
Ebay on Wednesday released a warning to all its users to change their passwords following a security hack that compromised a database containing encrypted passwords and other non financial data.
Simultaneously the Ecommerce giant reassured its consumers that for the moment there are no evidence of any unauthorized activity or access to financial or credit card information, which they say are kept separately in encrypted format.
Ebay does not seem to be too concerned about this stolen personal information like postal addresses and dates of birth, as they assert the stolen identities could not be used to access other companies owned by the auction site, including PayPal or GumTree.
But others have different thought saying that the repercussions of this data theft could be felt for a long time after the break-in since we are dealing with identity theft.
The fact is that someone in now claiming to have a copy of the Ebay’s stolen database and is selling that for 1.45 bitcoin (£447) via the website Pastebin.
Ebay took two months to discover it had been hacked as no unusual activities were detected until May. Apparently a couple of employees company identities were stolen in February, after that the compromised database, which included eBay customers’ names, encrypted passwords, email addresses, mail addresses, phone numbers, and dates of birth, was hacked between late February and early March.
Ebay realized the attack just recently after the repeated attempts to access a database that was restricted for the two identities.
Now some customers are complaining on eBay Community forums saying that they didn’t receive much information about the breach from eBay and have yet to get notifications by email, which the company has promised to do.
The good part is that apparently Paypal doesn’t seem involved in the security attack.
Nevertheless this is another warning call for organizations that need to take an very careful approach to internet security, hacker are more and more capable and keen to get sensible data.

Cloud computing became a very popular term; everyone is now switching to the cloud.
When it first appeared as a concept, a lot of critics dismissed it as being the latest tech fad. However, cloud computing managed to cut through the hype shifted the paradigm of how IT is done nowadays
But what exactly is “Cloud Computing”? The “cloud”refers to the internet, so when we refer to Cloud Computing we refer to the way data are stored and accessed through an internet connection, this means that people are allowed to access their data anytime and anyplace.
Why is so popular? It is a great and easy way to storage your data, but is it a reliable solution? The answer is no, not at 100%.
Like most things in life, benefits come with risks. Let’s try to understand which are the benefits and if they can outweigh the risks.
BENEFITS:
RISKS:
In conclusion despite its disadvantages, cloud computing remains a great choice for businesses especially if well contemplated with the right provider. We certainly hope that the advantages will further grow and the disadvantages will be eliminated but the future certainly looks promising.
![]()
Google finally released yesterday an update for Google Chrome after fixing the three critical security vulnerabilities of Adobe Flash, Reader and Acrobat that were affecting the Windows, Mac and Linux versions of the browser. In fact before of the update was seriously possible for malicious attacker to take control of user’s operating system.
After paying $ 4,500 to make the better update possible, Google in now encouraging users and administrators to make the necessary updates.

The update is not only available for PC but for Android devices as well, as Chrome is recognized as the most used browser for Androids with over five hundreds millions installs. But although the update contains multiple security and stability update, there are still major issues, like YouTube support for casting videos and full screen video controls, that have not been addressed yet and that could lead in a future loss of popularity for the famous browser,
You can read more about Microsoft Security Bulletin at this link: https://technet.microsoft.com/library/security/ms14-may
For more information please Contact Us or visit our Service Page

More and more often small to large business choose to outsource their IT System. This trend is given to a series of reasons that eventually will bring the cost down and the reliability up.
Let’s have a more detailed look to each of these reasons:
Visit our Service page for more informations or call us at: 07 3871 1222
Computit | IT Support Brisbane

Cryptolocker is an evolution of non familiar ransomware schemes in which the malware encrypts all the files he finds in different network resources, including shared network drives, removable media such as USB sticks, external hard drives, network file shares and some cloud storage service, and ask for the description key that you should get after paying a fee. The goal of all ransomware variants is to extort money from victims in one way or another.
US-Cert sais the number of infections caused by Cryptolocker are rising and is important NOT TO PAY the demanded fee, but instead report it to the Cybercrime Federal Police.
If the red screen notice of Cryptolocker appear on the screen is very important to disconnect the computer from its wireless network immediately as all other computers of the network are then likely to be infected.
Normal antivirus software protection doesn’t provide a great level of security as the antivirus usually detect the malware after few hours, but meanwhile it is able to encrypt thousands of files on the local drive and present the user with the now-familiar bitmap image explaining the attacker’s demand for ransom.
Avoiding ransomware and minimizing its damage is much the same as avoiding other types of other malware.
A good Antivirus software is a must and is aldo important to and keep Windows and browser-related components (Java, Adobe, and the like) updated. Always be wary of unexpected email attachments and spam. (CryptoLocker spreads via .zip files sent as email attachments, for example.)
And just to beat this dead horse one more time: Always have a good backup system in place, this is particularly true for business whose loss of data often mean loss of money and reputation.
If you want to know more about how to protect your data, visit our Service Page.
http://www.computit.com.au/disaster-recovery or call us at 1300 443 507
Computit, IT Company Brisbane
With just under 3 months to go until Microsoft stops supporting Windows XP, it’s worth starting to plan what your business is going to do as the deadline draws nearer. That is, if you are still using it.
Perhaps you think that if you just continue as you are that “everything will be alright”, or have the attitude of “she’ll be fine mate, we’re careful”.
But if you’re approaching your business IT solutions in this way, it can be a nasty wake up call for you when issues arise and you can’t continue trading due to the loss of data or funds.
So here are some things to think about if your business still uses Windows XP:
Running a small to medium business can be daunting as you juggle staff, clients, products, suppliers, finances, and the list goes on.
While you’re busy doing all of the above and more, have you ever thought about your business security and the risks that can be posed by your ex-employees? Do you have an exit strategy for your business where staff are given an exit interview, keys handed in and then all computer access removed for them?
If you are looking for a trustworthy Managed IT Service Provider, you have come to the right place.











