Monday, December 9, 2019

Chrome Crashing or Not Working? Here Are Some Fixes

Chrome Crashing or Not Working? Here Are Some Fixes

Chrome Crashing Not Working Featured Image


Chrome is the leading and most popular web browser in 2019, beating Apple Safari, Internet Explorer/Edge, and Firefox, which rank second, third and fourth respectively. Despite being number one, it has its downsides and its malfunctions, too. Many of its users have reported Chrome crashing, freezing, not responding or just not working.
As frustrating as it can be, the good news is there are several fixes to resolving the problem. Before you switch to a different browser, here are some tried and tested solutions you can use to get Chrome back to a stable state.

Preliminary checks
  • Check the address bar for any typos in the URL
  • If the page takes too long to load, either your connection is slow or the page is busy.
  • If you’re using a VPN, a particular website may hinder the browser from connecting
  • If you’re getting the “Aw Snap!” message, a plugin could be causing Chrome to crash
  • Refresh the page if any connection was interrupted while loading
  • Try using an incognito window. If the site works while in incognito, clear your browsing data

Restart Chrome

This is one of the most basic things to do before you try to troubleshoot why Chrome is crashing. It just involves closing Chrome completely and then reopening it, then trying to reload the page again to see if the problem disappears. You can also reopen the tabs you hadn’t closed and see if they all load again.

Try a different browser

If you want to zero in on whether the issue is with your system or the browser itself, try using a different browser. If the page loads in a different browser, the issue is with Chrome. In this case, you can uninstall and reinstall Chrome as well as the extensions, which could be causing problems, and then add them back one at a time.

Restart your computer

A restart helps fix any software glitches that would cause the Google Chrome browser not to work or to crash. Sometimes apps and programs can stop pages from loading properly, so try to restart your computer and load the page or pages you had open on your browser again.

Close extensions, tabs and apps to free up memory

If your computer is low on memory, it may not be able to load sites and still run your apps, programs and extensions on your browser.
You can free up some memory by uninstalling unnecessary extensions, pausing downloads (file or app), quitting other programs or apps running in the background, and closing each tab that’s open except the one with the error message and try to reload the tab.
Having malicious extensions or many extensions can also slow down Chrome. Disable any extensions that may cause problems when using Chrome by going to “Chrome -> Menu -> More tools” and clicking Extensions.
Chrome Crashing Not Working Chrome Menu More Tools Extensions
Remove or disable whatever you don’t use and delete any that shouldn’t be there.

Run a virus or malware scan

Chrome Crashing Not Working Chrome Malware Scan
Viruses or malware on your computer could cause several problems, including Chrome crashing or not working. You can run a malware or virus scan using your system’s security software to spot and remove any resident threats that would be affecting Chrome’s normal operations.

Check for any software conflicts

Sometimes Chrome can conflict with other software or with Chrome itself and cause it not to work or crash altogether. This can be anything from network-related software to malware and any others that interfere with the browser.
To know which software conflicts with Chrome, go to chrome://conflicts on your browser’s address bar, and press Enter. Alternatively, you can go to Google and check for the software that caused Chrome to crash or not work properly.
You’ll also find the steps you can use to resolve any conflicts Chrome has with conflicting software on your system, but at best, you probably want to update your software to the latest version and disable or uninstall the problematic software.

Check for Chrome update

Chrome may crash or refuse to work if the software isn’t updated to the newest version. A new version or update can help patch any software glitches that cause this problem.
To install a new version of update, go to “Chrome -> Menu -> Help” and click “About Google Chrome.”
Chrome Crashing Not Working Chrome Menu Help About Chrome

Fix hardware acceleration issues

Hardware acceleration hands graphical tasks to a different component other than your computer’s CPU, usually the GPU, for Chrome to run better. However, it can sometimes cause Chrome to crash or stop working.
Disabling this feature helps resolve problems with how Chrome and your computer hardware work together. To disable it:
Click More (three vertical dots) at the top right side and select Settings.
Chrome Crashing Not Working Chrome Menu Settings
Scroll down and click Advanced.
Chrome Crashing Not Working Chrome Menu Settings Advanced
Click System.
Chrome Crashing Not Working Chrome Menu Settings Advanced System
Toggle the “Use hardware acceleration when available” to Off if it’s On and then restart the browser.
Chrome Crashing Not Working Chrome Menu Settings System Use Hardware Acceleration

Fix Network and website issues

Chrome can also crash or stop working due to network or website issues. If the website doesn’t load properly, you can let the website owner know that you’re experiencing issues with it.
On the other hand, if you found that the page didn’t load when you tried a different browser, the issue could be your Internet connection or network. In this case, restart your modem or router.

