(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Computer Infected? The FBI is turning off your Internet

Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.

The malware is named DNSChanger and has been around for a few years, infiltrating millions of computers. DNSChanger does just what it's name suggests; it changes your computer's DNS, and points it to another server. DNS (Domain Name System) is what controls where your web browser goes when you type in a URL. It's what tells your computer that typing in Facebook.com should take you to Facebook's servers, and that Google.com takes you to the search engine. If your computer sees a fake DNS server, Facebook.com and Google.com could take you to rogue websites and ads that cause further infection and help generate profits for the criminals behind the malware.

According to the FBI, millions of computers have been hijacked since 2007. Last year the FBI seized the servers but since so many users connected to the rogue servers in order to surf the web, the FBI converted them to safe DNS servers. However, in July of 2012, the FBI plans to shut them down, meaning anyone infected with the DNSChanger malware will lose the ability to surf the web.

It will be very important for users to remove the infection if they have it to ensure that after July 8th they will still have access to the Internet. If you aren't sure about your security, contact Carceron at (770) 424-3393.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Thursday, 28 July 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Data Small Business Hardware Gadgets Productivity Mobile Office Hackers Business Computing Email Business Quick Tips Hosted Solutions Social Media Google IT Services Malware IT Support Virtualization Mobile Devices Upgrade Passwords Users Business Continuity Smartphones Microsoft Office Windows Network WiFi Server VoIP Disaster Recovery Miscellaneous Innovation Computer Communication Mobile Device Management Vendor Management Mobile Computing Unified Threat Management Operating System User Tips Windows 10 Smartphone Marketing BYOD The Internet of Things Efficiency Remote Computing Holiday Android IT Consultant Apps Facebook Analytics Windows 8 Bring Your Own Device Alert Going Green Wireless Technology History Apple Outlook Health Office Content Filtering Information Technology Printer Saving Time Big data Hard Drives Tech Support Lithium-ion Battery Firewall Remote Monitoring Collaboration Ransomware Data Management Spam Save Money Network Security Phishing Employer-Employee Relationship Save Time Antivirus Search Hiring/Firing Best Practice Humor Computer Repair Smart Phones Proactive IT Maintenance Gmail Browser Tutorials Bandwidth Current Events PowerPoint Mobile Device Education Budget User Error Two-factor Authentication Intranet Money Business Intelligence Wireless Avoiding Downtime Running Cable Automation Router iPhone Document Management Hacking User Administration Phone System Excel Fax Server Computers App Compliance Recovery Digital Payment Customer Relationship Management Cybercrime Social Networking Programming Bluetooth Encryption Laptop Computer Accessories Comparison Help Desk Augmented Reality Networking Presentation Risk Management Sports Text Messaging communications End of Support VPN Artificial Intelligence Documents Virus Inbound Marketing Retail Legal Data storage Website Chrome Managed IT services Comanaged IT Virtual Desktop Flexibility Network Congestion IBM Experience Heating/Cooling Pain Points Office Tips Printer Server Computing Gaming Console Thin Client Statistics Streaming Media Hosted Solution Safety Net Neutrality Company Culture Cost Management Social Internet of Things Customer Service Downtime Government 3D Touchscreen Tablet Deep Learning Settings LiFi Password Turn Key Business Growth Word Public Speaking HIPAA Skype Monitors Language Visible Light Communication Cortana Electronic Payment LinkedIn Teamwork Wearable Technology Google Wallet Entrepreneur Hacker Displays Mouse Managed IT Operating Systerm Advertising Processors Best Available Adminstration Drones Harddrive YouTube IP Address Storage Work/Life Balance Human Resources Read Value Display Law Enforcement Ebay Keyboard Outsourced IT Writing Unified Communications Efeciency PDF Adroid Content Management Pirating Information Staffing Shortcut switches Troubleshooting Recycling Paperless Office Permissions Archive Google Docs Disaster Domains Business Owner Update Regulations Identity Theft Solid State Drive eWaste External Harddrive Co-Managed IT Video Surveillance Securty IT consulting Specifications Online currency Trending organize Point of Sale Society Environment Competition Micrsooft Debate IT service Windows XP Office 365 Entertainment Webinar Analytic Riske Management CIO Application Digital Signature Robot Lifestyle Memory SaaS Leadership Music GPS Upgrades Flash DDoS BDR USB Microserver File Sharing Black Market

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive