Get Started Today!  321-259-5500

croom new

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million.

How Could My Asus Laptop Get Hacked?

This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus’s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it’s just being noticed now.

The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack.

What Do I Do Now?

First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date.

If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They’ve also patched their internal systems to help prevent similar attacks from happening in the future. You’ll want to make sure you have Live Update 3.6.9 installed.

Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool.

We HIGHLY encourage you to reach out to TotalCareIT™ if you are running any Asus hardware. It’s better to be safe than sorry.

Tip of the Week: Understanding Bandwidth
Using Technology to Build Your Customer Relationsh...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Computing Business Internet Email Hosted Solutions Productivity IT Services Computer Data Backup Network Security Productivity Mobile Devices Hardware Microsoft Software Google Efficiency Managed Service Provider Workplace Tips User Tips Ransomware Tech Term Windows 10 Smartphone Android Server Innovation Business Continuity Disaster Recovery Cloud Computing Small Business IT Support Data Management Social Media Communication Business Management Smartphones Upgrade Encryption IT Support Network Phishing App Managed IT Services Data Backup Browser Windows Artificial Intelligence Data Recovery Office 365 BYOD Facebook Outsourced IT Gmail Office Windows 10 Big Data Apps Internet of Things Passwords Paperless Office Employer-Employee Relationship Collaboration Vendor Management Managed IT Services WiFi Microsoft Office Save Money Government Holiday Remote Monitoring Hosted Solution Mobile Device Management VoIP communications Robot Recovery Wireless Vulnerability Saving Money Wi-Fi Risk Management Two-factor Authentication Miscellaneous Chrome Office Tips Spam Alert Firewall Wireless Technology Cybersecurity Analytics Automation Document Management IT Management IT solutions Website Hacker Customer Service Content Filtering Quick Tips Bandwidth Infrastructure How To VPN Social Tip of the week Antivirus Money Password Word Settings Virtualization Budget Work/Life Balance Scam Managed Service Avoiding Downtime Customer Relationship Management Remote Computing Data storage Virtual Reality Applications BDR Apple Business Technology IT service SaaS Politics Maintenance Going Green Hard Drives Twitter Legal Education Mobile Device Bring Your Own Device Tech Support Cybercrime The Internet of Things Blockchain Storage Computing Information Unified Threat Management Machine Learning Healthcare Downtime Compliance Tablet Networking Hacking Samsung Cortana Business Owner Computer Care YouTube Competition Regulations Users Business Intelligence Data Security Identity Theft Unified Communications User Mobile Security End of Support Training Private Cloud File Sharing Virtual Private Network Running Cable Outlook Management Best Practice G Suite eWaste Computers Solid State Drive Point of Sale User Error Search LiFi Health Sports Heating/Cooling Taxes Upgrades Websites Telephone Systems Printing Operating System Electronic Medical Records Administration Physical Security Chromebook Safety How To Mouse Botnet Router Presentation Automobile Server Management Net Neutrality Google Drive Monitors Augmented Reality Network Management IBM Virtual Desktop Data loss Access Control HIPAA Cost Management Patch Management Lithium-ion battery IoT Favorites Meetings Trending Alerts Application ROI Fun Touchscreen Database Statistics Distributed Denial of Service Backups Personal Information Halloween Typing Fraud Vulnerabilities RMM Comparison Mobile Data Relocation Cookies Electronic Health Records Cabling Recycling Remote Monitoring and Management Digital Google Wallet SharePoint Entrepreneur Gadget Consulting Identities Title II Star Wars Instant Messaging Webcam CIO Current Events Licensing Writing Notifications OneNote Notes Voice over Internet Protocol Bluetooth Managed IT Service Computer Repair Scary Stories Cryptocurrency Black Market Development Law Tech Terms Specifications Social Networking Nanotechnology Files Online Zero-Day Threat IP Address Spyware Drones Downloads IT Technicians Managed Services Provider Undo Google Maps Mobile Computing Assessment Finance Techology Cooperation Retail Crowdsourcing Employee-Employer Relationship PowerPoint Supercomputer Knowledge Windows 7 Break Fix Bitcoin Lenovo Hotspot Network Congestion Cables Theft 5G Staffing VoIP Black Friday Screen Reader Read Only Public Speaking Travel Disaster Mail Merge Microsoft Excel Humor Update Company Culture Human Error Mobile Office Multi-Factor Security Environment Mirgation Motherboard E-Commerce Error Internet Exlporer Authentication Web Server Corporate Profile Unified Threat Management Staff Social Engineering Remote Workers Refrigeration Professional Services IT Budget Servers Experience Dark Web Motion Sickness Uninterrupted Power Supply Windows 8 Superfish Language Display Processors Wires Financial GPS Time Management Cyber Monday Smart Tech Printers Business Growth Address Analyitcs Managing Stress Permission IT Consultant Google Calendar Chatbots 3D Printing Features Hard Drive Authorization Cameras WannaCry Printer Wearable Technology Wasting Time Digital Payment Deep Learning Shortcut iPhone Managed IT Hard Disk Drive Buisness Hacks Computing Infrastructure Security Cameras Tracking Hiring/Firing Smart Technology Connectivity Bookmarks Laptop Alt Codes Marketing Permissions Dark Data Emoji Enterprise Content Management Test Cleaning Firefox Co-managed IT Save Time Legislation Troubleshooting Identity Unsupported Software Modem Administrator Google Docs Help Desk Cache Employees CCTV Information Technology Law Enforcement Monitoring Gadgets FCC Regulation Emergency USB Flexibility Domains CrashOverride Students Teamwork Shared resources

      Latest Blog Entry

      If your business is one that depends on transportation, you know that coordination is extremely important. With consumers’ reliance on a company’s distribution arm, today’s companies are turning old practices on their heads and utilizing a more technology-driven approach to ...

      Account Login