December 7, 2016
AdwCleaner is a “must have” security software tool that will search for and delete Adware, PUPs (Potentially Unwanted Programs), Toolbars, Hijackers and MORE… This program is by Malwarebytes, the maker of the famous Malwarebytes Anti-Malware…
December 1, 2016
Found this directory (and a removal tool) on the ESET website that may be a valuable resource to you. ESET is a leading IT security company that specializes in various antivirus and security products. If you are interested on trying ESET, there is some good deals on their products (click here)The directory on their support site is what jumped out at me, which outlines various antivirus and security software brands with links to those sites to access instructions and/or tools to uninstall their antivirus software.
Why is this important? Prior to switching to other brands of antivirus or security products it is HIGHLY RECOMMENDED that you uninstall the older version to prevent conflicts, system slowdowns; and even system failures. You may think, “OK, no problem, will use the Windows Program Uninstaller applet in the control panel to do this”. You are on the right track, but the problem with that is the Windows Uninstaller may not capture and uninstall everything; and could leave remnants of files behind that can cause problems. This is where the directory on the ESET website will really come in handy to assist you with the removal of antivirus and security products.
ALSO, on the same note, I noticed ESET also has a removal tool on the same page that my do the heavy lifting for you in removing an old software product. The ESET AV Remover tool will remove almost any antivirus software previously installed on your system. ALSO, you will find a link for a list of available malware removal tools.
Source: ESET Support – Uninstallers (removal tools) for common Windows antivirus software
November 30, 2016
Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.
To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…
November 26, 2016
Malwarebytes Junkware Removal Tool is a portable tool that removes all traces of Adware, Potentially Unwanted Programs, Toolbars, Crapware from Windows PC. This tool is a portable app (just download and run). Read more about how to use this tool (see source link below).
Source: Malwarebytes Junkware Removal Tool removes Adware and PUPs
September 11, 2016
ZHPCleaner is a portable app that has been developed to identify and remove those unwanted browser add-ons (hijackers) that compromise the security of your computer…. As with any app of this type, it is best you have knowledge of what is safe to remove and what is not.
READ MORE @ Nicolas Coolman
September 11, 2016
If you think you are immune from malware in Android Apps; “Think Again”…
“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…
“Once installed on the device, DressCode initiates communication with its command and control server,”
READ MORE @ BGR
The following video also explains how DressCode works:
July 18, 2016
Let’s face it, you probably do not backup your personal files on your Windows 10 computer. When I talk about personal files, I am talking about your photos, videos, documents, etc… that are personal to YOU. I know you may say it doesn’t really matter, but it will. I have found that when computer users (including myself) lose files it sort of does something to you. You actually will feel that a loss has occurred and feel helpless in recovering from that loss.
An “automated” backup solution for Windows 10 users is built right into the operating system that I have found to be very easy to use. It is called “File History”… Below you will find a short video from BTNHD that will quickly get you up and running with using File History. What I like about File History is that you can fully configure it to backup any folders that you choose (to an external hard drive), at different time intervals (making it fully automated), and the option of how long you want to keep revisions of your files. I encourage you take a look at File History, learn how to use it, and save yourself some misery when that computer crash occurs…
How To Use Windows 10 File History Feature!
June 28, 2016
If you are an IT Professional I think you will appreciate the site called SecurityXploded. They feature a smorgasbord of password dump tools, system security tools, network security tools, anti-spyware tools, and online security tools.
234 tools at this time, to be exact… Check out their current listing of tools HERE
SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.
June 22, 2016
What is nice about having your own blog is that you can have some fun with your friends and at the same time educate others…
My elders alway told me, “If it is too good to be true, stay away from it…” Two computer friends of mine, who I will call Bill and George, came across a “no name” flash drive that was advertised as 1 TB for $16 (out of China). They were excited when they received their perfectly packaged “no name” drives (all the way from China) and were bragging to ALL, “look what we got, 1 TB drives for $16″… Their excitement soon turned to blush when they started filling the drive with data and discovered at approximately 10% capacity of the drive the data started spilling out and the drive would not accept anymore data.
Bill and George were victims of what has become a very common scam on the internet of counterfeit USB flash drives. Many of the these drives can be found on eBay (and even Amazon); typically ship from China; and, often are in packaging (and branding) that replicates popular manufacturer’s such as Kingston, SanDisk, Toshiba and Corsair. Oftentimes, the seller themselves are unaware that the drives are counterfeit and take the hit on this, as the middleman (resulting in poor customer feedback that affects their seller ratings).
So, as you can see great measure and tactic has been taken by these crooks to take your money. Usually, with these drives, most folks do not realize in time, that there is an issue, due to the fact most folks do not “right away” start maxing out the capacity of the drive.
Again, “If it is too good to be true, stay away from it…”. Here are two tips to abide by when purchasing these drives:
- Do your homework… See what is current from reputable manufacturer’s (such as Kingston, Corsair, Sandisk, Patriot, etc…). You will get a general idea of what the current generation drive capacities are (and their true costs). For example, CLICK HERE to see the real cost of what a 1TB drive can be at present…
- Buy only from a reputable online source or buy at a local box store… I am seeing that a great majority of these counterfeit drives are found on eBay and typically ship from China (making it difficult to get your money back).
