Awareness

WhatsApp Spyware Also Capable Of Stealing Data From Apple, Facebook, Google, And Microsoft Accounts

Remember how WhatsApp discovered a vulnerability that allowed spyware known as Pegasus to be injected into a phone via a voice calls?
It’s been discovered that Pegasus is now capable of stealing user data from other accounts that are logged in on the affected phone.
According to a report by the Financial Times, once the spyware has managed to make its way into the victim’s phone, Pegasus would then be able to access and obtain data from accounts that include Apple, Facebook, Microsoft, and Google cloud services, to name a few.

source form --- Lowyat.net

Warning As Iranian State Hackers Target LinkedIn Users With Dangerous New Malware

Iran understands that retaliation against the U.S. military in the cyber domain "might be akin to throwing rocks at a tank," but it can hit the vast and under-protected U.S. corporate sector at will.
Two weeks after U.S. Cyber Command hit Iran's command and control structure in the aftermath of the downing of a U.S. surveillance drone, came a warning that an Iranian-led hack was targeting the millions of unpatched Microsoft Outlook systems.

source form --- Forbes

Windows 10 Users Warned Of 100M Malicious Adverts Threat

Security researchers have uncovered a security threat that’s seen users of Windows 10 desktop apps served up with malicious adverts pushing everything from tech support scams to fake antivirus malware.
Worse yet, because they are served up by ad-supported apps, and Windows 10 is just launching your default browser, your ad-blocker will likely not stop them.
To date, the malvertising campaign has delivered more than 100 million of these ads, and the attack surface extends way beyond just Windows 10 apps.

source form --- Forbes

This new ransomware is targeting network attached storage devices

NAS devices are often used to store critical data and back-ups - but many are exposed to the open internet and the cybercriminals behind eCh0raix are taking advantage.
A newly discovered form of ransomware is targeting network storage devices by brute-forcing weak credentials and exploiting known vulnerabilities in their systems.

source form (image excluded) --- ZDNet

TrickBot malware learns how to spam, ensnares 250M email addresses

Old bot, new tricks.
TrickBot, a financially motivated malware in wide circulation, has been observed infecting victims’ computers to steal email passwords and address books to spread malicious emails from their compromised email accounts.
The TrickBot malware was first spotted in 2016 but has since developed new capabilities and techniques to spread and invade computers in an effort to grab passwords and credentials — eventually with an eye on stealing money. It’s highly adaptable and modular, allowing its creators to add new components.

source form --- TechCrunch

Global Ransomware Damage Costs Predicted To Exceed USD$8 Billion In 2018

Research conducted by Cybersecurity Ventures has led to its estimation that ransomware damages will cost the world more than $8 billion in 2018.
Ransomware costs include damage and destruction (or loss) of data, downtime, lost productivity, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hostage data and systems, reputational harm, and employee training in direct response to the ransomware attacks.
The estimations from Cybersecurity Ventures take attacks on businesses and individuals into consideration, and also include global ransom payouts.

source form --- CyberSecurityVentures

News Feed











Innocent Child with Huge I.T. Dream

Since the innocent child knowing and approaching a magical box named “Computer”, his life had a big change.


After years of experiences and explorations in IT related fields – IT Executive, Customer Support Executive, IT Consultant, Programmer, System Analyst, Data Migration Specialist, IT Specialist, and IT Manager.


The child believes in the Information Technology related businesses, especially the IT Solutions, IT Infrastructure, Data Management, Data Backup and Recovery (Risk Management) and etc. still have room to inject with more complete, flexible, and customizable elements. These elements are extremely useful and required by our business nature without self-realize, and always been ignored.



In few years lately, no matter how advanced and how much improvement technology had been moving forwards, the growing guy aware that the IT Consultancy and Services is a MUST to maintain the infrastructure, all machines, its relevant systems, security, networking, and etc.


This continuous maintenance is deeply required just like our air-con required periodic services, human body required seasonal recharges, etc. Without continuously maintenance, the businesses may not go as far as it supposes to, and as smooth as it should be.



Our world getting advanced and relying on internet. Internet is one of the most important elements on our daily life nowadays. Emails, Social Apps, Cloud Storages, Remote Connections, Driverless Automobiles, and etc. are fully rely on internet.


