Request Support or Call 910.756.4087

Category: Computer Repair, Virus/Malware Removal & Prevention

New Malware Detected

April 17th, 2018 by
  Beware of running executable (.exe) files. We found this sticky virus on a machine and decided to get a copy of it to upload for analysis. WARNING, this malicious trojan cannot be removed via most anti-virus applications (we have tested about 10 different applications) as it replicates and creates a non-intrusive RAT via Supremo Remote Software in order to restore itself. It also escalates privileges and implements a rootkit allowing for complete access while blocking yours. This process was found in a hidden directory C:/ProgramData/WeatherBug/ creating 119 registry records. Sophos responded to the uploaded detection with:  "1. SetupNow.exe is a New detection: ...
Read More

Network Security Solutions – Are Your Documents Secure?

January 31st, 2018 by
January 29th, 2018 Network Security Solution Why Choose Sophos? Sophos makes enterprise-grade security that is feasible for small and mid-sized companies. It provides sophisticated protection with simple management that our competitors are unable to match. Created by SophosLabs and DARPA, Sophos has a unique edge in the field of security using theory, synchronized protection, and heuristic learning algorithms to prevent attacks before they happen. This is unlike our competitors who react to attacks rather than prevent them. Endpoint Protection for Businesses Cape Fear Networks is proud to announce our partnership with Sophos, an international network security solutions provider. This is a next-generation level of protection ...
Read More

Identity Phishing and How to Protect Yourself

October 10th, 2017 by
Identity phishing attacks take place everywhere. According to Kaspersky, the online security firm, close to 800 billion attacks were repelled in the year 2015, which approximately 2 million were attempts to take money from bank accounts online. Fraudwatch International, an online fraud protection service, shows recent sites utilized for phishing include Dropbox, Wells Fargo Bank, Microsoft OneDrive, Chase Bank, and WhatsApp. Favored among hackers is Internet Service Provider (ISP). Scammers bust into ISP accounts in larger numbers than financial and banking institutions, according to Anti-Phishing Working Group. Hackers use these ISP accounts to send spam as well as steal credit ...
Read More

Recognizing and Avoiding Internet Scams

May 31st, 2017 by
In today's cyber world, Internet scams are constantly evolving and hacking the information of many Internet users every single day. The best way to avoid these scams is to be able to understand and recognize the different types, as well stay informed about the newest and most popular scams currently circulating the Internet. What are the most common types of Internet scams that cyber criminals are using today? Auto Auctions – sale of non-existent vehicles. Identity Theft – Personal information is compromised and used to obtain credit cards, loans or file tax returns. Emergency Funds – Impersonation of a friend, family member or ...
Read More