<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GoToMyPC Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/gotomypc/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/gotomypc/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 25 Oct 2018 20:16:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>GoToMyPC Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/gotomypc/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</title>
		<link>https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 20:16:24 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Preventative IT Security Breach]]></category>
		<category><![CDATA[Agent Tesla]]></category>
		<category><![CDATA[Breaking Passwords]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Disgruntled Employee Security]]></category>
		<category><![CDATA[GoToMyPC]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[LogMeIn]]></category>
		<category><![CDATA[Stealing Keystroks]]></category>
		<category><![CDATA[Tesla Hackers]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2678</guid>

					<description><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization&#8217;s security too.<span id="more-2893"></span>First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam video of two men stealing a Model S in real life on YouTube. The thieves had to use Google to find out how to unplug the car. To see the short video, search: Tesla Model S Being Stolen Antony Kennedy or click <a href="https://www.youtube.com/watch?v=odG2GX4_cUQ&amp;feature=youtu.be" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>Now, what affects you directly whether you own a Tesla or not. Many IT Professionals, consultants, and outsourced IT firms access your network remotely using tools designed to help them help your users solve technical issues. Example programs include GoToMyPC, TeamViewer, LogMeIn, VNC, and Splashtop. Some outsourced companies use a product called Agent Tesla to support their customers. If you visit the website agent tesla dot com, you will see that the product has additional features including stealing keystrokes, breaking passwords, and spreading itself like a virus through a network. It appears that some bad actors have been using this tool to infect computers at companies without the company&#8217;s permission. And the tech support representatives at Agent Tesla were more than willing to assist the bad actors.</p>
<p>A key takeaway is that user-friendly tools can permit non-technical people to hack your network without needing any technical know-how.</p>
<p>What if a disgruntled or unscrupulous worker in your company installs GoToMyPC, LogMeIn, or similar easy-to-use software on computers in your private offices? They could overhear private conversations without anyone knowing. One of our clients experienced millions of dollars of embezzlement because a trusted worker used one of those programs on the computer that was in the conference room. The embezzler was not technically savvy at all, and he heard enough confidential information to embezzle millions and wreak all kinds of havoc. He did not need to use the additional user-friendly features that Agent Tesla provides including password cracking and automatic infection of other computers, but he could have.</p>
<p>Visit with your IT professionals. What are you, as an organization, doing to protect yourself from someone intentionally utilizing a readily available program, such as Agent Tesla, to infect your network, spy on your workers, steal information, and break your passwords?</p>
<p>The CEO, Owner, President, and other chief executives suffer the most when an attack devastates an organization. Most of them wish they&#8217;d have taken more of an active role in security. Learn from their mistakes, before it is too late.</p>
<p>The post <a href="https://fosterinstitute.com/stealing-tesla-cars-and-stealing-your-network-with-agent-tesla/">Stealing Tesla Cars, and Stealing Your Network with Agent Tesla</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GoToMyPC Forcing Reset of Passwords</title>
		<link>https://fosterinstitute.com/gotomypc-forcing-reset-of-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 21 Jun 2016 19:30:28 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[GoToMyPC]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2342</guid>

					<description><![CDATA[<p>GoToMyPC announced that they suffered a recent attack. Once again, this affected users who had used the same password at other sites too. Congratulations to you readers who have implemented two-step logon. The site twofactorauth dot org provides a list of services that provide a two-step login feature. If you know someone who uses GoToMyPC, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/gotomypc-forcing-reset-of-passwords/">GoToMyPC Forcing Reset of Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>GoToMyPC announced that they suffered a recent attack. Once again, this affected users who had used the same password at other sites too. Congratulations to you readers who have implemented two-step logon. The site twofactorauth dot org provides a list of services that provide a two-step login feature. If you know someone who uses GoToMyPC, you can recommend they use this search:</p>
<p>gotomypc two step verification site:citrix.com</p>
<p>If you want your IT Professionals to become even more effective, send them to the 2.5 day SuperTech workshop Monday thru Wednesday August 8 thru 10.</p>
<p>And, if you are an executive who wants more insight into working effectively with your IT Professionals and/or outsourced IT firm, please come too.</p>
<p>The workshop is designed in such a way that you can enjoy exploring Napa Valley and the San Francisco Bay area with your family while you are here.</p>
<p>Please email stacey @ fosterinstitute dot com for all of the details.</p>
<p>Please forward this to everyone whose cyber-security you care about, as well as anyone who would enjoy an exciting and educational end of summer experience in Napa Valley, CA.  </p>
<p>The post <a href="https://fosterinstitute.com/gotomypc-forcing-reset-of-passwords/">GoToMyPC Forcing Reset of Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