Internet is open to public generally, although it can be improved by multi-factors authentication, encryption-decryption, firewall, internet security, Anti-Virus, and etc., but its security will be questionable.


However, no matter how strong and powerful is the security, there always no 100% guaranteed, and still have chances for threats attacks, ransomware attacks and other invasions, it only matters of difficulty levels and time consumed.


Ransomware attacks news are getting weekly nowadays and increasing, which hackers are attacking almost everything through every possible channel, such as Emails, Social Apps, Remote Desktop Connection, Network Attached Storages, and etc.


We believe and we know the most common and easy method to avoid that risk will be data backup, the more backup copy of our important data, the better and safer we are.


We can do backup on premises, external storages, virtual images, and cloud.



“ techhouz ” (House of Technology) was established on 2010.

We carrying a philosophy, “ we Search, we Analyse, we Provide. ”.

We holding a principle, “ Our Customers + Our Partners = Us ”.


“ we Search ”

Whenever our customers’ and our partners’ lives or businesses, there is a need on Information Technology assistant.

“ techhouz ” will assist our customers and our partners, by searching, and presenting the market available plans and solutions.



“ we Analyse ”

When we have the suitable and accurate plans and solutions, we will start to do necessary analysis by factor in our customers’ and our partners’ terms and conditions, budget, business environment and etc. to choose most suitable solutions for our customers and our partners from time to time.



“ we Provide ”

We will provide our customers and our partners, only the agreeable and suitable solutions in multiple phases. We won’t just stop our services after the installation and implementation of the solutions, we will provide relevant training, and provide continuously support and maintenance. Whenever there is a need, we will provide the solutions update or solutions upgrade, and advise our customers and our partners from time to time based on the technology trends.



We serve our customers and our partners as a family; we will do business and grow together as a family.



Let's “ techhouz ” run your IT Department, while you running your businesses.


Let's “ techhouz ” manage your Data Backup and Recovery, while you selling your products and services.


Let's “ techhouz ” assist you to transform your available data into meaningful and presentable information, while you closing your sales.
















































director

Our Services

We provides IT Solutions such as IT Consultancy, IT Outsourcing, IT Infrastructure, IT Procurement, Networking, Disaster Recovery, Data Management, Data Housekeeping, Data Backup & Recovery, Web Design, eCommerce Solutions, Email & Web Hosting, Reporting, Software Development, Digital Signature, etc.
" t e c h h o u z " are capable to assist in your business as your IT Executive, IT Engineer, System Administrator, Database Administrator, System Architect, Risk Management Manager and etc.
" t e c h h o u z " able to assist you to manage your IT related matters.
Let's " t e c h h o u z " running your IT department, while you focusing on your business growth.
" t e c h h o u z " clearly defined out role, visualize the success and be oriented towards the results.
Our Advise, Your Decision.


" t e c h h o u z " do provide IT Infrastructures Setup, Troubleshoot and Administration.



" t e c h h o u z " do assist in IT Procurement, such as Server, Workstation, Notebook, Software, AntiVirus, Software Licensing Auditing and Monitoring, and etc.

" t e c h h o u z " do consult, install, configure, troubleshoot, setup, administrate, and maintain our customers' office networking.
" t e c h h o u z " also do consult, install, configure, troubleshoot, setup, administrate, and maintain our customers' SmartHome system, infrastructure and equipments.



" t e c h h o u z " do listen to customers' requirements, study the needs, consult and advise, planning, deploy and maintain the software in full cycle.




" t e c h h o u z " do develop reports for our customers from their available data source and new database.






" t e c h h o u z " do assist our customers to manage their valueable data, minimized risk on data lost. We assist in Risk Management and Disaster Recovery, by enable automation of data backup & recovery on (from) premises and cloud.
" t e c h h o u z " do design, develop and maintain websites / eCommerce Solutions for any industries, such as restaurants, workshops, shopping malls, hotels, kindergartens, etc.
" t e c h h o u z " also assist customers on content writing for marketing purposes.
" t e c h h o u z " do assist to setup and host own Private Email Server in Linux and Microsoft Windows.





" t e c h h o u z " do assist to setup and own FTP Server in Linux and Microsoft Windows.






" t e c h h o u z " do assist to setup and own Web Server in Linux and Microsoft Windows.






