This Gmail Phishing Attack Is Even Fooling The Tech-Savvy 

January 19, 2017

This Gmail Phishing attack (see source link below) has been making tech news and is very important that you are made aware. It has been known by Google since March of 2016. This deceptive sneaky attack is currently only targeting Gmail accounts. The cybercriminals trick you into giving away your Google or Gmail Login Credentials. It is even fooling those who are tech-savvy and very familiar with phishing schemes.

Once an account has been compromised, the attackers immediately access it and start targeting the victim’s contacts.

 

Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts

Source: Phished Gmail Accounts Immediately Accessed by Hackers | SecurityWeek.Com


Hyper Crypt | Portable Encryption Software

January 5, 2017

Looking for a method to protect sensitive files and folders?  If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…

hyper-crypt

One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…

By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.

Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.

With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.

Source: Hyper Crypt | Portable Encryption Software


AOMEI Backupper Standard 4 Now Includes Real-Time Syncing | Betanews

December 17, 2016

AOMEI is an excellent software package that will assist you with backing up your files. The newest version now includes a live syncing option. Read more at Betanews (source link below).

AOMEI has released AOMEI Backupper Standard 4.0, the second major update of its freeware Windows backup, imaging and cloning tool in 2016. Version 4.0 adds an additional arrow to the tool’s bow …

Source: AOMEI Backupper Standard 4 adds real-time file sync, supports backup to cloud


Yahoo Account Owners – CHANGE YOUR PASSWORD

December 14, 2016

If you have an account with Yahoo, you need to change your password NOW. Reportedly a 1 Billion account breach has occurred. Better yet, based on past security issues with Yahoo, you may want to consider other options.

Source: It’s new and it’s bad: Yahoo discloses 1B account breach


How To Check If Your Google Account Has Been Breached by “Gooligan”

November 30, 2016

Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk  The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.

To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…

Googligan


Remove Adware, PUPs, Toolbars, and Crapware With This Tool | The Windows Club

November 26, 2016

Malwarebytes Junkware Removal Tool is a portable tool that removes all traces of Adware, Potentially Unwanted Programs, Toolbars, Crapware from Windows PC.  This tool is a portable app (just download and run).  Read more about how to use this tool (see source link below).

Source: Malwarebytes Junkware Removal Tool removes Adware and PUPs


A Portable Tech Tool To Clean Browser Hijackers

September 11, 2016

ZHPCleaner is a portable app that has been developed to identify and remove those unwanted browser add-ons (hijackers) that compromise the security of your computer…. As with any app of this type, it is best you have knowledge of what is safe to remove and what is not.

READ MORE @ Nicolas Coolman

ZHPCleaner


Malware Called “DressCode” Found In Android Apps

September 11, 2016

If you think you are immune from malware in Android Apps; “Think Again”…

“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…

“Once installed on the device, DressCode initiates communication with its command and control server,”

READ MORE @ BGR

The following video also explains how DressCode works:


A Smorgasborg Of Security and Forensic Tools For The IT Professional

June 28, 2016

If you are an IT Professional I think you will appreciate the site called SecurityXploded. They feature a smorgasbord of password dump tools, system security tools, network security tools, anti-spyware tools, and online security tools.

234 tools at this time, to be exact… Check out their current listing of tools HERE

SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.

SecurityXploded


Geek Squeaks (#2015-25) FEATURING — Take A Virtual Reality Ride On A New Dive Rollercoaster Coming In 2016 — and MORE GREAT STUFF

September 15, 2015

Take A Virtual Reality Ride On A New Dive Rollercoaster Coming In 2016 – When introduced in 2016, this rollercoaster (called the Valravn) will establish itself as being the world’s tallest, fastest and longest dive coaster.  You can read more about it here.  In the meantime you can take a virtual reality ride on it from your computer (see video below) and even on your phone as an Android or Apple app.

