This happened to me.. I was servicing a computer the other day, running updates double checking backups, routine stuff. I had connected across the network using a remote client to a shared computer when I saw a notice in the taskbar that a device was connected and it was ready for use. I blinked and got a worried feeling. I opened up Windows Explorer and spotted a new hard drive. Continue reading Hey Look I found a USB Flash Drive
Six of the top fifteen threats in 2010 were from Malware. These vicious little programs are designed to do everything from breaking security protocols to logging the keys that your users are typing. In the “2011 Data Breach Investigations Report” as published by the Verizon RISK Team in cooperation with the U.S. Secret Service and the Dutch High Tech Crime Unit; the top two threats were both malware, the top threat was designed to forward data from your secured network and send it to a third party while the very close second level threat was created to allow a nefarious person to remotely access and control your computers.