shutterstock 4600 TEST SIZE V1 051716

 

 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million.

How Could My Asus Laptop Get Hacked?

This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus’s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it’s just being noticed now.

The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack.

What Do I Do Now?

First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date.

If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They’ve also patched their internal systems to help prevent similar attacks from happening in the future. You’ll want to make sure you have Live Update 3.6.9 installed.

Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool.

We HIGHLY encourage you to reach out to TWINTEL Solutions if you are running any Asus hardware. It’s better to be safe than sorry.

Tip of the Week: Adjusting Microsoft Word to Match...
Getting to Know About Phishing Attacks Can Keep Yo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, April 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Microsoft Data Internet VoIP Email Software Productivity Business communications Disaster Recovery bgc User Tips roundup Innovation nonprofit Business Continuity Hardware Alert IT Services Outsourced IT Smartphones Managed IT Services Efficiency Data Backup Tech Term Workplace Tips Browser Server Windows 10 Managed IT Services Android Cloud Computing Smartphone Ransomware Data Recovery Business Management Saving Money Computer Network Cybercrime Internet of Things IT Support Communication Small Business Windows BDR Quick Tips Computers IT Support Office Miscellaneous Windows 10 Passwords Artificial Intelligence Gadgets Save Money Mobile Device Cybersecurity Productivity Phishing Telephone Systems BYOD Holiday Social Media Collaboration Applications Recovery Router Managed IT Money Mobile Device Management Social Engineering Mobility Chrome Office 365 Virtualization Hacking Upgrade Law Enforcement Proactive IT Facebook Vulnerability Private Cloud Firewall Automation Health Wi-Fi Work/Life Balance Managed Service Provider Password Microsoft Office Remote Monitoring Google Drive VPN Word Two-factor Authentication Data Protection Bring Your Own Device Budget Office Tips Bandwidth Flexibility Operating System Avoiding Downtime How To App Compliance Information Identity Theft Connectivity Safety Encryption Managed Service Training Data Breach Business Intelligence Information Technology HaaS Save Time History Spam Remote Computing Settings Scam Black Market Value Sports Apps Paperless Office Voice over Internet Protocol Mobile Computing Keyboard Software as a Service Data Security Redundancy Servers Hiring/Firing SaaS YouTube Update Business Owner CES Cryptocurrency Cleaning Education Emergency Workers PDF Big Data Government Display Computing Infrastructure Credit Cards Solid State Drive WiFi Document Management Content Management Access Control Computer Care Marketing Legal Patch Management Blockchain Virtual Assistant Hacker Windows 7 Fraud HIPAA OneNote The Internet of Things Google Docs Risk Management Samsung Users Charger Physical Security Telephony Unsupported Software Human Resources Telephone System Data Storage Website Automobile Electronic Medical Records Augmented Reality Infrastructure Staff Worker End of Support USB IT Management Data Management Employer-Employee Relationship Data storage Meetings Comparison Entertainment Unified Threat Management Spam Blocking Wireless Battery Content Filtering Machine Learning Wireless Technology IT Plan Monitor Colocation Database Tip of the week Scalability Experience Warranty FENG Hard Drives Search Engine Data loss Digital Signage HBO Specifications Inventory Wiring Windows 10s Tools Theft Business Mangement HVAC Smart Technology Network Congestion Robot Customers Manufacturing Flash Evernote Wireless Internet Trending Safe Mode Employer Employee Relationship webinar Business Technology Windows Server 2008 Devices Printer Relocation Bing Screen Mirroring Techology Files Google Search Outlook Millennials Public Cloud Gmail Networking Two Factor Authentication Accountants MSP Vendor Management Sync Wireless Charging Shadow IT Books Cortana Wire IBM Security Cameras Data Warehousing Lifestyle Computer Accessories Conferencing Instant Messaging Thought Leadership Mouse Assessment Humor Help Desk Cast Net Neutrality Workforce Authentication Mobile Recycling Enterprise Content Management IT Consultant Best Practice Content File Sharing Laptop Fiber-Optic Hosted Solution Google Apps Smart Office Supercomputer Apple Botnet Chromecast Bluetooth Netflix Internet Exlporer Biometric Security Regulations Amazon Search Twitter Administrator Television CrashOverride Shortcuts ISP Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Audit Professional Services Virtual Reality eWaste Password Management Leadership Software Tips Audiobook Practices Touchpad Skype Cables Transportation Current Events iPhone Smartwatch Regulation 5G Amazon Web Services How to Addiction Public Computer Social NarrowBand User Error Cryptomining Excel Remote Work Smart Tech Printers Loyalty Computer Fan Microchip Worker Commute Criminal NIST Video Games Hosted Computing Remote Worker Start Menu Unified Communications Password Manager Benefits Knowledge Downtime Employee Digital Signature Rootkit Reputation Advertising OLED Going Green Online Shopping Troubleshooting Cache Vendor Multi-Factor Security Thank You nonprofits GDPR Analytics Congratulations E-Commerce