fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million.

How Could My Asus Laptop Get Hacked?

This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus’s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it’s just being noticed now.

The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack.

What Do I Do Now?

First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date.

If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They’ve also patched their internal systems to help prevent similar attacks from happening in the future. You’ll want to make sure you have Live Update 3.6.9 installed.

Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool.

We HIGHLY encourage you to reach out to Graemouse Technologies if you are running any Asus hardware. It’s better to be safe than sorry.

Tip of the Week: Adjusting Microsoft Word to Match...
Getting to Know About Phishing Attacks Can Keep Yo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Money Microsoft Office Applications Business Continuity Telephony Hackers Health Windows 10 IT Consultant Tip of the Week IT Plan Mobile Devices Servers Database Communications Google Apps Employer-Employee Relationship Passwords Wireless Charging Vulnerability Administrator Networking IBM Apps Disaster Recovery Facebook IT Support Sports Business Computing Spam Blocking Multi-Factor Security Display Telephone Systems Public Cloud Innovation Augmented Reality Best Practices Blockchain Browser Saving Money Smartphones Gadgets Business Management Users Windows 10 Upgrade Unsupported Software Virtual Assistant Meetings Data Backup Enterprise Content Management Network Security Malware Smartphone Infrastructure Network Cryptocurrency Training Solid State Drive Holiday Sync Data Storage Windows Remote Monitoring Miscellaneous How To Gmail Privacy Office 365 Government Cybercrime Social Engineering Computer Care Authentication Two-factor Authentication Mobile Computing Millennials IT Services Net Neutrality Server Cloud BYOD Cortana App Botnet Efficiency Work/Life Balance Voice over Internet Protocol Mobile Device Management Managed IT Mouse Operating System Tip of the week Technology Digital Signage Backup Ransomware Communication Redundancy Save Money Workplace Tips Automation Computer Managed Service Provider CES Data Breach Data Protection Encryption Word Chrome User Tips Internet Recovery VPN Access Control OneNote Phishing Google Docs Cabling Cybersecurity Google Drive Small Business Scam Tech Term Law Enforcement Hosted Solutions Content Management Outsourced IT Private Cloud Amazon Web Services Wire Machine Learning Managed IT Services Security Bandwidth Software Mobile Device Business Intelligence Education Wi-Fi Business Productivity Managed Service Connectivity Human Resources Staff Collaboration Computers Windows 7 Identity Theft Android Alert Google Settings Quick Tips Internet of Things Virtualization Password Virtual Reality Data loss Hardware Spam Cables Bring Your Own Device Social Media Workforce MSP 5G YouTube Telephone System Emails Data Website Flexibility Data Recovery Avoiding Downtime Managed IT Services Comparison Fraud VoIP Router BDR Data Security Thought Leadership Supercomputer Microsoft Telecommuting Paperless Office Amazon Email Accountants Office Artificial Intelligence Cloud Computing Patch Management Update Keyboard Software as a Service IT Management Information

Newsletter Sign Up