Fix problematic apps stopping Chrome from working properly

To do this, open “Chrome -> More -> Settings” and click Advanced. Go to the “Reset and Clean Up” section and click Update or remove incompatible applications.
Chrome Crashing Not Working Chrome Menu Settings Advanced Reset Cleanup
Note: if the option is available, it means there’s a problematic app. If not, there’s no problem app.
You can update the apps from the app store if there’s an available update or check the app developer’s site for more details. You can also remove each app from the list if you prefer.

Reset and reinstall Chrome

If trying a different profile didn’t help, you can reset Chrome by going to “Menu -> Settings -> Advanced” and clicking “Restore settings” to their original defaults.
Chrome Crashing Not Working Chrome Menu Settings Advanced Reset Cleanup Restore Settings Original Defaults
This resets everything except your history, bookmarks, and saved passwords. If you want to remove Chrome completely, reinstall it by going to “Settings -> Apps -> Apps and Features.”
Chrome Crashing Not Working Chrome Settings Apps Apps Features
Find Google Chrome, click on it and select Uninstall. Download a fresh copy of the browser.

Tuesday, October 8, 2019

Hospitals Under Ransomware Attack Can Only See Critical Patients

Hospitals Under Ransomware Attack Can Only See Critical Patients
Hospital Ransomware Featured

It’s no surprise that hospitals are under constant cyber-attack. Criminals want to breach these critical places because they know their demands will be better met. We saw a wave of ransomware attacks in 2017 that targeted hospitals, shutting down their systems until their ransom was paid.
Unfortunately, such attacks aren’t a thing of the past. Recently, we’ve seen a wave of new attacks against a hospital that left it unable to take in any patients that aren’t in a critical condition.

What Happened?

Hospital Ransomware Bed
Earlier this week, ransomware tore through ten hospitals in total. Three of these hospitals were in Alabama, and seven were in Australia.
In Alabama, the affected hospitals were the DCH Regional Medical Center, Northport Medical Center, and Fayette Medical Center. The breach was so bad, the hospitals could not operate unless the patients were in desperate need of medical care.
Any ambulances responding to calls had to redirect patients to different hospitals, which added time between the 911 call and getting into the emergency room.
Those already within the ER of the affected hospitals had an uncertain future. If they managed to stabilize, they could be moved to another hospital to make room for emergencies.
DCH went on record with the following: “A criminal is limiting our ability to use our computer systems in exchange for an as-yet-unknown payment. Our hospitals have implemented our emergency procedures to ensure safe and efficient operations in the event technology dependent on computers is not available.”
Meanwhile, the seven hospitals in Australia were also performing similar patient transfers. There is no news yet on whether these two attacks are connected, but it’s a reminder on how hospitals come under attack from cyber-criminals.

Why Do Ransomware Developers Target Hospitals?

Hospital Ransomware Locked
It may seem cold-blooded for ransomware developers to put lives at risk, and you wouldn’t be wrong. In fact, the fact that ransomware can endanger lives is why malware distributors target hospitals in the first place.
One of the biggest problems ransomware developers have is getting their payout. These days, people are wiser to the effects of ransomware and can even revert their PC back to normal using specialist advice. Even if the ransomware can’t be removed, the victim may be unwilling to pay if all they’re losing are video game save files and their browser bookmarks.
As such, a ransomware developer needs to hit sensitive data centers to force the victims to pay up ASAP. This includes hospitals, who are known for paying the ransom to get things back on track.

How Can Hackers Break into Hospital Systems So Easily?

Hospital Ransomware Security
The problem is, the sensitive nature of hospitals means that they’re less likely to make changes to their systems. For them, if it works, it works; making an upgrade may introduce new bugs into the system, which could cost lives.
Some hospitals still run Windows XP for this reason. Unfortunately, while their critical software runs well, the operating system’s core security is heavily flawed. This makes it hard for hospitals to keep themselves protected.

