The rules for creating passwords are simple…

Forgot password? Five reasons why you need a password manager | ZDNet

The rules for creating passwords are simple: Use a random combination of numbers, symbols, and mixed-case letters; never reuse passwords; turn on 2FA, and use a password manager. Here’s why you can’t afford not to. Plus: Five password managers worth considering (click on the source link below to visit ZDNet for the full story).

old bunch of keys, rustiness

Source: Forgot password? Five reasons why you need a password manager | ZDNet

US gov issues emergency directive after wave of domain hijacking attacks | Naked Security

Hmmm… Is the Government Shutdown affecting National Security? This directive may indicate that (see source link below to learn more about this).

What is domain hijacking?

Domain hijacking has been a persistent issue in the commercial world for years, a prime example of which would be the attack that disrupted parts of Craigslist in November 2014. In that incident, as in every successful every domain hijacking attack, the attackers took over the account used to manage the domains at the registrar, in this case, Network Solutions. The objective is to change the records so that instead of pointing to the IP address of the correct website it sends visitors to one controlled by the attackers. This change could have been made using impersonation to persuade the registrar to change the domain settings or by stealing the admin credentials used to manage these remotely. It’s a potent attack – web users think they’re visiting the correct website because they’ve typed the correct domain in their address bar and have no reason to doubt where they end up. For attackers, it’s the perfect crime that avoids the much harder job of having to take over the real website.

Source: US gov issues emergency directive after wave of domain hijacking attacks – Naked Security

Learn How “Windows Sandbox is a safer way to run programs you don’t trust”

Sandboxing applications are nothing new but is nice to see Microsoft bake an option into the OS… As a reader of the blog noted, after I posted the article, “The feature is available for users of Windows 10 Pro or Enterprise running Build 18301 or later, and requires AMD64 and virtualization capabilities enabled in BIOS.” So, this is not an option in the home version of Windows 10. 

Microsoft is introducing a new solution that brings it in line with a standard already found on other operating systems: Windows Sandbox.

The feature creates “an isolated, temporary desktop environment” (and lightweight, at 100MB) on which to run an app, and once you’ve finished with it, the entire sandbox is deleted — everything else on your PC is safe and separate.

Read More @ Engadget

Malwarebytes for Chromebook is an Android app engineered specifically to protect your Chromebook

Own a Chromebook? Here is a version of Malwarebytes that has been engineered to work on your Chromebook. In order to get this, your Chromebook must be able to run Android apps so that you can download and install from the Google Play Store. Malwarebytes for Chromebook is an Android app engineered specifically to protect your Chromebook. Google Play automatically detect your Chromebook and will install the appropriate Malwarebytes product. I am currently running this (and testing) on my Chromebook… I am a firm supporter of Malwarebytes on all platforms (Windows, Android, etc…).

Screenshot Image

Malwarebytes for Android or Malwarebytes for Chromebook free download comes for a limited time with an extended 90-day trial of the Premium version, if you sign up for a free Malwarebytes account. No commitment to buy required. When the 90-day trial is ended, Malwarebytes will only detect and clean, but not prevent, infections. It’s ad-free, forever.

Source: Malwarebytes Security: Virus Cleaner, Anti-Malware – Apps on Google Play

From Gizmodo: These 22 Malware-Riddled Android Apps Might Be Draining Your Phone’s Battery

Malware is finding its’ way on people’s Android devices through apps that are downloaded from the Google Play Store. Google does a pretty good job of tracking these apps down, but sometimes it is to late and the app has already made its mark. Many of these apps had strong reviews. The battery draw occurs due to the app being on a constant run time of reporting back with information and possible grabs of your data.

On Thursday, anti-virus provider Sophos published a report describing its discovery of 22 Android apps that contained a variety of malware the company has named “Andr/Clickr-ad.” The apps come from a variety of small developers, and Sophos said that Google removed them from its Play store at the end of November. One of the offending apps, Sparkle Flashlight, had been downloaded more than a million times and many of them had strong reviews, according to Sophos.

Read More @ Gizmodo

Did you know that “500,000 Android users downloaded malware made by one developer”?

