeing all of it, because people may be too embarrassed or don’t believe it can be helped.”

Ransomware viruses are a plague. Once infected — installed to your computer by a website you’ve visited, a rogue email attachment or link, or instant message — your computer will lock up. With names like CryptoWall, these types of viruses may create a popup window or Web page warning you that you’ve broken some law and have to pay a fine, anywhere from hundreds to thousands of dollars, according to the FBI.

These scams threaten to encrypt your files forever or destroy them unless a ransom is paid, according to the FBI.

Once paid, your computer is unlocked or a code is sent to unlock the machine, authorities said.

Between April 2014 and June 2015, the FBI received 992 CryptoWall-related complaints with victims reporting a loss of more than $18 million.

The state’s top cybersecurity unit recently launched an online effort to help people guard against ransomware.

“For many organizations, preventing ransomware entirely is nearly impossible,” says the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), which introduced a Ransomware Threat Profile page at its website in February.

But it notes individuals and companies can take measures to prevent infections and to limit their impact.

Although ransomware can lock up laptops and desktop computers, the risk is particularly great for data-dependent organizations like hospitals and accounting firms, said Jones, the State Police spokesman.

So far, at least three hospitals have been hit nationwide – in California, Kentucky and the Washington, D.C., area. South Jersey hospitals are well aware of the menace.

“It’s a big concern. It’s something that has really spiked,” said Tom Handlon, chief information security officer for Kennedy Health, which operates three acute-care hospitals in South Jersey.

Handlon gave no details, but said Kennedy seeks to protect itself through protective measures inside its computer system and by promoting safe conduct by employees.
“We’re monitoring it constantly and updating as we go along,” he said. “We are really educating the staff and our entire organization that we are a target.”

A similar view came from Tom Rubino, spokesman for Cooper University Healthcare System in Camden.

“We have tracked the recent wave of ransomware attacks that have targeted hospitals across the nation,” Rubino said. He said Cooper’s IT security team “is proactively taking measures to prevent ransomware infection of our computer systems.”

“Additionally, as a critical component for preventing all computer viruses, we are increasing our employee education efforts.”

A key precaution is to back up your computer’s contents on a frequent basis, Jones said. “But you’ve got to keep the backup drives disconnected,” he warned. “Otherwise, the ransomware can migrate to the backups.”

The State Police in March 2015 investigated a hacking incident that disabled much of the computer system for the Swedesboro-Woolwich school system. In that case, a hacker demanded more than $125,000 in the form of a digital currency called bitcoins.

The district, which did not pay the ransom, had to wipe clean its email servers and cafeteria lunch-ordering system to rid itself of ransomware. Only a handful of classroom computers were infected.

Hackers exploited a gap in the district’s computer security system and a vendor’s “weak” passport to take over the computer system, Michael Procopio, Educational Information and Resource Center’s director of technology, said at the time. EIRC experts helped the district restore its system.

The district’s hacker was believed to have struck from abroad – a familiar pattern, according to the State Police.

“Many of these messages and attacks are coming through foreign servers,” Jones said. “The countries that house these servers are not often countries that have a real open relationship with law enforcement.”

Tools have been available to help decrypt older versions of ransomware, said Dave Weinstein, New Jersey’s director of cybersecurity.

“At this point, the strain has morphed to the point where there is no releasing your files,” said Al Della Fave, a spokesman for the Ocean County Prosecutor’s office. “The lock these cybercriminals put on your files is foolproof at this point.”

Unless you’ve backed up your computer prior to the infection, Della Fave said, “The only way you would get your files back is to pay.”

“Ransomware is working” for cyberthieves, said Ben Johnson, chief security strategist at Carbon Black Inc., a  computer security firm in Waltham, Massachusetts. “People are paying.”

In the last few weeks, cybercriminals have come up with some new twists, he said. For instance, one version encrypts files more quickly after someone opens up a malware-filled Microsoft Word document or some other attachment.

Other versions encrypt the computer at its most basic level so it can’t even power on, or use the computer’s own system administration tools to infect itself, he said.