Holding Lives at Ransom

Hospital-based cyber-attacks are cruel, but it’s that edge that hackers depend on for a huge payout. Combined with the weak security that hospitals typically have, you can see why the healthcare system is a big target for cybercriminals.

Thursday, September 26, 2019

Cyber Security Statistics for 2019

Cyber Security Statistics for 2019



Cybersecurity is often seen as one of those big problems that only large entities like banks, tech companies, and governments have to worry about. In reality, a lot more people should be concerned with cybersecurity and not just the big corporations. The latter may be indeed responsible for more data. Still, it is the smaller entities, such as companies with less than 1000 employees, that are at the greatest risk.
TechJury compiled a list of cyber security statistics to help visualize what is happening in the field as well as what to expect in 2019.
Here are some of the most telling facts:
IT security can definitely use a boost; in most cases, it takes half a year to detect a data breach.
Consider that 43% of all cyber attacks are aimed at small businesses to realize the immense scope of the threat.
Not only businesses are at risk, though, as 91% of attacks launch with a phishing email.
That makes sense because 85% of all attachments emailed daily are harmful for their intended recipients.
38% of malicious attachments are masked as one Microsoft Office type of file or another.
Cyber criminals managed to exploit the credit cards of 48% of Americans back in 2016.
The global cost of online crime is expected to reach $6 trillion by 2021.
Let’s examine this global threat in greater detail.
Data Breaches
Often it is data breaches that steal the headlines.
In most cases, it takes companies about 6 months to detect a data breach.
(Source: ZD Net)
If a robbery took place and the perpetrators got away, how much of a head start do they have if they want to cover their tracks? A day? An hour? Cyber criminals often get a neat 6-month head start, which makes tracking them down that much harder.
There were 8,854 recorded breaches between January 1, 2005 and April 18, 2018.
(Source: Identity Theft Resource Center)
These breaches account for millions of records, with the price per record ranging anywhere from $120-$600. If we average these out at $360 per record, then the total price of these breaches is in the billions. People talk about the cost of cyber security, but they seldom think about the cost of not having it.
In 2017, 61% of data breach victims were companies with less than 1000 employees.
(Source: Verizon)
While this number may be alarming, this has more to do with the fact that the larger-scale companies are more likely to have robust security than smaller companies. Many of these smaller companies simply do not have the means for proper defence to combat advanced cyber threats, which contributes heavily to these cyber security statistics.
Cyber Attacks
Cyber attacks vary in sort and severity, but they can be absolutely devastating, especially for small business owners.
43% of cyber attacks are targeted at small businesses.
(Source: Small Business Trends)
It makes a lot of sense that the little guy is targeted so often. While the benefit of such attack for the hacker is relatively small, it is much easier to pull it off. Many small businesses have minimal security infrastructure, making them easy prey for data predators. Considering the number of cyber attacks per day, quite a few of those get targeted.
Around 50% of the risk companies face come by way of having multiple security vendors.
(Source: Cisco)
One may think when it comes to security, the more the merrier. However, having multiple security vendors is a great way to complicate your security infrastructure in a way that is likely to create greater vulnerabilities. It is best to stick with one security vendor and comply with all security updates and recommendations the vendor presents, according to various hacking stats.
IoT attacks were up by 600% in 2017.
(Source: Symantec)
Nearly everyone has a smartphone now, making hackers and cybercriminals have greater choice of targets for attack. A portion of the rise could be attributed to the increased number of IoT devices, but the greater issue is that security doesn’t keep up the pace of the growing threats.
31% of organizations have experienced cyber attacks on operational infrastructure.
(Source: Cisco)
Perhaps the more concerning side to cyber security statistics in general is the number of incidents that have gone unreported. Speculation would lead one to believe that the figure of 31% is significantly lower than reality. Whatever the case, this is an important figure to be aware of as it shows at the very least that hackers are proficient in finding the correct target.
DDoS attacks account for 5% of monthly traffic related to gaming.
(Source: Cox BLUE)
Another prevalent form of attack comes in the form of DDoS. This attack attempts to disrupt regular traffic to the desired web endpoint. Video gaming is a popular place for these attacks to occur because there are predictable and specific endpoints for most devices.
Just 38% of global organizations claim that they are equipped and able to handle a complex cyber attack
(Source: IBM)
Perhaps one of the most alarming cyber security statistics on this list is the understanding that 62% of global organizations cannot claim that they are equipped to handle a cyber attack. This void will lead the charge for improved cybersecurity in the future.

