A new bug with Microsoft Edge has caused issues world wide with the New Edge browser to crash when typing into the address bar. The quick workaround at this time while awaiting a fix is to disable the site suggestions. To do this, navigate to Edge settings and select Privacy and services and then scroll […]

A new bug with Microsoft Edge has caused issues world wide with the New Edge browser to crash when typing into the address bar.

The quick workaround at this time while awaiting a fix is to disable the site suggestions.

To do this, navigate to Edge settings and select Privacy and services and then scroll down to Address bar. See image above for help. Slide the “Show me search and site suggestions using my typed characters” to the off state.

We started preparing our clients for the possibility of a lockdown in February. Back then, a potential lockdown was not seen as imminent or even likely for the UK. We reviewed our clients’ existing business continuity plans and created a pandemic strategy. We knew we would have to keep their businesses operating by moving their […]

We started preparing our clients for the possibility of a lockdown in February. Back then, a potential lockdown was not seen as imminent or even likely for the UK. We reviewed our clients’ existing business continuity plans and created a pandemic strategy. We knew we would have to keep their businesses operating by moving their entire work forces home.

Then suddenly lockdown across the UK became a reality and we had to move whole companies to remote working over a single weekend. This brought about some huge logistical and technical challenges for our team. Like our clients, we also had to adapt our business practises to deliver to all our clients quickly but with security at the forefront of everything. We needed to get out to employees’ homes, deliver laptops and other hardware, then login to set up WIFI, install software and systems (even online school for one client) remotely. But most importantly it had to be secure and safe for our clients.

Other businesses might not have had a plan or support to implement one. Many employees will have switched to using their personal computers out of necessity or convenience. Most of these devices will not have the right level of security for a business, creating potentially increased threats to corporate security. Since lockdown started, there has been a huge increase in compromised email accounts, attacks via ransomware and malware, invoice and payment fraud, data breaches and more. Sadly, fraudsters are active, and you must take steps to protect your business. If you rushed to get everyone online at home, take the time now to check the security on the devices they are using. Make sure your work data is being securely backed up, revisit your business continuity plan and make sure you are secure during this pandemic and beyond.

IQinIT Managing Director Katerina Damcova says: “This shift in working from home is here to stay, the accelerated change was long overdue and many of our clients are already planning to keep this as a standard practice. This means changing and adapting the way we support our clients also, and we have learned that we can do this and do it well. We are embracing the change, you can too as long as it’s secure!”

You may receive error messages below: Having Office 365 mailbox spread across multiple data centres can cause issues when accessing shared resources. The issue can demonstrate it self by an inability to send as a shared mailbox or losing access to it completely in Outlook or Web-mail. Outlook error The specified object was not found […]

This image has an empty alt attribute; its file name is image-2-1024x445.png

You may receive error messages below:

Having Office 365 mailbox spread across multiple data centres can cause issues when accessing shared resources. The issue can demonstrate it self by an inability to send as a shared mailbox or losing access to it completely in Outlook or Web-mail.

Outlook error

The specified object was not found in the store., Can’t connect to the mailbox of user Mailbox database guid: XXXX because the ExchangePrincipal object contains outdated information. The mailbox may have been moved recently. Email could not be sent. The message has been moved to your Drafts folder.

Webmail error

Your request can’t be completed at this time

Connect to your remote power-shell and run following command to view your user list and list of databases

Get-MailBox | select Displayname,Database

You will see a list below:

DisplayName Database
———– ——–
Owner 1 GBRP123DG081-db136
Owner 2 GBRP123DG077-db006
Discovery Search Mailbox GBRP123DG059-db037
User 1 GBRP123DG065-db120
User 2 GBRP123DG058-db105
User 3 GBRP265DG075-db123

GBRP – this shows the country location of the data centre

123 – this indicates the datacentre, if this number is different it will cause issues with shared access

To resolve this issue run a command to move the mailbox which location does not match, in our case User 3

New-MoveRequest -identity [email protected]

This will start the mailbox move to the correct database, to check if the mailbox is moving to the correct database run below command to view the current Move Request

Get-MoveRequest -identity [email protected]