Malware on our Android devices is typically introduced by means such as portrayed in this article, with one goal in mind; and, that is to steal your data. Think about it, your smartphone contains a profile of YOU; where sensitive data could be used to compromise YOU on a personal and a financial basis. I tell people, treat your smartphone as if it is your wallet…

The malware was disguised as various games, and didn’t have any legitimate function; rather, they crashed every time they were launched. Now for the worst part: Stefanko said that before Google removed the apps, two of them were featured in the store’s trending section.

View image on Twitter

Source: 500,000 Android users downloaded malware made by one developer

Here are some tips on “How to Safely and Securely Dispose of Your Old Gadgets” | WIRED

This is IMPORTANT… If you are planning on getting rid of your old devices (smartphone, tablets, computers), PLEASE take at least (at minimum) the necessary steps to clear the device of your data. Always do a backup to ensure you have all of your files, before doing this.

Reflected below, are steps I extracted from the article (see source link below), that will help you wipe an Android device, a Windows Computer, and a Mac. I don’t know how many times I have assisted folks and they throw the old device in the closet somewhere and the device is still holding their entire life…

For Android devices, open up the Settings app then tap System > Advanced > Reset options, and then Erase all data (factory reset). Over on iOS, the equivalent option is in the Settings app under General > Reset > Erase All Content and Settings.

If you’re using a Windows computer, you need to load up the Settings app then click Update & Security, then Recovery, then Get started under the Reset this PC option. Choose to remove all personal files during the process. If you’re using a Chromebook or Chrome OS tablet, open up the Settings pane and pick Advanced, then Powerwash to get your computer into an as-new state.

It’s slightly more involved on a Mac: You need to restart macOS, then as soon as it begins to boot up again, hold Option+Command+R until you see a spinning globe. Release the keys, then choose Reinstall macOS, then choose Continue. Follow the on-screen instructions and select your main hard drive when prompted.

Source: How to Safely and Securely Dispose of Your Old Gadgets | WIRED

A Software Option To “Securely Wipe Your Drives, Save 20 Percent With BitRaser” | by PCMag.com

BitRaser

BitRaser is available in multiple editions that are designed for different use-cases. For typical home and professional users, the BitRaser For File package lets you securely erase an unlimited number of individual files and folders. Step up to the full BitRaser suite, and that will enable you to wipe entire drives securely with a sliding price depending on how many drives you need to wipe – perfect for IT specialists. And if you’re dealing with smartphones, BitRaser for Mobile has you covered on Android and iOS devices.

Source: Securely Wipe Your Drives, Save 20 Percent With BitRaser | PCMag.com

Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | by Putnam Daily Voice

Been receiving messages from my Facebook friends that they received another friend request from me and noticed others have been receiving this as well.  Did some research on this and found that this is all BOGUS. Just stop doing it and disregard those messages…  You can read more on this by clicking on the source link below or Google it (numerous sources out there on this matter).

You can stop forwarding that latest warning from your Facebook friends about your account being cloned. You weren’t. It’s bogus. And you’re just making it worse. It starts out:

“Hi….I actually got another friend request from you yesterday…which I ignored so you may want to check your account…” Then it tells you to “hold your finger on the message until the forward button appears…then hit forward….” Your account isn’t sending duplicate friend requests. And you didn’t receive a request from the person you’re forwarding it to.

Source: Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | Putnam Daily Voice

Here is a descriptive list of “Back to School Cyber Security Tips” – The LastPass Blog

These tips are good educational points for, not only for Students, but for everyone. I have found over the years people do not take online and device security seriously and/or do not have a good understanding of it. I encourage you to follow the source link below to learn the basics and learn how to keep your online presence safe.

Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college students have mobile devices, laptops, and online educational requirements. It is more important than ever that students protect their digital lives as much as adults.

Source: Back to School Cyber Security Tips – The LastPass Blog

At Last, The Secret to Satellite Internet Security is Revealed

This is a Guest Post by Allen Jame, who is a follower of “What’s On My PC”. Thank you Allen for sharing your expertise on Satellite Internet Security with my readers…

Satellite communication is referred to as one of the most popular communication technology used for global communication.

