(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Computer Infected? The FBI is turning off your Internet

Computer viruses are pretty serious threats, and can cause huge expensive issues for businesses. Many cases of malware and computer viruses actually use your computer to commit real crimes. The FBI states that hundreds of thousands of people will likely lose the ability to surf the web if they have a particular piece of malware.

The malware is named DNSChanger and has been around for a few years, infiltrating millions of computers. DNSChanger does just what it's name suggests; it changes your computer's DNS, and points it to another server. DNS (Domain Name System) is what controls where your web browser goes when you type in a URL. It's what tells your computer that typing in Facebook.com should take you to Facebook's servers, and that Google.com takes you to the search engine. If your computer sees a fake DNS server, Facebook.com and Google.com could take you to rogue websites and ads that cause further infection and help generate profits for the criminals behind the malware.

According to the FBI, millions of computers have been hijacked since 2007. Last year the FBI seized the servers but since so many users connected to the rogue servers in order to surf the web, the FBI converted them to safe DNS servers. However, in July of 2012, the FBI plans to shut them down, meaning anyone infected with the DNSChanger malware will lose the ability to surf the web.

It will be very important for users to remove the infection if they have it to ensure that after July 8th they will still have access to the Internet. If you aren't sure about your security, contact Carceron at (770) 424-3393.


No comments yet
Already Registered? Login Here
Wednesday, 28 September 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Mobile Office Business Computing Business Email Hosted Solutions IT Services Quick Tips Malware Google Social Media IT Support Virtualization Upgrade Mobile Devices Passwords Business Continuity Users Smartphones Microsoft Office Network Windows Server Disaster Recovery WiFi Innovation VoIP Miscellaneous Computer User Tips Communication Efficiency Mobile Device Management Mobile Computing Windows 10 Vendor Management Operating System Unified Threat Management Smartphone The Internet of Things Marketing BYOD Apps Holiday Remote Computing Analytics Health IT Consultant History Facebook Android Ransomware Windows 8 Going Green Bring Your Own Device Wireless Technology Apple Alert Tech Support Content Filtering Information Technology Saving Time Outlook Big data Hard Drives Lithium-ion Battery Printer Network Security Office Remote Monitoring Spam Data Management Save Money Firewall Phishing Employer-Employee Relationship Collaboration Gmail Bandwidth Tutorials Hiring/Firing Automation Best Practice Computer Repair Proactive IT Search Computers Browser Humor Smart Phones Antivirus Save Time Maintenance Intranet Excel Business Intelligence Two-factor Authentication Money Wireless App Current Events Running Cable iPhone Mobile Device Document Management Hacking Phone System User Error User Managed IT services Fax Server Avoiding Downtime Router PowerPoint Help Desk Education Administration Sports Budget Internet of Things Virus Documents Black Market Compliance Retail Chrome Business Growth Encryption Website Virtual Desktop IBM Networking Network Congestion Experience Heating/Cooling End of Support Thin Client Artificial Intelligence Statistics Streaming Media Legal Net Neutrality Inbound Marketing Data storage Safety Company Culture Cost Management Social Flexibility Customer Service Comanaged IT Downtime Government Customer Relationship Management USB Social Networking Digital Payment Bluetooth Recovery Office Tips Programming Laptop Cybercrime Computer Accessories Password Computing Comparison Pain Points Printer Server Augmented Reality Cortana Gaming Console Hosted Solution Text Messaging Presentation Risk Management SaaS Processors VPN communications Flash Read Human Resources GPS Keyboard Telephone Systems Efeciency Value Content Management Pirating Information Deep Learning Settings Microserver LiFi Recycling PDF 3D Shortcut Banking Adroid Archive Troubleshooting Monitors Language Turn Key Visible Light Communication Update Business Metrics Google Wallet Domains Video Surveillance Business Owner Displays Managed IT Advertising Online currency Trending eWaste Point of Sale Chromebook Co-Managed IT Drones YouTube Debate Specifications Work/Life Balance Adminstration Harddrive Environment Competition Twitter Law Enforcement Outsourced IT Office 365 Lifestyle Entertainment Writing Analytic Leadership Riske Management Unified Communications Application Download Digital Signature Staffing switches Paperless Office Permissions BDR File Sharing Microchip Google Docs Disaster Touchscreen DDoS Regulations Identity Theft Solid State Drive Tablet Securty IT consulting External Harddrive Word Virtual Reality Society LinkedIn Wearable Technology Public Speaking HIPAA Micrsooft Skype Windows XP Mouse Electronic Payment IT service organize Operating Systerm Entrepreneur Computing Infrastructure Teamwork Hacker Webinar Robot CIO Memory Wi-Fi Best Available Music Display IP Address Ebay Storage Upgrades

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive