Google urges Chrome users to upgrade to latest version

Due to a security vulnerability, Google is urging users of their Chrome web browser to update to the latest version. As the article mentions in the first link below, Chrome updates are usually automatically performed.

To see the current version of Chrome on a Mac, you can access the Chrome menu in the top left while in the browser and choose “About Google Chrome”. The second of two links below explains how to check if on a Windows-based PC.

This is another example of ensuring that your software is kept up to date.

https://www.pcmag.com/news/367015/stop-what-youre-doing-and-update-google-chrome

https://www.pcmag.com/feature/364079/how-to-update-google-chrome/2

Multi-level hack on email provider destroys almost two decades of data

People holding message bubbles

“Email provider VFEmail said it has suffered a catastrophic destruction of all of its servers by an unknown assailant who wiped out almost two decades’ worth of data and backups in a matter of hours.” The hacker (or hackers) acquired multiple passwords related to the service, and formatted all hard drives related to the serving of email. They were discovered in the middle of formatting the backup server. The email is “effectively gone” as stated in the article.

This is a good reminder that it’s important to have a backup of your IMAP mail or other online email (such as Yahoo Mail or Gmail) to your local computer, which also has a backup. Backups are a good idea always, in all circumstances.

https://arstechnica.com/information-technology/2019/02/catastrophic-hack-on-email-provider-destroys-almost-two-decades-of-data/

Hackers use malicious Windows file to access MacOS

Mouse pointer hovering over the work security

Hackers are utilizing the file type “.exe” to unload malicious software onto MacOS powered computers. As the article linked below mentions, by default, .exe files won’t run on a Mac. The malicious download worked around this limitation by bundling the .exe file with a free framework known as Mono. Mono allows Windows executables to run on MacOS, Android, and a variety of other operating systems.

Users should be cautious of downloading any software from insecure resources such as Torrent sites. Torrent sites provide users with the ability to download any type of software, movies, games, etc, which leads to a “Wild West” scenario, where all bets are off with the type of files that you’re actually downloading.

It’s also wise to ensure children are not accessing these sites either, and to block access to Torrent resources on company networks.

https://arstechnica.com/information-technology/2019/02/clever-trick-uses-windows-executable-file-to-install-malicious-payload-on-macs/