Malware
Malware is by far the most common type of malicious internet activity.
Over 24,000 malicious mobile apps are blocked from the various app stores each day.
(Source: Symantec)
Apple has generally been on top of its app store, not allowing malicious or harmful software onto iOS devices. Android has had a longer journey there because of the freedom afforded to developers. Nevertheless, it improved radically over the past several years. Such malicious apps can still be accessed, but most devices do require user approval before installing any unverified third-party applications. Cyber attack statistics show this to be a key reason why harmful software for mobile devices is not such an issue anymore.
$2.4 million is the average cost of a malware attack in 2017.
(Source: Accenture)
One of the most prevalent attacks comes in the form of malware. Malware can cripple entire systems or even render them useless. A successful malware attack resulting in a cybersecurity breach can crumble an entire company as well as ruin its public reputation.
There was an 80% increase in malware attacks on Mac computers in 2017.
(Source: Cisco)
Mac computers have always been renowned for their threat security. As far as out of the box security goes, Mac has been the gold standard for quite some time, but things seem to be changing. Malware statistics point to an astronomical increase that raises a few eyebrows. Is it possible that cybercriminals have found new vulnerabilities?
75% of the healthcare industry has been infected with malware at some point in time.
(Source: CISION: PR Newswire)
The healthcare industry accounts for the most records lost. This has to do with many factors including outdated systems, lack of training, and substandard protocols. In short, healthcare providers are an easy target with a lot to offer to potential criminals. It is no wonder why this industry is so often a target of large scale cyber attacks.
Around 60% of malicious web domains are associated with spam campaigns.
(Source: Cisco)
For some reason I find it concerning when a company tells me to check my spam folder. The spam folder is where many people get taken advantage of. Spam campaigns attempt to send the user to insecure or malicious domains in an attempt to mine data.
38% of malicious files came in formats used by the Microsoft Office suite of products.
(Source: Cisco)
Microsoft Office is one of the most familiar sights in a modern working environment. Cybercriminals use these formats for their malicious files in attempts to lure unsuspecting victims into thinking it is just a simple spreadsheet or report. This is valid not only for recent cyber attacks, as executable files masked as harmless, well-known files are a popular digital bait for years now.
Cyber Security Is in High Demand
Security specialist is one of the most promising career choices in the IT sector.
There are over 300,000 unfilled cybersecurity jobs in the United States, with the demand rising each year.
(Source: Cybint Solutions)
If you are a college freshman deciding on a major, then cybersecurity might be an attractive option. Not only are there plenty of openings, but the demand is expected to rise at an unprecedented rate. There are plenty of jobs available in tech nowadays, but perhaps none are as vital than as security. The next few cyber security stats show just how pressing this need may be.
By 2021, the number of unfilled cybersecurity jobs is expected to balloon to 3.5 million.
(Source: The Hill)
The expected rise in jobs is still outpaced by the expected need for them. Chances are, companies will not be able to get enough cybersecurity experts. There’s simply not going to be enough people with this type of competency to fill all available spots. Let’s just stop and consider what it means that so many companies will not be able to get proper protection from cybercrimes. As cybercrime statistics show, this is one of the biggest problems that companies have to solve.
Cybersecurity job postings are up 74% over the past five years.
(Source: Cybint Solutions)
This is the silver lining to these attacks. Many young people will be able to find gainful work in the cyber security sector. The unfortunate reality is much of this will be in response to attacks that will take place, and that there will be many more data breaches affecting millions of people within the next few years. Data breach statistics don’t suggest that the need for experts in the field will be lessened any time soon.
Cybersecurity expenditures are expected to reach $1 trillion by 2024.
(Source: Cyber Defense Magazine)
Once again, just like the jobs figures, this points to a very secure future for those pursuing a career in cybersecurity. The question remains if these expected expenditures will be enough prevent data breaches or at least bring them down significantly.
The annual cost of cybercrime damages is expected to hit $5 trillion by 2020.
(Source: Cyber Defense Magazine)
