Cyber Security Today: Suspected malware from North Korea, a clumsy Internet provider and reset your router

Watch out for malware suspected of being distributed by North Korea, troubleshooting by an Internet service provider could have led to big trouble and reset your routers.

We’re bringing you the latest cyber security news Welcome to Cyber Security Today. It’s Wednesday May 30th. To hear the podcast, click on the arrow below:

Cyber Security Today on Amazon Alexa Subscribe to Cyber Security Today on Google Play Subscribe to Cyber Security Today on Apple Podcasts

The U.S. Department of Homeland Security and the FBI this week have again reminded computer users and IT administrators to follow best security practices. This follows an alert about two pieces malware believed to be distributed by North Korea. The distribution has been going on for at least a decade, with the malware able to steal passwords and data.

The defences to these attacks are simple: Keep operating systems and software up-to-date with the latest patches. Make sure your anti-malware software is up to date. Scan all software downloaded from the internet before it runs.

Companies need to restrict the permission of employees to install and run unwanted software applications. Disable Microsoft’s File and Printer Sharing service, and make sure passwords are tough and need two-factor authentication.

Internet service providers who give a router to home and small business customers for connecting to the Internet are as responsible for cyber security as you are. And when they make a mistake it can be costly. That was proved recently when a provider in Singapore left a port open on approximately 1,000 customer routers while it was doing remote troubleshooting on the devices. That meant the devices were wide open to a potential attack. When the provider was finished it should have shut the port. A local security firm caught the error and gave a warning.

While it’s responsible for an ISP to do some troubleshooting, its staff had better know what they’re doing. Had this not been caught those routers could have been hacked and used to spread malware. It’s another example of how human error can defeat the best cyber security.

Speaking of routers, owners of certain WiFI routers made by Cisco Linksys, Netgear, TPLink and others are being urged to reset their devices after the discovery that more a half a million devices around the world have been infected. A rest will temporarily disrupt the malware if it’s on the device. The reset procedures will be in your instruction manual. The reset puts the device back to its factory setting. Then you have to log in to its administrative page using a Web browser and change the default password to something tough and safe. Finally, make sure your router has the latest security patches. There’s a link here for more information. UPDATE Here’s another place to go for router reboot advice.

That’s it for Cyber Security Today. Subscribe on Apple Podcasts, Google Play, or add us to your Alexa Flash Briefing. Thanks for listening. I’m Howard Solomon.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

ITWC podcast network

Subscribe to ITWC podcasts and never fall behind on the conversation in technology again. Our daily podcasts are perfect to add to your smart speaker’s daily briefing or to your favourite podcast app on your smartphone. 

Cyber Security Today Podcast

#Hashtag Trending Podcast