Start Video Below To Ride The Valravn
(Click full screen to get the full effect. There is a control at the top left
corner that can be used to get a panoramic view)

Campaign To Ban The Development of Sex Robots – Folks, this is not a joke. Knowing what I know about computer technology and the rapid development of robotics, we are very close to the time where you will be able to purchase your own sex robot. From an ethical standpoint, this is very disturbing. “Dr Richardson, a robot ethicist at De Montfort University in Leicester, wants to raise awareness of the issue and persuade those developing sex robots to rethink how their technology is used — READ MORE

Roxxxy the robot in a publicity shot

Free Security Protection and Speed Booster for Android Phone – If you are looking to take protective measures on your Android smartphone or tablet, you may want to take a look at the 360 Security – Antivirus Boost app. I am currently testing this on my tablet and phone and in comparison to many of the other security apps I have tried, I am really liking what I am seeing with this app. In summary 360 Security is a Security & Antivirus app with features such as:  junk-file remover, memory booster, power saver, anti-theft components (locater, eraser, alarm and lock), privacy & app locks, and real-time protection. This app runs as smooth as silk on both of my devices and carries a high rating at the google play store. I have added 360 Security to the downloads page under the Android Apps swarm.

 360 Security - Antivirus Boost

Could You Spot A Fake Product Review? – When I intend on making a purchase online, I head straight to the customer reviews to see what other people are saying about the product. The problem with this is that there are people paid to post fake reviews (often using automated technology) and you really have to be careful.  I typically will head to other sites that have the product and also check out their customer reviews so that I have a good comparative analysis. I typically try to stick with Amazon for reviews because there are typically many reviewers (often with pictures and videos).  As a matter of fact Amazon will often contact you, after making a purchase, to encourage you to post a review and/or answer a question about the product.  So, how do you spot fake reviews?  I encourage you to take a look at this article at TNW News, “How to spot fake reviews“… As the article states, “The bottom line is that you should easily be able to figure out if an item is a quality product or which companies have superior customer service without going through an exhaustive or misleading web experience”.

How spot fake reviews @ TNW News

How To Spot A Fake Review

Always Check The Deal Of The Day (@Amazon) – At the bottom of the blog you will see an icon for “The Deal Of The Day“.  When visiting, always click on that icon to see what Amazon has going on. For example, as of today’s blog post, they are offering tremendous savings on TP-Link Networking products

Deal of the Day

What Antivirus Do I Use? – I can tell you this… I have NEVER paid for any antivirus software EVER. Much of what we do on the internet and how we do it determines what our risk level is when it comes to becoming a victim of malware. The antivirus software that I currently use is Bitdefender Antivirus Free Edition. Once you install it, establish an online account, you will not even know it is there.

Bitdefender Free Edition

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment


Read About Malwarebytes Amnesty Program

June 30, 2015

If you have been pirating the Malwarebytes Anti-malware Premium version, you will receive an amnesty.

Malwarebytes Anti-Malware Premium

The developers of Malwarebytes is rolling out a new licensing key system to track their licensees and to prevent pirating; however, to bring this system up to speed they are giving the software pirates an amnesty by giving them a 1 year subscription key (for FREE). From what I have researched, the developer, “in a nutshell”, lost track of who was legal and who was not; and, the only way to remedy the issue was to perform an audit to collect data to determine what keys are still alive, and who are they used by. If you are a true pirate, the furthest you will get is a year’s worth of Malwarebytes. To read a good article about this CLICK HERE

What the end user of Malwarebytes will see, whether you are a pirate of not, is the following message:

Select the option below (in your Malwarebytes Anti-Malware Premium product) that describes how you originally received your Malwarebytes Anti-Malware Pro or Premium license. We’ll assign you a new key, and you’ll be good to go.

  1. I’m not sure where I got my key, or I downloaded it from the Internet. (Select this option and we will issue you a brand-new key with 12 free months of Malwarebytes Anti-Malware Premium.)

  2. I purchased my key. (Select this option and we will issue you a replacement key with the same license to Malwarebytes Anti-Malware as your original key.)

Malwarebytes Anti-Malware is an industry-leading scanner that detects and removes worms, Trojans, rootkits, rogues, spyware, and other dangerous malware from your home PC. There is a FREE version and a paid premium version. The FREE version does not perform background scanning; whereas, the premium version (with background scanning and more features) is ready and alert at all times.

 ____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the Day Leave A Comment