June 18, 2016
There are occasions where we need to safeguard a file or a folder that contains sensitive information. This is especially true if you are storing the files online. The program that I use on a regular basis to accomplish this is EncryptOnClick (by 2BrightSparks). EncryptOnClick meets four of my conditions when it comes to encryption software:
- It is not here today and gone tomorrow. I have been using this program going on 5 years (or more) and it continues to be improved and up-to-date with changes in the operating system;
- It is very easy to use. Many encryption programs can be difficult to understand and navigate. EncryptOnClick is not one of them;
- It can be made portable to carry around on my flashdrive (or stored online for quick download). This is important since I use EncryptOnClick as my main encryption program (at home and at work);
- It is a very secure method of encryption (256-bit AES encryption) that is password protected. The encryption file result is also compressed to make the file smaller.
June 8, 2016
I want to start off this post by saying, “If you are not a software tester, then do not install Librevault“. It is currently in the Alpha stages of development where instability can (and most likely will) occur. Reason I am posting about Librevault is to let readers know, and those with tech backgrounds know, that an open source data synchronization app, designed to keep files the same on different computers over a network, is in the works. Appears; when and if finalized, Librevault will be FREE and will give you an optional and automated way to keep files (backed up) synchronized (via peer-to-peer) across a network (even at home).
What is Librevault?
Librevault is a data synchronization app, designed to keep files same on different computers over the network.
Peer-to-peer file transfer
All data is transferred directly from one device to another without the need to upload them to other servers. You can use Librevault in your local network even if the Internet connection is unavailable.
All file content and filenames are encrypted using an industry-grade AES-256 algorithm.
All transmissions are performed using TLSv1.2
The hash algorithm is SHA-3
June 7, 2016
At times I think we are getting to comfortable with storing our personal files in the cloud; whether be Dropbox, GDrive, OneDrive, etc… Once those files leave your PC they are out there and in essence will always be out there (even if you delete them). A level of protection to look at that I found at I Love Free Software is Cryptomator.
I Love Free Software provides a very nice (and brief) tutorial on how to set up Cryptomator to ultimately encrypt the files you are syncing with Dropbox; however, as pointed out, this process will work with many of the online cloud drive providers.
HOW TO AUTO ENCRYPT FILES
BEFORE UPLOADING THEM TO DROPBOX
June 6, 2016
Hardly a week goes by anymore that I don’t run into someone (or assist someone) that is experiencing a malware infection of some magnitude on their computers. I typically do not commit myself to removing these infections anymore due to the time element (many hours) involved in researching the issue, gathering (and updating) the necessary removal tools, and actually attempting to remove the infection. Removing a malware infection can be frustrating and in the end it is even questionable (after an infection) whether it is completely removed. In the end, probably the best tool to have around is your OS recovery disks.
If you are someone that does provide a service for removing malware, a tool to consider (that is portable), in your tech toolbox, is the Emsisoft Emergency Kit.
The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner and Emsisoft Command-line Scanner.
I downloaded the kit (approx. 233mb) and launched the “Start Emergency Kit Scanner.exe”; peformed and updated the malware signature database files; and, performed a scan. What I found is that it is pretty easy to use; however, I am not sure of the how powerful the scanner is in comparison to the competitors. If you are familiar with this kit, please feel free to let us know your experiences with it. I like the idea it is portable, can be used in safe mode (or from a recovery environment) and can be run from the command-line in order to remove a particularly stubborn infection. Many malware infections will overtake your computer to the point that you may not be able to run, update and/or install malware removal software; thus, the portability of this kit and other outside the box options are a plus.
Emsisoft Emergency Kit
June 1, 2016
If you have an account with Google, then you have access to controls for safeguarding your data and protecting your privacy on Google, through a hub called My Account …
My Account puts privacy and security tools in one place, including long-standing features like Ads Settings and newer ones like the Privacy and Security Checkups. Collectively, these tools make it easy for you to control your privacy and security from any device.
With this being the one year anniversary for the “My Account” hub, Google has added 3 new features to easily access your controls and protect your data.
Feature #1: Find your phone is a new feature that will help you if your phone is ever lost or stolen.
Feature #2: Access your account by using your voice (simply say, “Ok Google, show me my Google account”)
Feature #3: (Coming Soon) Access a shortcut to your account by googling (searching) for your name. You will be required to be logged into your account, in order for this to work.
READ MORE @ The Official Google Blog
May 28, 2016
Another FREE program that I use to remove unwanted programs and malware is AdwCleaner. This is a must have tool; especially, if you are the one who has the tech toolbox that is used to help others. AdwCleaner is a program that searches for and deletes Adware, Toolbar’s, Potentially Unwanted Program’s (PUP), and browser Hijacker’s from your computer. It comes with a “scan” and “clean” mode. Typically, these unwanted programs, such as adware, PUP’s, Toolbars, and hijacker’s, are bundled in with other software that we install (from the web) on our computers. ALWAYS, during a software installation, pay attention to any other optional software that may (or could) install; and, ALWAYS, research the software you intend to install. Typically, in honest cases, you are given an option (via a check box) to keep bundled software from not installing.