RESCUECOM Gives Warning on Stuxnet Malware

Avoid Stuxnet with RESCUECOM's Help

FOR RELEASE:
October  8, 2010

Rescuecom Warns of Stuxnet Dangers

SYRACUSE, N.Y., October 8, 2010 ― Stuxnet, the most sophisticated piece of malware ever, highlights the dangers of malware. Stuxnet's method of infection and the likelihood of imitation put everyone's Internet security at risk. RESCUECOM's computer support experts explain what you need to know about Stuxnet, Internet security, and protecting yourself.

Most malware targets an individual's Internet security, but Stuxnet worked on a much larger scale. Stuxnet targeted industrial computers, intent on compromising their Internet security and taking control of them. "It's larger and more sophisticated than most other pieces of malware," says RESCUECOM CEO David Milman.

Stuxnet exploited four Zero Day vulnerabilities - unpatched Internet security weaknesses. "One such weakness," says Milman, "can be dangerous. Four is an Internet security and computer support nightmare." Exploiting four Internet security vulnerabilities allowed Stuxnet to remain active even if one hole was patched.

Stuxnet was spread through an infected USB drive and was designed to only infect three computers and then delete itself. Most malware developers produce so many programs, they often don't worry much about getting caught. Stuxnet's developers focused on bypassing Internet security and avoiding detection by computer support staff.

The risk of imitation and more cautious malware developers are reasons to worry. Milman offers these suggestions for keeping your Internet security intact.

  • Use care with USB drives -This has become a more common malware deployment method. If you don't have first hand knowledge of the contents of a USB drive, don't put it into your computer.
  • Consider your exposure - Stuxnet targeted industrial and manufacturing systems. If you work in these fields, always consider yourself more of a target and be more proactive about your Internet security.
  • Update and patch regularly - The developers of Stuxnet exploited Zero Day vulnerabilities. However, malware also targets long standing weaknesses as well. Update your Internet security programs daily, and install all patches released for any software on your system.
  • Use computer support - If your computer does become infected, ensure your future safety by seeking out professional computer support. Stuxnet was designed to reinstall itself even after cleaning, which is not uncommon among malware programs. Utilize professional computer support to clean your system completely.
  • Stay informed - Stuxnet was first reported months ago. Keep yourself informed of new threats and dangers. This will increase the chances you'll catch a problem early and safe yourself time and money spent on computer support.

Being mindful of the lessons of Stuxnet can help keep your Internet security intact and avoid computer repair problems in the future.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware or software. For computer support or information on products, services, or computer repair, visit http://www.rescuecom.com or call (703) 986-3233.

For More Information, Contact:

Christina Johnson, PR Specialist
1-800-737-2837
cjohnson@rescuecom.com

Google Reviews

Carli Wittkowski
Carli Wittkowski
a week ago
Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer se
...Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer service and so very helpful. I would most definitely recommend. less
Karen Beller
Karen Beller
2 weeks ago
Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very
...Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very knowledgeable. Thank You. less
Robin Penick-Funderburk
Robin Penick-Funderburk
3 weeks ago
A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest,
...A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest, and started taking control of my computer and my life. They sent emails pretending to be me that really looked like they were coming from me. They tried to take control of our corporate bank accounts, added themselves as a user to my Microsoft account, and locked me out of my computer as my passwords no longer worked. My ability to run a telecom company ground to a halt, and all my company and personal information was at their fingertips. I felt so helpless, and I needed folks smarter than the hacker(s) to do battle for me. Our typical computer pros couldn't handle it, and neither could other "experts" I called. Lucky for me I called RESCUECOM, and they immediately got to work. They didn't complain though I was asking for help in the middle of the night, but immediately got to work and worked non-stop to restore everything and protect me going forward. The team at RESCUECOM are my knights in shining armor, and they're the absolute best! less
Krishna Kambhampati
Krishna Kambhampati
2 months ago
Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone
...Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone to answer my call. I would recommend them to anyone that needs tech support. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes