Running Windows XP, Vista, 8.0? Read this NOW.

Posted on May 17, 2017. Filed under: Malware, Security, Windows 7, Windows 8, Windows 98, Windows ME, Windows Vista, Windows XP | Tags: , , , , , , |

Gizmo’s Freeware has a post: You’re probably aware that there’s a massive ransomware epidemic spreading right now. It’s already affected companies and computers in more than 150 countries, and causing untold misery for hundreds of thousands of people whose computers have been rendered unusable.

Source: Running Windows XP, Vista, 8.0? Read this NOW. | Gizmo’s Freeware

Advertisements
Read Full Post | Make a Comment ( Comments Off on Running Windows XP, Vista, 8.0? Read this NOW. )

Windows 10 tip: Stop using the horribly insecure SMBv1 protocol

Posted on May 17, 2017. Filed under: Malware, Security, windows, Windows 7, Windows 8, Windows 98, Windows ME, Windows Vista, Windows XP | Tags: , , , , |

ZDNet has a post: For years, Microsoft has been recommending that you disable the vulnerable SMBv1 protocol. The recent WannaCry ransomware outbreak underscores the need to take this important step. Here’s how.

Source: Windows 10 tip: Stop using the horribly insecure SMBv1 protocol | ZDNet

Read Full Post | Make a Comment ( Comments Off on Windows 10 tip: Stop using the horribly insecure SMBv1 protocol )

Tell Bart and other ransomware families to ‘Eat my shorts’ with new, free decryption tools | ZDNet

Posted on April 6, 2017. Filed under: Freeware/Shareware, Malware, Security | Tags: , , , |

ZDNet has a post on ransomware: Free tools for unlocking Bart, Merry X-Mas, and other types of ransomware have been released as part of the No More Ransom initiative.

Source: Tell Bart and other ransomware families to ‘Eat my shorts’ with new, free decryption tools | ZDNet

Read Full Post | Make a Comment ( Comments Off on Tell Bart and other ransomware families to ‘Eat my shorts’ with new, free decryption tools | ZDNet )

These free ransomware decryption tools have rescued data from 2,500 locked devices

Posted on October 18, 2016. Filed under: Everything, Freeware/Shareware, Security | Tags: , , , |

Decryption tools have cost cyber-crooks more than a million euros in two months by unlocking encrypted devices for free.

Source: These free ransomware decryption tools have rescued data from 2,500 locked devices | ZDNet

Read Full Post | Make a Comment ( Comments Off on These free ransomware decryption tools have rescued data from 2,500 locked devices )

How to avoid ransomware attacks: 10 tips from TechRepublic

Posted on August 1, 2016. Filed under: Malware, Security | Tags: , , |

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Source: How to avoid ransomware attacks: 10 tips – TechRepublic

Read Full Post | Make a Comment ( Comments Off on How to avoid ransomware attacks: 10 tips from TechRepublic )

How To Clean Malware from an Unbootable or Unusable System

Posted on September 22, 2015. Filed under: Anti-Virus, Malware, Security, windows | Tags: , , , |

Dave’s Computer Tips tells How To Clean Malware from an Unbootable or Unusable System .

This includes several freeware programs to help on Windows systems.

Read Full Post | Make a Comment ( Comments Off on How To Clean Malware from an Unbootable or Unusable System )

How to Protect from StageFright Vulnerability [for Android]

Posted on August 11, 2015. Filed under: Android, Malware, Security | Tags: , , , |

Zimperium has a post on How to Protect from StageFright Vulnerability for Android users.

There are some steps you can take without buying additional security apps, such as turning off automatic opening of MMS messages.

Read Full Post | Make a Comment ( Comments Off on How to Protect from StageFright Vulnerability [for Android] )

Lenovo says Superfish not a ‘security concern’, own advisory marks it highly severe

Posted on February 20, 2015. Filed under: Malware, Security | Tags: , , , , |

ZDnet has a post on Lenovo says Superfish not a ‘security concern’, own advisory marks it highly severe.

