Tag Archive for: backup

This PC backup and security app bundle is on sale for 73% off


TL;DR: The PC Transfer Kit Bundle is on sale for £27.75, saving you 73% on list price.


It might be a while before your new computer feels as familiar as the old one. Whether it’s apps you haven’t downloaded yet or files you lost when your old machine failed, it can take some time to get acclimated to a new computer. That is, unless you use a few apps that practically let you copy everything you need onto your new one. 

The PC Transfer Kit features three apps: PCmover Professional, DiskImage, and SafeErase. Between these three apps, you can move your files and apps from one computer to another, create a bootable copy of everything on a computer, and securely delete your files. Normally, lifetime subscriptions to these three apps would cost around £100, but you can get them for £27.75.

This bundle gives you three lifetime licenses to be installed. Each app can be installed on one computer with no recurring costs.

If you’re getting a new computer, PCmover Pro could be a major time saver. This app lets you automate a transfer of practically all your data from one computer to another. Send your applications, files, settings, and user profiles from one computer to another. Pick things out individually to transfer or send everything at once. Plus, if you need help at any stage of the transfer, you get free transfer assistance from a certified migration expert. 

DiskImage is more than a backup service. Use this app to create a copy of all your applications, files, and settings on your PC. Set DiskImage to copy automatically on a schedule or arrange it manually whenever you want. Once your copy is made, you can store it on a bootable external storage source.

You can also permanently delete files using SafeErase’s government-recommended deletion methods that completely wipe selected data from your hard drive. Clear your browser history, files, email archives, internet history, and even photos in moments. Select individual files to delete or do a blanket wipe. 

Get the PC Transfer Kit Bundle on sale for £27.75.

PC Transfer Kit Bundle

Source…

Ransomware gang exploiting unpatched Veeam backup products


Researchers at WithSecure have issued an alert after uncovering evidence that a notorious cyber criminal gang is exploiting a recently disclosed vulnerability in Veeam Backup & Replication data backup and recovery software to access its victims’ networks.

Tracked as CVE-2023-27532, the Veeam vulnerability was first published on 7 March 2023. It enables an unauthenticated user who has accessed the backup infrastructure network perimeter to get their hands on encrypted credentials stored in the configuration database, which may ultimately lead to them gaining access to the backup infrastructure hosts.

It is classified as a high-severity bug and carries a CVSS v3 score of 7.5. It exists in the Veeam.Backup.Service.exe process of Veaam Backup & Replication, Veeam Cloud Connect, Veeam Cloud Connect for the Enterprise and Veeam Backup & Replication Community Edition.

“WithSecure Intelligence identified attacks which occurred in late March 2023 against internet-facing servers running Veeam Backup & Replication software,” wrote WithSecure analysts Neeraj Singh and Mohammad Kazem Hassan Nejad.

“Our research indicates with high confidence that the intrusion set used in these attacks is consistent with activities attributed to the FIN7 activity group. It is likely that initial access and execution was achieved through a recently patched Veeam Backup & Replication vulnerability, CVE-2023-27532,” they explained.

“Our research indicates with high confidence that the intrusion set used in these attacks is consistent with activities attributed to the FIN7 activity group. It is likely that initial access and execution was achieved through a recently patched Veeam Backup & Replication vulnerability, CVE-2023-27532”
Neeraj Singh and Mohammad Kazem Hassan Nejad, WithSecure

FIN7 is a prolific and dangerous financially motivated operator that has deployed multiple strains of ransomware in its attacks – including BlackCat/ALPHV, BlackMatter, DarkSide and, at one time, REvil – after pivoting to extortion from payment card data theft about three years ago.

The group may have links to multiple recent high-profile cyber attacks, including the developing heist on…

Source…

Cyber Security Today, March 31, 2023 – World Backup Day advice, new malware targeting Linux and more


World Backup Day advice, new malware targeting Linux and more

Welcome to Cyber Security Today. It’s Friday, March 31st, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

Today is World Backup Day. I have a long story on ITWorldCanada.com which is tailored for IT department leaders in mid-to-large firms, so on this podcast I want to address IT leaders in small businesses. The good news is backup and recovery should be easier because your environment will be simpler compared to a multi-million dollar retailer. Still, some of the same rules apply: First, decide what data needs to be backed up, giving priority to sensitive information and how often it needs to be backed up. Second, make sure data is backed up off-site as well as on-site. And for extra protection, it should be encrypted. Third, make sure the off-site backup can’t be compromised by a hacker. One of the biggest failures of IT is to protect off-site backup from being encrypted, ruining any chance of data restoration. Fourth, document your backup procedures so when staff leave the knowledge doesn’t go with them. And last, have IT staff regularly practice restoring a backup. You’ll need that experience in a crisis.

Attention Linux administrators: New malware targeting Linux servers has been discovered. Researchers at the French firm Exatrack call it Melofee, and believe it was created by a group based in China. It drops a rootkit and a server implant. The implant can update itself, create a new socket for interaction, search for system information, read and write files and more. The implant hasn’t been widely seen, suggesting the attacker uses it only to go after high value targets.

University researchers say there’s a fundamental flaw in the Wi-Fi protocol that could affect devices running Linux, FreeBSD, Android and iOS. In a summary of the report, the Hacker News notes that the flaw could be used to hijack TCP connections or intercept client and web traffic. The power-save mechanisms in endpoint devices could trick access points into leaking data frames in plaintext.

Cisco Systems said attacks could be successful against its Wireless…

Source…

5 email security tips you should know | #cybersecurity #cyberprotection