(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Computer Infected? The FBI is turning off your Internet

Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.

The malware is named DNSChanger and has been around for a few years, infiltrating millions of computers. DNSChanger does just what it's name suggests; it changes your computer's DNS, and points it to another server. DNS (Domain Name System) is what controls where your web browser goes when you type in a URL. It's what tells your computer that typing in Facebook.com should take you to Facebook's servers, and that Google.com takes you to the search engine. If your computer sees a fake DNS server, Facebook.com and Google.com could take you to rogue websites and ads that cause further infection and help generate profits for the criminals behind the malware.

According to the FBI, millions of computers have been hijacked since 2007. Last year the FBI seized the servers but since so many users connected to the rogue servers in order to surf the web, the FBI converted them to safe DNS servers. However, in July of 2012, the FBI plans to shut them down, meaning anyone infected with the DNSChanger malware will lose the ability to surf the web.

It will be very important for users to remove the infection if they have it to ensure that after July 8th they will still have access to the Internet. If you aren't sure about your security, contact Carceron at (770) 424-3393.


No comments yet
Already Registered? Login Here
Monday, 29 August 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Data Small Business Hardware Productivity Gadgets Mobile Office Business Computing Hackers Email Business Hosted Solutions Quick Tips IT Services Google Social Media Malware IT Support Virtualization Upgrade Mobile Devices Passwords Business Continuity Users Smartphones Microsoft Office Network Windows Disaster Recovery WiFi Server VoIP Miscellaneous Computer Innovation Communication Mobile Computing Mobile Device Management Vendor Management Efficiency Operating System User Tips Unified Threat Management Windows 10 The Internet of Things Smartphone Marketing BYOD Holiday Remote Computing Apps Analytics IT Consultant Facebook Android Going Green Windows 8 Bring Your Own Device Health Wireless Technology History Apple Alert Content Filtering Information Technology Saving Time Outlook Hard Drives Ransomware Lithium-ion Battery Big data Printer Office Tech Support Spam Network Security Firewall Data Management Collaboration Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Computer Repair Save Time Proactive IT Hiring/Firing Search Best Practice Bandwidth Humor Smart Phones Antivirus Browser Maintenance Tutorials Education Managed IT services App iPhone Current Events Budget Document Management Mobile Device Money Phone System Two-factor Authentication Wireless Running Cable User Error Automation Fax Server Computers Internet of Things Avoiding Downtime Hacking PowerPoint User Router Help Desk Sports Administration Intranet Business Intelligence Excel Data storage Presentation Risk Management IBM communications Flexibility Documents Office Tips Computing Thin Client Statistics Retail Streaming Media Website Hosted Solution Net Neutrality Virtual Desktop SaaS Network Congestion Inbound Marketing Experience Heating/Cooling Digital Payment Customer Relationship Management Social Networking Compliance Bluetooth Comanaged IT Laptop Computer Accessories Comparison Encryption Augmented Reality Pain Points Printer Server Company Culture Safety Social Networking Cost Management Text Messaging Gaming Console VPN Downtime Customer Service End of Support Government Virus Recovery Artificial Intelligence Programming Cybercrime Password Legal Chrome Staffing Cortana Electronic Payment Entrepreneur switches Archive Teamwork Microserver Paperless Office Hacker Permissions 3D Update Disaster Processors Google Docs Regulations Best Available Turn Key Video Surveillance Identity Theft IP Address Solid State Drive Online currency Storage Trending Securty Point of Sale Read Human Resources Keyboard IT consulting Value Debate Virtual Reality Society PDF Micrsooft IT service Shortcut Windows XP Harddrive Adroid Adminstration Lifestyle Leadership Computing Infrastructure Troubleshooting CIO Robot Memory Wi-Fi Domains Music BDR Business Owner eWaste File Sharing Upgrades Flash Touchscreen Co-Managed IT Telephone Systems Black Market Specifications Environment Deep Learning Settings Competition LiFi Analytic Banking Office 365 Business Growth LinkedIn Entertainment External Harddrive Wearable Technology Riske Management Monitors Language Application Visible Light Communication Digital Signature Mouse Operating Systerm Google Wallet organize Displays Managed IT Advertising Webinar DDoS Drones YouTube Display USB Ebay Work/Life Balance Tablet Efeciency Law Enforcement Writing Word Outsourced IT Content Management Pirating Information Public Speaking Unified Communications GPS HIPAA Recycling Skype

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive