The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new warning that the Google Chrome browser and Excel spreadsheets may be at risk of attack. The agency has identified two new exploits that could allow hackers to easily access your computer.
Federal agencies have until January 23 to ensure they are protected. Here are some ways to ensure you're protected too.
Microsoft logo on keyboard (Kurt “Cyber Guy” Knutson)
New Microsoft Excel exploit
Hackers are targeting Microsoft Excel by exploiting a huge vulnerability in libraries that read Excel files. This bug is in a library called Spreadsheet::ParseExcel. This allows hackers to execute malware remotely. Specifically, a hacker could use the strings in the library to run programs on your computer.
This exploit has appeared before.security company Camas Last month, we noticed Chinese hackers using an exploit. They exploit the bug by creating custom Excel attachments to run the desired program.
Barracuda addressed the issue with a patch, but says open source libraries may still be at risk. The company also issued a warning to anyone using Spreadsheet::ParseExcel, recommending that they review the bug and take necessary action.

Google Chrome browser on laptop (Kurt “Cyber Guy” Knutson)
Read more: 7 signs you've been hacked
Google Chrome bug
Google's Day 8 Zero attack came in the form of an attack on an open source project. WebRTC Allows web browsers and mobile applications to communicate in real time. However, hackers use this to overload your browser, causing it to crash or allowing them to do whatever they want. This exploit doesn't only affect Google Chrome. It also affects other open source web browsers that use WebRTC for communication. Google issued an emergency fix last month, but there's more you can do to protect yourself.
4 important tips to protect your device and data from hackers and scammers
To protect yourself from malicious hackers and scammers, we recommend that you do the following four things:
1) Be careful when using open source applications
When using open source applications and programs, it is wise to remember that anyone can modify the application's or program's code. They have the ability to do malicious things if they wish. Use only trusted open source applications and be careful about what you download.
2) Update your application regularly
One of the easiest ways to protect yourself from hackers and scammers is to latest applications. Hackers often exploit vulnerabilities in outdated software to gain access to your devices and data. Regularly updating your applications can patch these security holes and prevent them from being exploited by hackers.
3) Avoid opening suspicious attachments and links
Another common way hackers and scammers try to infect your device and steal information is by sending malicious attachments or links. These may be disguised as legitimate emails, messages, or websites, but may include: malware, Phishing or ransomware. To avoid falling into these traps, always check the sender, subject, and content before opening an attachment or link. If you are unsure, do not open or click.
4) Use antivirus protection
Antivirus protection is essential to protect your computer and data from malicious attacks. A recent exploit allows hackers to remotely execute malware by sending a custom Excel attachment, overloading the browser and gaining access to the system.
Therefore, the best way to protect yourself is to antivirus protection Installed and actively running on all devices. It alerts you to malware in your system, warns you not to click on malicious links in phishing emails, and ultimately protects you from hacking. Read our review of Best Antivirus Protection here.

The best way to protect yourself is to have antivirus protection installed and actively running on all your devices. (Kurt “Cyber Guy” Knutson)
More: New iPhone security threat lets hackers spy on your phone
What to do if you get hacked
If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.
change password
If a hacker uses a keylogger to record your passwords, they can access your online accounts and steal your data and money. On another device (i.e., laptop or desktop), you should change the passwords for all your important accounts, including email, banking, and social media. I would like to do this on a separate device so hackers don't record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.
Monitor your account and transactions
You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, please report it to your service provider or authorities as soon as possible. You should also check your credit report and score to see if there are any signs. identity theft Or fraud.
Use identity theft protection
Identity theft protection companies monitor your personal information, such as your household title, social security number (SSN), phone number, and email address, and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft..
Please contact your bank or credit card company
If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You should contact your bank or credit card company and let them know the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.
Alert a contact
If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or respond to messages from you that seem suspicious or unusual.
Restore your device to factory settings
If you want to make sure your device is completely free of malware and spyware, you can restore your device as follows: Factory settings. This will erase all your data and settings and reinstall your original iOS version.But you should Back up Restore important data before doing this and only restore from trusted sources.
Read more: Got a credit card fraud alert? How criminals can steal your payment card details
Cart important points
Recent exploits targeting Google Chrome and Microsoft Excel are a reminder of how vulnerable our devices and data are to cyberattacks. Hackers are always looking for new ways to exploit the software we use every day, so we need to be vigilant and proactively protect ourselves. By following the steps outlined above, you can reduce your risk of falling victim to these attacks and keep your computer and data safe. Remember that prevention is better than cure and the best defense is a good attack.
Which aspects of the cyber threats described in this article concern you the most and why? Please email us at. Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.
Ask your cart a question or let us know your story you'd like us to feature.
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.