This is for Lenovo laptops that had Lenovo pre-install “Superfish” (adware) software:

The advisory also revealed the model numbers for notebooks that suffered from having Superfish preloaded:

  • E-Series: E10-30
  • Flex-Series: Flex2 14, Flex2 15, Flex2 14D, Flex2 15D, Flex2 14 (BTM), Flex2 15 (BTM), Flex 10
  • G-Series: G410, G510, G40-70, G40-30, G40-45, G50-70, G50-30, G50-45
  • M-Series: Miix2 – 8, Miix2 – 10, Miix2 – 11
  • S-Series: S310, S410, S415; S415 Touch, S20-30, S20-30 Touch, S40-70
  • U-Series: U330P, U430P, U330Touch, U430Touch, U540Touch
  • Y-Series: Y430P, Y40-70, Y50-70
  • Yoga-Series: Yoga2-11BTM, Yoga2-11HSW, Yoga2-13, Yoga2Pro-13
  • Z-Series: Z40-70, Z40-75, Z50-70, Z50-75

This makes the laptop vulnerable to being hacked by others.  This post explains what it is and what it might cause.

A link to removing it is included here.

Read Full Post | Make a Comment ( Comments Off on Lenovo says Superfish not a ‘security concern’, own advisory marks it highly severe )

Cheap Black Friday/Cyber Monday Android tablets

Posted on December 22, 2014. Filed under: Android, Malware, Security | Tags: , , |

WARNING about those cheap tablets for sale during the holidays (and afterwards) :Cheap Black Friday/Cyber Monday Android tablets riddled with vulnerabilities and security headaches.

ZDNet has a warning post about tests done on many of those budget tablets, including those from otherwise reputable sources.  Beware of the security holes and get some decent security apps loaded first before you do anything, especially use your own passwords for anything.

Read Full Post | Make a Comment ( Comments Off on Cheap Black Friday/Cyber Monday Android tablets )

The five most dangerous email subjects to watch for

Posted on December 12, 2013. Filed under: Anti-Virus, Email, Malware, Security | Tags: , , , , , |

ZDnet warns of The five most dangerous email subjects to watch for.  This will have attachments to open or link to sites that will infect you with malware (viruses, trojans, root kits, etc.).

The current (but NOT the only) ones are:

1. Invitation to connect on LinkedIn
2. Mail delivery failed: returning message to sender
3. Dear Customer
4. Comunicazione importante
5. Undelivered Mail Returned to Sender

There are plenty more, but they want you to connect to someplace, and they are getting to be very good about fooling you, so be careful — messages may come from FRIENDS, RELATIVES or people you know who unknowingly have malware on their computers already that sends this stuff out.

 

Read Full Post | Make a Comment ( Comments Off on The five most dangerous email subjects to watch for )

Malware in the Google Play Store

Posted on May 23, 2013. Filed under: Android, Malware, Security | Tags: , , , |

TechRepublic warns of Malware in the Google Play Store for Android app users.

The article covers precautions to take and links to security apps.

Read Full Post | Make a Comment ( None so far )

Malwarebytes : Free anti-malware, anti-virus and spyware removal download

Posted on December 5, 2011. Filed under: Anti-Virus, Freeware/Shareware, Malware, Security | Tags: , , , , |

Malwarebytes is Free anti-malware, anti-virus and spyware removal.
Also a pay version available.

Read Full Post | Make a Comment ( None so far )

ComboFix fights malware

Posted on November 7, 2011. Filed under: Anti-Virus, Freeware/Shareware, Malware | Tags: , , |

ComboFix is freeware to scan and clean malware on your computer.

Note: BleepingComputer.com is reported as a safe site. Avoid downloading ComboFix from other sites; it may have been modified illegally.

Read Full Post | Make a Comment ( None so far )

10 ways to detect computer malware

Posted on September 14, 2009. Filed under: Anti-Virus, Malware, Security, Techniques | Tags: , , |

TechRepublic has advice on 10 ways to detect computer malware.

What to watch for, how to prevent it, and how to handle it.  Useful info!

Read Full Post | Make a Comment ( None so far )

Freebyte’s Guide to Free anti-virus software

Posted on August 7, 2009. Filed under: Anti-Virus, Firewall, Freeware/Shareware, Malware, Security | Tags: , , , , , , , , |

Freebyte’s Guide to Free anti-virus software has links and recommendations for anti-virus, firewalls, removal, anti-rootkit, and more.

