January 19, 2017
This Gmail Phishing attack (see source link below) has been making tech news and is very important that you are made aware. It has been known by Google since March of 2016. This deceptive sneaky attack is currently only targeting Gmail accounts. The cybercriminals trick you into giving away your Google or Gmail Login Credentials. It is even fooling those who are tech-savvy and very familiar with phishing schemes.
Once an account has been compromised, the attackers immediately access it and start targeting the victim’s contacts.
Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts
Source: Phished Gmail Accounts Immediately Accessed by Hackers | SecurityWeek.Com
January 5, 2017
Looking for a method to protect sensitive files and folders? If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…
One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…
By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.
Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.
With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.
Source: Hyper Crypt | Portable Encryption Software
December 17, 2016
AOMEI is an excellent software package that will assist you with backing up your files. The newest version now includes a live syncing option. Read more at Betanews (source link below).
AOMEI has released AOMEI Backupper Standard 4.0, the second major update of its freeware Windows backup, imaging and cloning tool in 2016. Version 4.0 adds an additional arrow to the tool’s bow …
Source: AOMEI Backupper Standard 4 adds real-time file sync, supports backup to cloud
December 14, 2016
If you have an account with Yahoo, you need to change your password NOW. Reportedly a 1 Billion account breach has occurred. Better yet, based on past security issues with Yahoo, you may want to consider other options.
Source: It’s new and it’s bad: Yahoo discloses 1B account breach
December 7, 2016
AdwCleaner is a “must have” security software tool that will search for and delete Adware, PUPs (Potentially Unwanted Programs), Toolbars, Hijackers and MORE… This program is by Malwarebytes, the maker of the famous Malwarebytes Anti-Malware…
December 1, 2016
Found this directory (and a removal tool) on the ESET website that may be a valuable resource to you. ESET is a leading IT security company that specializes in various antivirus and security products. If you are interested on trying ESET, there is some good deals on their products (click here)The directory on their support site is what jumped out at me, which outlines various antivirus and security software brands with links to those sites to access instructions and/or tools to uninstall their antivirus software.
Why is this important? Prior to switching to other brands of antivirus or security products it is HIGHLY RECOMMENDED that you uninstall the older version to prevent conflicts, system slowdowns; and even system failures. You may think, “OK, no problem, will use the Windows Program Uninstaller applet in the control panel to do this”. You are on the right track, but the problem with that is the Windows Uninstaller may not capture and uninstall everything; and could leave remnants of files behind that can cause problems. This is where the directory on the ESET website will really come in handy to assist you with the removal of antivirus and security products.
ALSO, on the same note, I noticed ESET also has a removal tool on the same page that my do the heavy lifting for you in removing an old software product. The ESET AV Remover tool will remove almost any antivirus software previously installed on your system. ALSO, you will find a link for a list of available malware removal tools.
Source: ESET Support – Uninstallers (removal tools) for common Windows antivirus software
November 30, 2016
Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.
To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…
November 26, 2016
Malwarebytes Junkware Removal Tool is a portable tool that removes all traces of Adware, Potentially Unwanted Programs, Toolbars, Crapware from Windows PC. This tool is a portable app (just download and run). Read more about how to use this tool (see source link below).
Source: Malwarebytes Junkware Removal Tool removes Adware and PUPs
September 11, 2016
ZHPCleaner is a portable app that has been developed to identify and remove those unwanted browser add-ons (hijackers) that compromise the security of your computer…. As with any app of this type, it is best you have knowledge of what is safe to remove and what is not.
READ MORE @ Nicolas Coolman
September 11, 2016
If you think you are immune from malware in Android Apps; “Think Again”…
“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…
“Once installed on the device, DressCode initiates communication with its command and control server,”
READ MORE @ BGR
The following video also explains how DressCode works:
July 18, 2016
Let’s face it, you probably do not backup your personal files on your Windows 10 computer. When I talk about personal files, I am talking about your photos, videos, documents, etc… that are personal to YOU. I know you may say it doesn’t really matter, but it will. I have found that when computer users (including myself) lose files it sort of does something to you. You actually will feel that a loss has occurred and feel helpless in recovering from that loss.
