Stay in Touch
Get sneak previews of special offers & upcoming events delivered to your inbox.
Sign in
‎05-29-2018 12:00 AM
@JustJazzmom wrote:
@goldensrbest wrote:The Russians are after all of us!!My son said unless you see it on the news,ignore it.
IDK but a NYT article sounds like news to me. SMH
And not just news, but a far better source than some random person giving an opinion, that may or may not be based in truth, on TV.
‎05-29-2018 12:07 AM
@JustJazzmom Thanks for the reminder. I read the article this morning and rebooted my router.
‎05-29-2018 12:37 AM - edited ‎05-29-2018 12:40 AM
Thanks for taking time to share this, @JustJazzmom. I received the notice in an email alert from the FBI IC3. Anyone interested in receiving notices can subscribe to receive alerts from their Internet Crime Complaint Center.
"FOREIGN CYBER ACTORS TARGET HOME AND OFFICE ROUTERS AND NETWORKED DEVICES WORLDWIDE
SUMMARY
The FBI recommends any owner of small office and home office routers power cycle (reboot) the devices. Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide. The actors used VPNFilter malware to target small office and home office routers. The malware is able to perform multiple functions, including possible information collection, device exploitation, and blocking network traffic.
TECHNICAL DETAILS
The size and scope of the infrastructure impacted by VPNFilter malware is significant. The malware targets routers produced by several manufacturers and network-attached storage devices by at least one manufacturer. The initial infection vector for this malware is currently unknown.
THREAT
VPNFilter is able to render small office and home office routers inoperable. The malware can potentially also collect information passing through the router. Detection and analysis of the malware’s network activity is complicated by its use of encryption and misattributable networks.
DEFENSE
The FBI recommends any owner of small office and home office routers reboot the devices to temporarily disrupt the malware and aid the potential identification of infected devices. Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware.
May 25, 2018
Alert Number
https://www.ic3.gov/media/2018/180525.aspx
‎05-29-2018 06:17 AM
My router does its own I DONT WANT TO WORK TODAY, I AM ON VACATION. Perhaps if I say "pretty please" the Russians will fix it. LOL
‎05-29-2018 06:31 AM
hanks for the heads up!!
‎05-29-2018 06:42 AM
I didn't hear about this. Thanks for the article, @JustJazzmom
Get sneak previews of special offers & upcoming events delivered to your inbox.
*You're signing up to receive QVC promotional email.
Find recent orders, do a return or exchange, create a Wish List & more.
Privacy StatementGeneral Terms of Use
QVC is not responsible for the availability, content, security, policies, or practices of the above referenced third-party linked sites nor liable for statements, claims, opinions, or representations contained therein. QVC's Privacy Statement does not apply to these third-party web sites.
© 1995-2024 QVC, Inc. All rights reserved.  | QVC, Q and the Q logo are registered service marks of ER Marks, Inc. 888-345-5788