Its applications are vast. Military intelligence, Broadband internet service, and weather forecasting are its some most popular applications.

The satellite dish network internet Wi-Fi is supposed to be the best solution for getting internet in the rural areas.

Although its advantages are vast still security in the satellite communication is a significant concern.

There are many limitations. For example, power control, high link delay, and link availability are some of the standard security issues on the satellite internet.

During the satellite communication, protections of the links and the satellites are not enough. Sound integrity and the confidentiality of the downlink earth stations is also a significant concern.

In this article, you will witness security issue with the satellite internet. Some of the main security issue covered in this article are:

  • Eavesdropping
  • Satellite security link protocol issues
  • Network infrastructure issues
  • TCP based security issues
  • Information-System based security issues
  • Long delays

Continue reading “At Last, The Secret to Satellite Internet Security is Revealed”

Kaspersky’s Antivirus For FREE Soon Rolling Out

I have known Kaspersky’s Antivirus to be one of the best when it comes to computer security (however, at a price — not FREE). Soon you will be able to get a baseline version of Kaspersky’s Antivirus for FREE. This new development by Kaspersky’s (according to ZDNet) is apparently in light of the U.S. Government removing Kaspersky Lab from two lists of approved vendors used by government agencies to purchase technology equipment. Apparently, this is amid concerns the Russian-based company’s products could be used by the Kremlin to gain entry into United States networks.

The removal of Kapersky’s from the vendors list follows the accusations from US intelligence agencies that Russia hacked into Democratic Party emails, thus helping Donald Trump to election victory, despite President Vladimir Putin proclaiming his country has never engaged in hacking activities, but some “patriotic” individuals may have.

Ok, now that you have digested this, is it safe to install the free version of Kaspersky’s on our home-based computer systems? Personally, I am not installing it and will stick to the free version of BitDefender; however, if you are interested in the FREE version, click on the source link below to monitor for its’ release. Reportedly, the free version will rollout to the U.S. first…

If you do opt to give this a try, make sure you remove (uninstall) any antivirus software that is currently existing on your computer. Typically, to remove antivirus software, it is best practices to visit the website of the product and look for an uninstaller that will completely and safely remove the antivirus software from your PC.

SOURCE: Kaspersky’s Antivirus FREE

 

Malwarebytes Labs Explain The “Dark Web” AKA: “Deep Web”

I encourage you visit the source link below to learn about the “Dark Web” (aka: Deep Web). Did you know that only 5% of the Web is easily accessible to the general public and that many other sites can only be visited if you have a direct URL. I often referred to the “Dark Web” here on the blog as the underbelly of the internet…

Before you go to read the article (which is very interesting), you need to learn some terminology:

  • Surface Web is what we would call the regular World Wide Web that is indexed and where websites are easy to find.
  • The Deep Web is the unindexed part of the Web. Actually, anything that a search engine can’t find.
  • The Dark Web is intentionally hidden, anonymous, and widely known for illicit activities.

Explained: the Dark Web

SOURCE: Malwarebytes Labs – Explained: the Dark Web

Many of the warning phrases you probably heard from your parents and teachers are also applicable to using computers and the Internet….

I am reblogging this information from US-CERT Security Tip (ST05-014) – Real-World Warnings Keep You Safe Online

U.S. Department of Homeland Security Seal. United States Computer Emergency Readiness Team US-CERT

Why are these warnings important?

Like the real world, technology and the Internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real world, you need to take precautions to protect yourself online. For many users, computers and the Internet are unfamiliar and intimidating, so it is appropriate to approach them the same way we urge children to approach the real world.

What are some warnings to remember?