DisplayName Status TargetDatabase
———– —— ————–
User 3 InProgress GBRP123DG071-db070

A new type of extortion email has been sneaking into inboxes over the last year. You may be familiar with the traditional ransom email. You would receive an email from a miscreant saying that your browsing habits have been recorded, and without sending a payment this sensitive information will be revealed to the world, to your family, to your colleagues.   What makes this new email particularly frightening to […]

A new type of extortion email has been sneaking into inboxes over the last year. You may be familiar with the traditional ransom email. You would receive an email from a miscreant saying that your browsing habits have been recorded, and without sending a payment this sensitive information will be revealed to the world, to your family, to your colleagues.  

What makes this new email particularly frightening to the receiver, is that these messages include a real password that was linked to their email address. 

Quite often, these are historic passwords, that might not have been used for a number of years. These passwords are most likely pulled from the big database leaks that you may have heard about in the news. Companies like Adobe, Yahoo and Tesco have had data such as usernames and passwords posted to forums where these scammers can readily access them. Details of the websites that have had breaches, and the ability to check if your data was included in one of these breaches can be found on websites such as;  Have I Been Pwned. 

The scammer will claim that, by using this password, they were able to access your web camera, record the sites you were visiting, and your actions while viewing these sites. They say that they installed malware on your computer or that they have accessed your contacts.

 

The email may look something like the below: 

I do kno‌w XXX i‌s yo‌ur pa‌ss. Lets g‌et stra‌i‌ght to th‌e po‌i‌nta‌bso‌lut‌ely no‌ o‌ne has co‌mp‌ensat‌ed m‌e to‌ inv‌esti‌ga‌t‌e a‌bo‌ut yo‌uYo‌u do‌n’t kno‌w m‌e and you ar‌e pro‌ba‌bly thinki‌ng why yo‌u’r‌e g‌etti‌ng thi‌s ‌ema‌il?

i‌n fa‌ct, i s‌etup a malwa‌re o‌n the X vids (po‌rn) w‌eb si‌t‌e a‌nd do‌ yo‌u kno‌w wha‌t, you vi‌si‌t‌ed thi‌s si‌te to‌ ‌experi‌‌enc‌e fun (yo‌u kno‌w wha‌t i‌ mean). Whi‌l‌e yo‌u w‌er‌e viewi‌ng video cli‌psyo‌ur i‌nt‌ernet bro‌ws‌er b‌ega‌n functi‌o‌ni‌ng a‌s a‌ R‌emo‌t‌e co‌ntro‌l D‌eskto‌p tha‌t ha‌s a‌ key lo‌gg‌er whi‌ch pro‌vi‌d‌ed m‌e a‌ccess to‌ yo‌ur displa‌y as w‌ell a‌s ca‌mRi‌ght a‌ft‌er that, my so‌ftwar‌e gath‌er‌ed yo‌ur enti‌r‌e co‌nta‌cts from yo‌ur M‌esseng‌er, FB, a‌s well as ‌ema‌i‌l . a‌nd th‌en i‌ ma‌d‌e a‌ double-scr‌e‌en video‌. 1st pa‌rt displa‌ys th‌e vi‌d‌eo‌ you w‌er‌e viewing (you ha‌ve a‌ fi‌n‌e tast‌e haha), a‌nd n‌ext pa‌rt sho‌ws the vi‌ew o‌f yo‌ur ca‌m, y‌ea‌ i‌ts you.

Yo‌u ha‌v‌e go‌t only 2 so‌luti‌o‌nsW‌e should go‌ thro‌ugh each o‌f th‌es‌e so‌luti‌o‌ns in a‌spects:

1st so‌luti‌o‌n i‌s to‌ ski‌p thi‌s ‌e-ma‌i‌li‌n this i‌nsta‌nc‌ei wi‌ll s‌end o‌ut your vi‌d‌eo‌ to‌ a‌ll yo‌ur yo‌ur co‌ntacts a‌nd th‌en imagi‌n‌e r‌ega‌rding th‌e di‌sgra‌c‌e yo‌u f‌e‌elNo‌t to fo‌rg‌et i‌f yo‌u ha‌pp‌en to b‌e in a‌n i‌mpo‌rta‌nt rela‌tio‌nshi‌pho‌w it i‌s go‌ing to a‌ff‌ect?

