(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Computer Infected? The FBI is turning off your Internet

Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.

The malware is named DNSChanger and has been around for a few years, infiltrating millions of computers. DNSChanger does just what it's name suggests; it changes your computer's DNS, and points it to another server. DNS (Domain Name System) is what controls where your web browser goes when you type in a URL. It's what tells your computer that typing in Facebook.com should take you to Facebook's servers, and that Google.com takes you to the search engine. If your computer sees a fake DNS server, Facebook.com and Google.com could take you to rogue websites and ads that cause further infection and help generate profits for the criminals behind the malware.

According to the FBI, millions of computers have been hijacked since 2007. Last year the FBI seized the servers but since so many users connected to the rogue servers in order to surf the web, the FBI converted them to safe DNS servers. However, in July of 2012, the FBI plans to shut them down, meaning anyone infected with the DNSChanger malware will lose the ability to surf the web.

It will be very important for users to remove the infection if they have it to ensure that after July 8th they will still have access to the Internet. If you aren't sure about your security, contact Carceron at (770) 424-3393.


No comments yet
Already Registered? Login Here
Saturday, 22 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Tip of the Week Internet Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Data Small Business Hardware Productivity Gadgets Hackers Mobile Office Business Computing Business Email Malware Hosted Solutions Google Quick Tips IT Services Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Network Windows VoIP WiFi Server Miscellaneous Innovation Windows 10 Computer User Tips Communication Efficiency Mobile Device Management Mobile Computing Smartphone Vendor Management Operating System Remote Computing Unified Threat Management The Internet of Things Marketing BYOD Apps Holiday History Analytics Health IT Consultant Facebook Ransomware Android Windows 8 Going Green Bring Your Own Device Wireless Technology Apple Alert Content Filtering Information Technology Saving Time Outlook Network Security Hard Drives Lithium-ion Battery Printer Office Big data Tech Support Employer-Employee Relationship Spam Gmail Firewall Collaboration Hiring/Firing Data Management Remote Monitoring Save Money Phishing Browser Computer Repair Proactive IT Search Computers Save Time Bandwidth Humor Smart Phones Best Practice Automation Antivirus Maintenance Tutorials App Current Events iPhone Mobile Device Document Management Phone System User Error Education Hacker Budget Internet of Things Fax Server Avoiding Downtime Black Market Router Two-factor Authentication Money Wireless PowerPoint Help Desk Website Running Cable Administration Sports Hacking Intranet Excel Virus User Business Intelligence Managed IT services Safety Company Culture Social Flexibility Cost Management IBM Office Tips Customer Service Downtime Computing Government USB Recovery Cybercrime Password Thin Client Programming Statistics Hosted Solution Streaming Media Cortana Net Neutrality SaaS Presentation Risk Management Inbound Marketing Processors BDR communications Telephone Systems Comanaged IT Documents Compliance Social Networking Digital Payment Customer Relationship Management Business Growth Retail Bluetooth Laptop Computer Accessories Encryption Pain Points Comparison Printer Server Augmented Reality Networking Gaming Console Managed IT Virtual Desktop Text Messaging Network Congestion Experience End of Support VPN Heating/Cooling Artificial Intelligence Law Enforcement Twitter Outsourced IT Legal Office 365 Data storage Chrome Digital Signature 3D Paperless Office Application Permissions Archive Google Docs Disaster Microchip Update Regulations Turn Key Identity Theft Solid State Drive Hacks DDoS Video Surveillance Securty Online currency Trending IT consulting Society Tablet Virtual Reality Point of Sale Notifications Micrsooft Debate Harddrive IT service Adminstration Word Windows XP Public Speaking HIPAA Skype Computing Infrastructure Robot Lifestyle Electronic Payment CIO Teamwork Memory Entrepreneur Leadership Music Wi-Fi Upgrades Best Available Flash IP Address Storage File Sharing Touchscreen Human Resources Deep Learning Read Value Settings Keyboard LiFi Banking External Harddrive Monitors PDF Adroid LinkedIn Language Shortcut Visible Light Communication Google Wallet Troubleshooting Business Metrics Wearable Technology Displays Mouse organize Operating Systerm Advertising Webinar Domains Drones Business Owner Chromebook eWaste YouTube Co-Managed IT Work/Life Balance Ebay Specifications Display Writing Environment GPS Competition Unified Communications Efeciency Pirating Information Entertainment Staffing Analytic Download Content Management Recycling Microserver switches Riske Management

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive