Bitdefender Home Scanner – A free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws…

July 13, 2017

With all of the wireless devices in our daily lives we often forget about them, how many, the potential security risks, etc… Bitdefender is taking an approach to help make our wi-fi world safe by offering a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws … After you download, install and run Bitdefender Home Scanner you will be prompted to set up a Bitdefender account (which is free). If you need more information about this tool, prior to installing, CLICK HERE to see the User Guide…

Bitdefender Home Scanner is able to detect any wireless device that is turned on and connected to your home network. Wireless devices can either be smart home devices such as baby monitors, WiFi cameras, games consoles, smart TVs, but also Windows, Macs, iOS and Android-based devices.

SOURCE: Bitdefender Home Scanner


Many of the warning phrases you probably heard from your parents and teachers are also applicable to using computers and the Internet….

July 8, 2017

I am reblogging this information from US-CERT Security Tip (ST05-014) – Real-World Warnings Keep You Safe Online

U.S. Department of Homeland Security Seal. United States Computer Emergency Readiness Team US-CERT

Why are these warnings important?

Like the real world, technology and the Internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real world, you need to take precautions to protect yourself online. For many users, computers and the Internet are unfamiliar and intimidating, so it is appropriate to approach them the same way we urge children to approach the real world.

What are some warnings to remember?

  • Don’t trust candy from strangers – Finding something on the Internet does not guarantee that it is true. Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable. It is also easy for attackers to “spoof” email addresses, so verify that an email is legitimate before opening an unexpected email attachment or responding to a request for personal information. (See Using Caution with Email Attachmentsand Avoiding Social Engineering and Phishing Attacks for more information.)
  • If it sounds too good to be true, it probably is – You have probably seen many emails promising fantastic rewards or monetary gifts. However, regardless of what the email claims, there are not any wealthy strangers desperate to send you money. Beware of grand promises—they are most likely spam, hoaxes, or phishing schemes. (See Reducing Spam and Identifying Hoaxes and Urban Legends.) Also be wary of pop-up windows and advertisements for free downloadable software—they may be disguising spyware. (See Recognizing and Avoiding Spyware.)
  • Don’t advertise that you are away from home – Some email accounts, especially within an organization, offer a feature (called an autoresponder) that allows you to create an “away” message if you are going to be away from your email for an extended period of time. The message is automatically sent to anyone who emails you while the autoresponder is enabled. While this is a helpful feature for letting your contacts know that you will not be able to respond right away, be careful how you phrase your message. You do not want to let potential attackers know that you are not home, or, worse, give specific details about your location and itinerary. Safer options include phrases such as “I will not have access to email between [date] and [date].” If possible, also restrict the recipients of the message to people within your organization or in your address book. If your away message replies to spam, it only confirms that your email account is active. This practice may increase the amount of spam you receive.
  • Lock up your valuables – If an attacker is able to access your personal data, he or she may be able to compromise or steal the information. Take steps to protect this information by following good security practices. (See the Tips index page for a list of relevant documents.) Some of the most basic precautions include locking your computer when you step away; using firewalls, anti-virus software, and strong passwords; installing appropriate software updates; and taking precautions when browsing or using email.
  • Have a backup plan – Since your information could be lost or compromised (due to an equipment malfunction, an error, or an attack), make regular backups of your information so that you still have clean, complete copies. (See Good Security Habits.) Backups also help you identify what has been changed or lost. If your computer has been infected, it is important to remove the infection before resuming your work. (See Recovering from Viruses, Worms, and Trojan Horses.) Keep in mind that if you did not realize that your computer was infected, your backups may also be compromised.

WebBrowserPassView – Reveal The Passwords Stored By Your Browser

July 3, 2017

Software to retrieve passwords (and usernames) that are stored in our web browser(s) may be looked upon as software that could be used for malicious and/or forensic purposes. There is some truth to that; however, I had an occasion recently where I used this type of software to do a good deed for a person.

If you have a need for software such as this, take a look at WebBrowserPassView and another one, called Sterjo Browser Password, that I wrote about back in April.

WebBrowserPassView is a password recovery tool that reveals the passwords stored by the following Web browsers: Internet Explorer (Version 4.0 – 11.0), Mozilla Firefox (All Versions), Google Chrome, Safari, and Opera. This tool can be used to recover your lost/forgotten password of any Website, including popular Web sites, like Facebook, Yahoo, Google, and GMail, as long as the password is stored by your Web Browser.

SOURCE: NirSoft – WebBrowserPassView

 


Dsynchronize – Sync And Backup Your Data With This Free Program

July 3, 2017

I currently use Dsynchronize at work and at home to back up (and sync) my files. To learn how to use Dsynchronize, I suggest you set up a small test environment to practice using the program. It is very easy to use, once you get the hang of it. The thing that fascinates me with the program is that it is very fast. I have been using Dsynchronize for several years and it has never let me down.

Dsynchronize is FREE and is a standalone program (portable app) that requires no installation…

SOURCE: Dsynchronize


Malwarebytes Clean Uninstall Tool – Use This Tool To Perform A Clean Uninstall of Malwarebytes Anti-Malware

June 30, 2017

Many security software packages, due to their complexity, typically require a specialized uninstaller to cleanly remove the product from the computer. Malwarebytes Anti-Malware is no exception. As a matter of fact, I ran into an issue where Malwarebytes was not updating properly and used this tool to remedy the problem by removing all traces of the software. I then re-installed Malwarebytes and was back in service.

Always, when uninstalling security software, check with the product’s website for uninstall instructions. The uninstaller built into Windows, just won’t cut it when it comes to these products.

To uninstall Malwarebytes Anti-Malware from your computer, please use the Malwarebytes Clean Uninstall Tool. This tool was created to completely remove all traces of the program from your computer.

To use the utility:

Download and run mb_clean.exe

Restart your computer when prompted.

Note: This tool will completely remove any settings you have configured, your license information, and anything else related to Malwarebytes Anti-Malware. If you need to save any of these, please do not run this tool.

SOURCE: Malwarebytes Clean Uninstall Tool 


FREE Protection Against 99% Of Ransomware (including new strains such as Petya/NotPetya)

June 28, 2017

Wow, these ransomware events (or attacks) are causing havoc worldwide. The most recent attack is Petya (see below) where it will encrypt the files on your computer and hold your computer for ransom. Very important that you keep your computers patched with current Windows updates and security software updates.

Ransomware is alarmingly quick – Ransomware takes between five and 20 minutes to encrypt every relevant file on the average hard drive (depending on the speed of the machine and the number of files). That means that even the slowest, single-threaded ransomware can encrypt several potentially important files in seconds. Since ransomware works quickly, detection and response time is of the utmost importance, which may be problematic for certain behavioral-detection solutions.

I am seeing many of the leading security software companies coming out with various products to protect against ransomware. Big money in this… If you want something FREE that will add a level of protection to your computer, give Cybereason RansomFree a look. In a nutshell, this software uses a unique behavioral approach in detecting and blocking ransomware at the entry points where ransomware typically initiates the encryption process. When the program detects ransomware activity, it suspends the activity and displays a pop-up message warning you about an imminent attack. You will then have the option to easily stop the attack by making just one mouse click.

SOURCE: Cybereason RansomFree


Spybot – Search and Destroy Portable 2.6 Has Been Released By PortableApps.com

June 25, 2017

Get the new release of Spybot – Search & Destroy, portable version, at PortableApps.com. Great addition to your tech toolbox…

Spybot – Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.

SOURCE: PortableApps.com – Spybot – Seach & Destroy