fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million.

How Could My Asus Laptop Get Hacked?

This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus’s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it’s just being noticed now.

The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack.

What Do I Do Now?

First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date.

If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They’ve also patched their internal systems to help prevent similar attacks from happening in the future. You’ll want to make sure you have Live Update 3.6.9 installed.

Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool.

We HIGHLY encourage you to reach out to Graemouse Technologies if you are running any Asus hardware. It’s better to be safe than sorry.

Tip of the Week: Adjusting Microsoft Word to Match...
Getting to Know About Phishing Attacks Can Keep Yo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Virtualization Productivity VPN Spam Search Engine Health Server Apps Firewall Website Data Security HBO Data loss Phishing Telephone System Cloud Government Workplace Tips Vulnerability Internet Wireless Internet Data Backup Document Management Office 365 Bandwidth Browser Augmented Reality Data Recovery Smartwatch Miscellaneous Quick Tips Employer-Employee Relationship Internet of Things Router Hardware Software Redundancy Screen Mirroring Identity Theft Voice over Internet Protocol Update Password Avoiding Downtime Hosted Solutions Information Business Mangement User Tips Samsung Servers Word Supercomputer Computers Hosted Computing Managed IT Services Machine Learning How To Operating System Communications Microsoft Office Security Cache Money Networking Artificial Intelligence Staff Google Drive Warranty Efficiency Data Storage Google Docs Emergency Marketing Bring Your Own Device Smartphone Save Money Unsupported Software Private Cloud Net Neutrality Sync Scam The Internet of Things Human Resources Vendor Wiring Settings Encryption Training Connectivity IT Services Virtual Assistant Inventory Wireless Charging Data Protection Budget Tools Computer Big Data Software as a Service Tip of the Week Audit Backup Two-factor Authentication Cortana Managed IT Services Cybersecurity Alert Law Enforcement BDR Network Security Cryptocurrency Cloud Computing Business Intelligence Collaboration BYOD Managed IT Keyboard Saving Money Mobile Device Management Online IT Support Applications Access Control Tech Term Windows 10 Ransomware Data Management Holiday Upgrade Android Millennials Public Cloud OneNote Downtime Business Management Fraud Technology Social Engineering Bing CES Data IT Plan Mobile Devices Amazon Windows 7 Business Computing Microsoft VoIP Sports Productivity Comparison Facebook Smartphones Business Botnet Telephone Systems Spam Blocking Small Business Email Passwords Telephony Gadgets Innovation Data Breach Advertising Business Continuity Windows Meetings Remote Monitoring Wi-Fi Mobile Device IT Management Leadership ISP Windows 10 Content Management Printer Display Malware Automation Managed Service Paperless Office Social Media Best Practices Save Time Blockchain User Error Google Communication Chrome Multi-Factor Security Infrastructure Network App Disaster Recovery Hackers Cybercrime Hacker Outsourced IT Privacy OLED

Newsletter Sign Up