An “automated” backup solution for Windows 10 users is built right into the operating system that I have found to be very easy to use. It is called “File History”… Below you will find a short video from BTNHD that will quickly get you up and running with using File History. What I like about File History is that you can fully configure it to backup any folders that you choose (to an external hard drive), at different time intervals (making it fully automated), and the option of how long you want to keep revisions of your files. I encourage you take a look at File History, learn how to use it, and save yourself some misery when that computer crash occurs…
How To Use Windows 10 File History Feature!
June 28, 2016
If you are an IT Professional I think you will appreciate the site called SecurityXploded. They feature a smorgasbord of password dump tools, system security tools, network security tools, anti-spyware tools, and online security tools.
234 tools at this time, to be exact… Check out their current listing of tools HERE
SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.
June 22, 2016
What is nice about having your own blog is that you can have some fun with your friends and at the same time educate others…
My elders alway told me, “If it is too good to be true, stay away from it…” Two computer friends of mine, who I will call Bill and George, came across a “no name” flash drive that was advertised as 1 TB for $16 (out of China). They were excited when they received their perfectly packaged “no name” drives (all the way from China) and were bragging to ALL, “look what we got, 1 TB drives for $16″… Their excitement soon turned to blush when they started filling the drive with data and discovered at approximately 10% capacity of the drive the data started spilling out and the drive would not accept anymore data.
Bill and George were victims of what has become a very common scam on the internet of counterfeit USB flash drives. Many of the these drives can be found on eBay (and even Amazon); typically ship from China; and, often are in packaging (and branding) that replicates popular manufacturer’s such as Kingston, SanDisk, Toshiba and Corsair. Oftentimes, the seller themselves are unaware that the drives are counterfeit and take the hit on this, as the middleman (resulting in poor customer feedback that affects their seller ratings).
So, as you can see great measure and tactic has been taken by these crooks to take your money. Usually, with these drives, most folks do not realize in time, that there is an issue, due to the fact most folks do not “right away” start maxing out the capacity of the drive.
Again, “If it is too good to be true, stay away from it…”. Here are two tips to abide by when purchasing these drives:
- Do your homework… See what is current from reputable manufacturer’s (such as Kingston, Corsair, Sandisk, Patriot, etc…). You will get a general idea of what the current generation drive capacities are (and their true costs). For example, CLICK HERE to see the real cost of what a 1TB drive can be at present…
- Buy only from a reputable online source or buy at a local box store… I am seeing that a great majority of these counterfeit drives are found on eBay and typically ship from China (making it difficult to get your money back).
June 18, 2016
There are occasions where we need to safeguard a file or a folder that contains sensitive information. This is especially true if you are storing the files online. The program that I use on a regular basis to accomplish this is EncryptOnClick (by 2BrightSparks). EncryptOnClick meets four of my conditions when it comes to encryption software:
- It is not here today and gone tomorrow. I have been using this program going on 5 years (or more) and it continues to be improved and up-to-date with changes in the operating system;
- It is very easy to use. Many encryption programs can be difficult to understand and navigate. EncryptOnClick is not one of them;
- It can be made portable to carry around on my flashdrive (or stored online for quick download). This is important since I use EncryptOnClick as my main encryption program (at home and at work);
- It is a very secure method of encryption (256-bit AES encryption) that is password protected. The encryption file result is also compressed to make the file smaller.
June 8, 2016
I want to start off this post by saying, “If you are not a software tester, then do not install Librevault“. It is currently in the Alpha stages of development where instability can (and most likely will) occur. Reason I am posting about Librevault is to let readers know, and those with tech backgrounds know, that an open source data synchronization app, designed to keep files the same on different computers over a network, is in the works. Appears; when and if finalized, Librevault will be FREE and will give you an optional and automated way to keep files (backed up) synchronized (via peer-to-peer) across a network (even at home).
What is Librevault?
Librevault is a data synchronization app, designed to keep files same on different computers over the network.
Peer-to-peer file transfer
All data is transferred directly from one device to another without the need to upload them to other servers. You can use Librevault in your local network even if the Internet connection is unavailable.
All file content and filenames are encrypted using an industry-grade AES-256 algorithm.
All transmissions are performed using TLSv1.2
The hash algorithm is SHA-3