SELECT LANGUAGE BELOW

Homeland Security warns federal agencies of hackers targeting Google Chrome, Excel spreadsheets

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new warning that the Google Chrome browser and Excel spreadsheets may be at risk of attack. The agency has identified two new exploits that could allow hackers to easily access your computer.

Federal agencies have until January 23 to ensure they are protected. Here are some ways to ensure you're protected too.

Click to get the free CYBERGUY Newsletter in your cart, including security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

Microsoft logo on keyboard (Kurt “Cyber ​​Guy” Knutson)

New Microsoft Excel exploit

Hackers are targeting Microsoft Excel by exploiting a huge vulnerability in libraries that read Excel files. This bug is in a library called Spreadsheet::ParseExcel. This allows hackers to execute malware remotely. Specifically, a hacker could use the strings in the library to run programs on your computer.

This exploit has appeared before.security company Camas Last month, we noticed Chinese hackers using an exploit. They exploit the bug by creating custom Excel attachments to run the desired program.

Barracuda addressed the issue with a patch, but says open source libraries may still be at risk. The company also issued a warning to anyone using Spreadsheet::ParseExcel, recommending that they review the bug and take necessary action.

Department of Homeland Security warns federal agencies about hackers targeting Google Chrome and Excel spreadsheets

Google Chrome browser on laptop (Kurt “Cyber ​​Guy” Knutson)

Read more: 7 signs you've been hacked

Google Chrome bug

Google's Day 8 Zero attack came in the form of an attack on an open source project. WebRTC Allows web browsers and mobile applications to communicate in real time. However, hackers use this to overload your browser, causing it to crash or allowing them to do whatever they want. This exploit doesn't only affect Google Chrome. It also affects other open source web browsers that use WebRTC for communication. Google issued an emergency fix last month, but there's more you can do to protect yourself.

4 important tips to protect your device and data from hackers and scammers

To protect yourself from malicious hackers and scammers, we recommend that you do the following four things:

1) Be careful when using open source applications

When using open source applications and programs, it is wise to remember that anyone can modify the application's or program's code. They have the ability to do malicious things if they wish. Use only trusted open source applications and be careful about what you download.

2) Update your application regularly

One of the easiest ways to protect yourself from hackers and scammers is to latest applications. Hackers often exploit vulnerabilities in outdated software to gain access to your devices and data. Regularly updating your applications can patch these security holes and prevent them from being exploited by hackers.

3) Avoid opening suspicious attachments and links

Another common way hackers and scammers try to infect your device and steal information is by sending malicious attachments or links. These may be disguised as legitimate emails, messages, or websites, but may include: malware, Phishing or ransomware. To avoid falling into these traps, always check the sender, subject, and content before opening an attachment or link. If you are unsure, do not open or click.

4) Use antivirus protection

Antivirus protection is essential to protect your computer and data from malicious attacks. A recent exploit allows hackers to remotely execute malware by sending a custom Excel attachment, overloading the browser and gaining access to the system.

Therefore, the best way to protect yourself is to antivirus protection Installed and actively running on all devices. It alerts you to malware in your system, warns you not to click on malicious links in phishing emails, and ultimately protects you from hacking. Read our review of Best Antivirus Protection here.

Department of Homeland Security warns federal agencies about hackers targeting Google Chrome and Excel spreadsheets

The best way to protect yourself is to have antivirus protection installed and actively running on all your devices. (Kurt “Cyber ​​Guy” Knutson)

More: New iPhone security threat lets hackers spy on your phone

What to do if you get hacked

If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.

change password

If a hacker uses a keylogger to record your passwords, they can access your online accounts and steal your data and money. On another device (i.e., laptop or desktop), you should change the passwords for all your important accounts, including email, banking, and social media. I would like to do this on a separate device so hackers don't record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.

Monitor your account and transactions

You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, please report it to your service provider or authorities as soon as possible. You should also check your credit report and score to see if there are any signs. identity theft Or fraud.

Use identity theft protection

Identity theft protection companies monitor your personal information, such as your household title, social security number (SSN), phone number, and email address, and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft..

Please contact your bank or credit card company

If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You should contact your bank or credit card company and let them know the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.

Alert a contact

If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or respond to messages from you that seem suspicious or unusual.

Restore your device to factory settings

If you want to make sure your device is completely free of malware and spyware, you can restore your device as follows: Factory settings. This will erase all your data and settings and reinstall your original iOS version.But you should Back up Restore important data before doing this and only restore from trusted sources.

Read more: Got a credit card fraud alert? How criminals can steal your payment card details

Cart important points

Recent exploits targeting Google Chrome and Microsoft Excel are a reminder of how vulnerable our devices and data are to cyberattacks. Hackers are always looking for new ways to exploit the software we use every day, so we need to be vigilant and proactively protect ourselves. By following the steps outlined above, you can reduce your risk of falling victim to these attacks and keep your computer and data safe. Remember that prevention is better than cure and the best defense is a good attack.

Which aspects of the cyber threats described in this article concern you the most and why? Please email us at. Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.

Ask your cart a question or let us know your story you'd like us to feature.

Answers to CyberGuy frequently asked questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News