Connect With Us:
Call Us: 951.237.5214 Contact Us

Tag Archives: malware

CyberScoop Radio NeuShield Interview


How do you fight off a ransomware attack?

A few days ago I was interviewed by Greg Otto from CyberScoop on a subject and company dear to me, NeuShield. Here are some excerpts from their article and also a link to the full interview which was recorded on June 24, 2020.

“Ransomware has been one of the biggest threats in cybersecurity over the past few years. Hospitals, governments, cities, companies, they’ve all been impacted by this wave of malicious behavior.

But what happens when an enterprise is hit? What goes on in the short term? How do you stop the bleeding? How do you recover? On this episode, Greg Otto talks with David Macias, president of ITRMS, an IT service provider based in California. Macias, a victim of a ransomware attack, tells us how he recovered, what he learned, and what he tells his clients to do in order to prevent a similar incident from occurring.”

To hear the full podcast please click on this link.

To read our full article on NeuShield.


NeuShield, Making Ransomware Obsolete

NeuShield Data Sentinel 2.2 Making Ransomware Obsolete

What would you do if the protection you have in place fails to protect you for just 5 minutes or fails against a single threat?

What if your company is a victim of a targeted or zero-day threat? Are you sure all your employees can properly deal with this situation?

What if your employees visit a website that was infected by a new fileless malware?

What would you do if all your data was encrypted by a completely new, Fully UnDetectable (FUD) ransomware threat?

The NeuShield Difference

Why are so many companies getting hit with ransomware even though they have made significant investments in a layered security model? The reason is because ransomware is getting more targeted. The solution, a new approach to data protection.

NeuShield Data Sentinel takes a completely different approach by creating a protective shield between your files and applications. When ransomware or other applications make changes, the original files stay intact allowing users to revert any unwanted change that has been made. While other products create backup copies of your files which, can dramatically increase disk usage and cause a significant performance overhead, NeuShield’s revolutionary Mirror Shielding™ technology can preserve the original file without requiring a backup, which allows Data Sentinel to protect files with virtually no additional disk activity (I/O).

NeuShield Data Sentinel allows you to shield and protect your data from malware or human error. Features include boot protection, disk protection, file and folder protection, file lockdown, One-Click Restore and cloud protection.

If your business is time sensitive and cannot afford downtime, NeuShield is the essential layer of protection your business needs today.

Features and Benefits

NeuShield provides Managed Service Providers (MSP) and your IT staff the perfect tool to ensure all their users are fully protected against threats that could impact their business.

Deployment, management and recovery can all be administered from a single multi-tenant cloud-based management console to provide customers with zero downtime.

Remot e O ne-Click Restore

Recovers a damaged or infected operating system from the management interface without requiring local access to the computer.

Remote Revert

If a computer gets infected or data becomes corrupt the NeuShield management interface allows you to recover the corrupted or encrypted files immediately.

Mirror Shielding™

One-Click Restore

File Lockdown

Cloud drive protection

Boot protection

Disk wipe protection

Cloud management

File revisions using Data Engrams™

Custom folder protection

Kaseya VSA integration

Customer Testimonial

For many companies an attack could set them back more than six months. We needed a remediation tool to get our customers up and running quickly. NeuShield gives us that piece of mind.

– Darin Harris, COO Remote Techs

System Requirements

OS: Windows 7, 8.1, 10

OS: Windows Server 2008 R2, 2012, 2016, 2019

Processor: 1 gigahertz (GHz) or faster processor

Memory: 1 gigabyte (GB) for 32-bit or 2GBs for 64-bit

Disk Space: 50 MBs minimum; 10 GBs recommended

Display: 1366×768 or higher resolution monitor

CONTACT US – For more information on any of our products or services please contact us at: 951.237.5214

Advanced phishing tactics used to steal PayPal credentials

Advanced phishing tactics used to steal PayPal credentials

Posted June 14, 2016 by

Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials.

One of the first lessons you will learn during anti-phishing training is to hover over the links in a mail to see if they point to the site where you would expect them to point. Although good advice, this is NOT a guarantee that you are going to be safe.

Always visit sites directly, never follow the URLs presented to you in emails or attachments.

Phishing definition

Per Wikipedia:

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

What does this phish do?

As reported by UK malware researcher @dvk01uk, the phishers are using Javascript to send the user to the promised PayPal site while the login credentials are being sent to an entirely different domain.

The javascript runs as soon as the page (HTML attachment) is loaded and intercepts all posts to and diverts them to the actual phishing page to accept all your details, if you are unwise enough to fall for this trick.

In this case, the phish was pointing to PayPal and the phishing page is www[dot]egypt-trips[dot]co which appears to be an unused WordPress site. (We have informed the registrant of the phish, so we hope they will take appropriate measures.)


While giving the site owner some time to clean up his site, users of Malwarebytes Anti-Malware Premium will find that the phishing page is blocked if they have the Malicious Website Protection enabled.



The original blogpost about this particular phish, including screenshots and code snippets, can be found here: Very unusual PayPal phishing attack

Pieter Arntz

Let us worry about your IT needs so you can concentrate on your business!