The best course of action is to make sure you don’t get the virus. “You must be super careful what you click on,” Della Fave said.

Here’s what you should do, according to Johnson and the Ocean County prosecutor’s office:

  • Keep your computer’s security software up to date.
  • Keep your network firewall turned on.
  • Do not open spam email messages or links to suspicious websites.
  • Back up your files, such as documents, photos and music, to a secondary storage device.
  • Be careful when you browse the web. Use ad blockers to help protect yourself.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Google and AT&T: Fighting Fiber with Fiber

Google fiber is coming to your town. But not without a fight. After Louisville, Kentucky approved legislation that would allow Google Fiber to piggyback on pre-existing telecommunication infrastructure, AT&T sued the city.

“The ordinance in question, known as “One Touch Make Ready,” essentially allows Google (or any other ISP) to install its equipment on existing utility poles, including those owned and maintained by AT&T. Despite strong opposition from AT&T and Time Warner Cable, the ordinance passed with a 23-0 vote.”

AT&T claimed a need to defend past infrastructure investment, and that the ordinance violates current telecommunication rules. The city of Louisville countered claiming, “gigabit fiber is too important to our city’s future.” Google pledged to support the city.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from a Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Yammer is on the way to Office 365: Are you ready?

Microsoft is activating Yammer for every Office 365 subscription. But is this one collaboration tool too many?

On February 2, 2016, Kirk Koenigsbauer announced in the official Microsoft Office 365 blog that Yammer is now being activated for every eligible Office 365 subscription. In a nutshell, that means Yammer is going to be another app on the Office 365 app list unless an admin specifically turns off access. Your enterprise should plan accordingly.

Yammer

For those of you unfamiliar with the product, Yammer bills itself as an enterprise internal social network. It mixes the typical chat messenger application with collaboration tools available in Office 365.

Similar to the Delve tool we looked at last week, Yammer can serve as the central hub for team collaboration. From within a Yammer discussion, teams can set up meeting appointments using Outlook, switch to a full-fledged Skype for Business video meeting, and access OneDrive for Business to create collaborative documents.

The initial rollout of Yammer took place on February 2, 2016; the rest of the rollout will take place in stages. The next release is March 1, 2016, and the last is April 1, 2016. According to the blog post, the first wave is for “Office 365 customers with a business subscription who purchased fewer than 150 licenses that includes Yammer and who have zero or one custom domains for Yammer.”

The second wave is for “Office 365 customers with a business subscription who purchased fewer than 5,000 licenses that includes Yammer.” Customers with an education subscription are not included.

The final wave is for “remaining customers with a business subscription and all customers with an education subscription.” For subscribers who have never had a Yammer account, the rollout will take place last, in April. Alas, that is the wave I’ll have to wait for.

Collaboration

Yammer is the latest, and perhaps the last, major teamwork collaboration app to be added to Office 365. In Microsoft’s vision of a mobile-first, cloud-first enterprise, teams collaborate across distances using shared documents, video conferencing, and applications that tie it all together in one virtual location.

YammerForOffice365

With the addition of Yammer, Microsoft is offering several tools teams can use to manage and organize their collaboration activities. Teams can use Yammer, Delve, Groups, Sites, SharePoint, and OneNote to manage their shared conversations and documents across the enterprise. One of those tools should be able to satisfy even the most persnickety of teams.

Bottom line

But then again, that may be where we run into problems. One could argue that there are too many collaboration tools available in Microsoft Office 365. While all these wonderful choices may seem good at first glance, it is possible that subscribers may become overwhelmed.

Microsoft’s idea that teams can choose the best tool for them or for the project they are working on sounds all well and good, but it does still require someone to make an important initial decision. For some people, making a decision that will affect a project from start to finish can be a daunting task.

In the long run, it may be beneficial for organizations to establish guidelines for when each of the collaboration tools works best. They may even decide to block some of the tools from use altogether in favor of a recommended best practice.

Having myriad collaboration tools is generally a good thing, but it might help move things along if the enterprise establishes some well thought out guidelines.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.