Read Full Post | Make a Comment ( None so far )

How to configure and use NoScript

Posted on June 22, 2009. Filed under: Firefox, Security | Tags: , , , , , |

Dave’s Computer Tips has a post on How to configure and use NoScript.

Firefox users with the NoScript addon can prevent every site from running code until and unless you say it’s okay.

With all the malware being installed on websites — even legitimate, normally trustworthy ones — these days, it’s becoming a good precaution.

BTW (By The Way): you need Java enabled to run on the campus and library web sites, and it is safe to do that.

Read Full Post | Make a Comment ( None so far )

Spyware Terminator for free

Posted on October 8, 2008. Filed under: Anti-Virus, Freeware/Shareware, Malware, Security, Spyware | Tags: , , , , , |

Spyware Terminator “includes Real-Time Protection, HIPS, and antivirus. Effectively remove spyware, adware, trojans, keyloggers, home page hijackers, and malware threats even dangerous threats like Look2Me, BetterInternet, VX2, and CWS. Spyware Terminator is easy-to-use, requires minimal PC resources, and performs ultra fast scans. Protect your computer with powerful real-time protection shield, advanced system scanning and safe quarantine for found spyware. Scan your computer manually or schedule full system sweeps. Perform in-depth scans of your computer’s hard drives, memory, process, registry and cookies to seek out and remove all known spyware threats. Includes optional Web Security Guard which displays website reviews and threat level to help identify potentially dangerous Web sites. Version 2.3.0.487 may include unspecified updates, enhancements, or bug fixes.”

For Windows 2000/XP/Vista.  Version 2.3.0.487 of August 2008.  Freeware.

Read Full Post | Make a Comment ( 1 so far )

Protect yourself from ActiveX

Posted on September 9, 2008. Filed under: browsers, Freeware/Shareware, Help, Microsoft Windows, Security | Tags: , , , , , , |

No, ActiveX is not a new virus or malware — it’s actually something Microsoft invented way back in 1996 to improve Internet Explorer — a sort of Microsoft version of the more standard Java.

But ActiveX has turned into a problem, since it is (a) Microsoft only proprietary, which limits you to using Internet Explorer (yes, that’s part of what Microsoft was being sued over), and (b) it is being exploited by the bad guys to attack your computer.

Windows Secrets has a report on how to protect yourself and your computer from unsafe ActiveX malware without completely turning it off (since some sites depend on it to function properly).

Read Full Post | Make a Comment ( None so far )

MyUSBOnly Free locks others out of your USB ports

Posted on June 3, 2008. Filed under: Flash drives, Freeware/Shareware, Hardware, Security, Utilities | Tags: , , , , , , , , , , , , |

Want to keep others from downloading your data, or illegal files, or your keystrokes, using your own computer’s USB ports?

MyUSBOnly Free 2007 is freeware (registration only required) that lets you lock others out of your USB ports while allowing only the devices you trust.

From ZDNet’s TechRepublic.

Read Full Post | Make a Comment ( None so far )

Keyscrambler protects your keystrokes

Posted on June 3, 2008. Filed under: Freeware/Shareware, Malware, Security | Tags: , , , , , , , |

Keyloggers are a new threat, and can be used even on computers that otherwise seem safe. They record your keystrokes, and therefore could allow thieves to steal your passwords, credit card info, and other data that could be used against you.  Keyloggers can even be put on supposedly secure computers by plugging in a USB Flash drive with the keylogger running, and leaving it to be collected later with the valuable stolen data.

KeyScrambler Personal is freeware and works like this:

  • Encrypts your input at keyboard driver level as it enters your computer
  • Decrypts it at the destination application
  • End to end protection gives keyloggers only indecipherable data to record
  • Works even on security compromised computers
  • Protects all parts of the browser and everything you type into a webpage on all websites.

This protects you online in the more popular browsers and sites.  For protection for email and other areas, you can upgrade to one of the pay versions if you think you might need it.

Read Full Post | Make a Comment ( None so far )

« Previous Entries

Liked it here?
Why not try sites on the blogroll...