The rate of these crimes is only expected to increase. Criminals are finding increasingly clever and diabolical ways to get their hands on data. This, coupled with the projections for further data breaches, spells an unwelcome story going forward. Some estimates have the number as high as $10 trillion. In this context, whatever the cost of cybersecurity may be it seems like a worthy investment.
65% of companies have over 500 employees that have never changed their password.
(Source: Varonis)
I believe most people are guilty of not changing their password often enough. This is just making it easy for would-be cybercriminals to have easy access to sensitive information through compromised passwords. An easy solution to these problems is an automated system that requires employees to regularly change passwords. Many such programs are free and easily implemented by IT professionals.
Ransomware Has Run Rampant
Ransomware, especially with the advent of cryptocurrencies, is an increasingly popular way for hackers to make money.
Ransomware attacks are growing more than 350% annually.
(Source: Cisco)
A ransomware attack is designed to hijack the targets’ systems and hold them hostage in exchange for certain demands. These attacks are particularly effective and growing in number as the data from Cisco shows. The increase in cyber attacks is bound to continue in the foreseeable future.
The damage costs of ransomware will rise to $10 billion in 2019.
(Source: Cyber Defense Magazine)
Once again, ransomware holds data and entire systems hostage until demands are met. Independent risk evaluators postulate that compliance with the perpetrator leads to greater security vulnerabilities and greater total loss.
A business falls victim to a ransomware attack every 13.275 seconds.
(Source: Cyber Defense Magazine)
Something that differentiates cybercrime from any other kind of crime is the automation that can be deployed by perpetrators. Automation allows for cyber attacks to be deployed simultaneously and relentlessly. Failed attacks can be tried again almost infinitely. The number of cyber attacks each day keeps going up. Automation may also be the key to protection from these types of attacks, but for now it is not yet clear how to utilize this technology. As the stakes get higher and cyber criminals become more aggressive, the incentive to develop a solution will rise as well.
Unprotected, Progressively Vulnerable, and Ignored
System upgrades are not the easiest thing to implement. However, they become increasingly necessary to address adequately the growing security threats.
Of all files, 21% remain completely unprotected.
(Source: Varonis)
This isn’t as startling of a revelation when compared to the other cyber security stats, but it is an alarming number of unprotected files. Of course, just because a file isn’t protected, doesn’t mean it’s accessible. Still, there’s a number of cases where that kind of protection is called for, but is not present.
Reported system vulnerabilities went up by 16% in 2017.
(Source: Varonis)
The full reports for 2018 have not become available at the time of this writing, but early indications have this figure even higher over the past year. As tech evolves, most do not upgrade immediately. Older systems have different security vulnerabilities. If these are not addressed in a timely manner the systems are exposed even more with every passing day.
95% of data breaches have cause attributed to human error
(Source: Cybint Solutions)
With a large data breach, all eyes and fingers begin pointing to the IT department. The fact of the matter is these data breaches can very rarely be attributed to the folks over in IT. Information technology security breaches are few and far between. User error or actions that fall outside of IT recommended behavior will always cause more problems than just following the guidelines set by the IT department.
Phishing
Phishing mail, just like the popular hobby with similar name, is extremely common and simple.
30% of U.S. users open phishing emails.
(Source: Verizon)
Unsurprisingly, phishing attacks make up a large amount of cyber security incidents. It is quite likely that most of us have opened phishing emails at some point in time. Kaspersky’s anti-phishing software has caught hundreds of millions of them every year.
12% of those who opened phishing emails later opened the infected links or attachments.
(Source: Verizon)
As we await the arrival of 2019 cyber security statistics, the report from Verizon shows that phishing attacks had a moderately high success rate. With more and more people understanding the dangers that lurk with these attacks, the hope is that this number will continue to fall in the coming years.
In the last year, 76% of businesses reported that they had been a victim of a phishing attack.
(Source: Wombat)
Phishing attacks are the most common cyber security attack. This type of attacks are a big part of why there are so many compromised passwords. If you check your spam folder in your email, it is more than likely that you will find several of them. If a phishing emails makes it past filters into the inbox, to the untrained eye they will seem like legitimate messages that can be trusted.