Our Products

We are reseller for various type of IT products, sources from few different Malaysia Famous Distributors.
We sell Hardware from mouse to Notebook, Workstation and Server. We sell Software from Operating Systems to Architectual Design software, etc.
Autodesk is the leader in 3D design, engineering and entertainment software. Since its introduction of AutoCAD software in 1982, Autodesk continues to develop the broadest portfolio of 3D software for global markets.

Products: AutoCAD, AutoCAD LT, AutoCAD 360, Revit, 3ds Max, Civil 3D, Fusion 360, Revit, Maya, etc.
Adobe is the global leader in digital marketing and digital media solutions.

Products: Photoshop, Illustrator, InDesign, Premiere Pro, Lightroom, Dreamweaver, Flash Professional, Acrobat, etc.



Lumion (Act-3D) was founded in 1998 and officially registered in 2001, dedicated to the development of user-friendly real-time 3D software.

Products: Lumion, etc.





SketchUp users are architects, designers, builders, makers and engineers. They are the people who shape the physical world. They are important, and they deserve great tools because great tools produce great work.

Products: Sketch Up Pro, etc.


GstarCAD is the recognized leading provider of 2D/3D CAD software and solutions for the industries involving AEC, mechanical, manufacturing, electrical, GIS, survey and mapping, civil, etc. With 20 years of proud history of technology innovation and practical application, GstarCAD software is dedicated to providing the fast, powerful and .dwg-compatible CAD software for our customers and partners worldwide.

Products: GstarCAD, etc.

Microsoft was founded by Paul Allen and Bill Gates on April 4, 1975. As of 2015, Microsoft is market dominant in both the IBM PC-compatible operating system (while it lost the majority of the overall operating system market to Android) and office software suite markets (the latter with Microsoft Office).

Products: Microsoft Windows, Microsoft Office, Microsoft SQL Server, Microsoft Keyboard and Mouse, etc.

Shinjiru is the largest dedicated web hosting provider in Malaysia. We have been in profitable web hosting business since 1998 with over 40,000 customers. We deliver one server every 6 hours every day. We focus on our core competencies of delivering high quality cloud based web hosting services, provisioning dedicated servers in fast networks with 247 in-house customer support.

Products: Domain Name, Email Hosting, Virtual Machine, Cloud Storage, etc.
we Search, we Analyse, we Provide.

Beside what listed here, there are more branded or custom-made products available and sutiable for your business requirements.

Please ask for more details.







Our Clients

We have variety ranges of customers based on different industry areas.
Architecture Firms

Accounting Firms

Automotive Workshops
Retails
Software Houses
Non-Profit Organizations
Clubs
Clinics

Get in Touch

Please fill up your information as detail as possible so that we can understand you better. We'll revert to you as soon as possible.

Address
TechHouz Marketing

Operating Address (Shared Office)
Menara 1, Strata Office Suites,
KL Eco City,
33-3A, Jalan Bangsar, Pantai Baru,
59200 Kuala Lumpur,
Malaysia.


Mobile:   +6 012 236 2298
Email:   hugo.lim@techhouz.com
Sales:   sales@techhouz.com
Customer Care: customercare@techhouz.com
 
Ask a Question





Frequently Asked Questions

Some businesses can survive without invest and implementation of I.T. services.
However, with IT services, businesses can grow faster by increase the productivity and etc.
Some small matters can be ignored to survice.
Some businesses hired own I.T. Executive, some running own I.T. Department.
Some invest on I.T. Outsourcing, especially for Small and Medium Enterprise to minimize the cost.
Conventional and traditional ways of doing businesses are always rely on paper documents.
This required huge storage capacity and may not last for very long and not very environmental friendly.
With automation, different kinds of storage capacity required, which can minimize the cost and safer.
Almost all businesses nowadays are depend on data, with data analysis, lot of facts able to be referred and ease of decision making.
Most of the data are really very important to the businesses, that's why there are so many hackers nowadays attacking with ransomware.
Traditional methods to backup the data are usually using Tape or disks.
The latest backup methods will be pendrives, external hard-drives, and Cloud storages.
The available standard backup routines will be daily, weekly, fortnighly, monthly, yearly and immediate.
When threats attacked your data, most likely it will attack all storages as well.
The common cloud storages we using may not have their own credentials and firewall to increase the security level.
There are pently of different kinds of backup solutions out there.
All have their own calculation of cost.
Some will charge a certain cost on every recovery process.