2nd o‌pti‌o‌n sho‌uld b‌e to‌ comp‌ensate m‌e 3000 USD. L‌et us thi‌nk of i‌t a‌s a‌ dona‌ti‌o‌nSubsequ‌entlyi‌ mo‌st c‌ertai‌nly wi‌ll qui‌ckly ‌era‌s‌e yo‌ur vid‌eo‌. You ca‌n ke‌ep yo‌ur da‌i‌ly li‌f‌e li‌k‌e thi‌s n‌ev‌er ha‌pp‌en‌ed and you would n‌ev‌er hea‌r ba‌ck a‌ga‌i‌n fro‌m m‌e.

Yo‌u’ll ma‌ke th‌e pa‌ym‌ent vi‌a‌ Bitco‌i‌n (i‌f you do‌ no‌t kno‌w this, search ‘how to‌ buy bi‌t‌coin‘ i‌n Goo‌gl‌e).

B‌TC a‌ddr‌ess to‌ s‌end to‌: xxxx
[Ca‌S‌e-S‌eNSi‌Ti‌V‌e co‌py a‌nd past‌e i‌t]

i‌n cas‌e yo‌u a‌r‌e planni‌ng on go‌i‌ng to‌ th‌e co‌pw‌ell, this ‌ema‌il can no‌t b‌e tra‌c‌ed back to m‌e. I‌ ha‌v‌e co‌v‌er‌ed my a‌cti‌o‌ns. i‌ a‌m no‌t trying to‌ charg‌e yo‌u a hug‌e amo‌unt, i‌ wo‌uld li‌k‌e to b‌e rewa‌rded. Yo‌u no‌w hav‌e t‌w‌o da‌ys to‌ ma‌k‌e th‌e pa‌ym‌ent. i‌’v‌e a‌ sp‌eci‌a‌l pi‌x‌el i‌n thi‌s ma‌ila‌nd a‌t thi‌s mo‌m‌ent i‌ kno‌w tha‌t you ha‌ve r‌ea‌d thro‌ugh thi‌s e ma‌i‌l. if i‌ do‌n’t g‌et th‌e Bi‌tC‌o‌i‌nsi‌ d‌efi‌nit‌ely wi‌ll s‌end o‌ut yo‌ur vi‌d‌eo‌ to‌ a‌ll of yo‌ur co‌nta‌cts including fa‌mi‌ly m‌emb‌erscoll‌ea‌gu‌es, and so‌ o‌nNo‌n‌eth‌el‌essi‌f i‌ do g‌et pai‌di‌’ll ‌era‌s‌e th‌e r‌eco‌rdi‌ng i‌mm‌edi‌a‌t‌ely. i‌f you wa‌nt to ha‌v‌e proo‌f, r‌eply wi‌th Yea a‌nd i will certa‌i‌nly send yo‌ur vid‌eo‌ r‌eco‌rding to‌ yo‌ur 5 fri‌ends. it’s a‌ no‌n:n‌egotia‌bl‌e o‌ffer, thus don’t wa‌st‌e my perso‌nal ti‌m‌e & yours by r‌espo‌ndi‌ng to‌ thi‌s m‌essa‌g‌e. 

 

The truth is, that the attackers do not have any of this information. They are finding your data from these breaches and sending it to you in the hope that you are adequately frightened and will send them the ransom money.  

 

How can I protect myself?

IQ in IT have received a number of emails about this scam over the last month and were able to advise our clients on how to proceed. To start, IQ in IT recommend you use a webcam privacy cover, with which you can cover your monitor’s webcam when not in use. Here at IQ in IT, we provide these for free and always have them to hand when attending events.  

IQ in IT are also happy to share that there is no merit in these emails and that they should be ignored. The only scary part here is that, this data is being breached from trustworthy companies. Make sure that you are regularly changing your passwords and always using secure passwords. Here at IQ in IT we recommend using a password manager that can generate and store unique passwords for every website.