  • Don’t trust candy from strangers – Finding something on the Internet does not guarantee that it is true. Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable. It is also easy for attackers to “spoof” email addresses, so verify that an email is legitimate before opening an unexpected email attachment or responding to a request for personal information. (See Using Caution with Email Attachmentsand Avoiding Social Engineering and Phishing Attacks for more information.)
  • If it sounds too good to be true, it probably is – You have probably seen many emails promising fantastic rewards or monetary gifts. However, regardless of what the email claims, there are not any wealthy strangers desperate to send you money. Beware of grand promises—they are most likely spam, hoaxes, or phishing schemes. (See Reducing Spam and Identifying Hoaxes and Urban Legends.) Also be wary of pop-up windows and advertisements for free downloadable software—they may be disguising spyware. (See Recognizing and Avoiding Spyware.)
  • Don’t advertise that you are away from home – Some email accounts, especially within an organization, offer a feature (called an autoresponder) that allows you to create an “away” message if you are going to be away from your email for an extended period of time. The message is automatically sent to anyone who emails you while the autoresponder is enabled. While this is a helpful feature for letting your contacts know that you will not be able to respond right away, be careful how you phrase your message. You do not want to let potential attackers know that you are not home, or, worse, give specific details about your location and itinerary. Safer options include phrases such as “I will not have access to email between [date] and [date].” If possible, also restrict the recipients of the message to people within your organization or in your address book. If your away message replies to spam, it only confirms that your email account is active. This practice may increase the amount of spam you receive.
  • Lock up your valuables – If an attacker is able to access your personal data, he or she may be able to compromise or steal the information. Take steps to protect this information by following good security practices. (See the Tips index page for a list of relevant documents.) Some of the most basic precautions include locking your computer when you step away; using firewalls, anti-virus software, and strong passwords; installing appropriate software updates; and taking precautions when browsing or using email.
  • Have a backup plan – Since your information could be lost or compromised (due to an equipment malfunction, an error, or an attack), make regular backups of your information so that you still have clean, complete copies. (See Good Security Habits.) Backups also help you identify what has been changed or lost. If your computer has been infected, it is important to remove the infection before resuming your work. (See Recovering from Viruses, Worms, and Trojan Horses.) Keep in mind that if you did not realize that your computer was infected, your backups may also be compromised.

Geek Squeak #17-020: An Advanced Users’ Malware Killer

Curious if any of the folks out there with technical expertise have ever used RogueKiller? I typically go to Malwarebytes AntiMalware; however, I see RogueKiller has pretty darn good reviews.  The main point that jumps out at me is that RogueKiller is for advanced users (see video below)…

Roguekiller is a popular and an effective tool to remove some stubborn malware but be warned; you better know what you’re doing. While a lot of more well-known tools will only scan and delete for you, this tool will show you everything it finds that is a possible problem. You need to know what to remove and what not to remove, or you could delete something you want, or need. Your results may vary, but just use caution and do your homework before removing anything or ask someone who is computer savvy.

SOURCE: Major Geeks -RogueKiller 12.11.1.0


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment

These 7 Tips (from Kim Komando) Will Help You Master Facebook

I love Kim Komando’s tech column at USAToday and find her posted information very useful and on the same parallel to my blog when it comes to assisting home-based computer users.

Kim recently posted an article, “These 7 tips will help you master Facebook” that you should read, if you are an advocate of Facebook. In all honesty, I do not care for Facebook; however, I do care about the safety and security of people (which has been my lifelong profession as a law enforcement (and security) officer and computer info specialist).

The one tip that Kim posted in this article that jumps out at me, in regards to your safety and security, is the tip “Find out where you are logged in”… Many Facebook users (carelessly) log into multiple devices, often at multiple locations, and keep their Facebook pages open in order to “conveniently” access their account without having to log in. The upside to this is user convenience; however, the downside to this is you are setting yourself up to have your account compromised, which could result in devastating consequences.

To see if your account is open on other devices and locations, here is how (as Kim Komando pointed out) to determine that:

Just to go to Settings >> Security Settings >> Where You’re Logged In, and you’ll find a list of devices that are currently accessing your Facebook account. The feature also lists login metadata, such as when and where you last checked in, plus the type of device you used. Keep in mind that cell phones sometimes show weird locations, which may refer to a cell phone tower and not necessarily to where you were standing at the time.

Facebook

That said, if your login information looks a little fishy, it’s possible your account has been compromised. It’s best to lock down access before this even happens.

Kim Komando is a consumer tech columnist for USA TODAY. She also hosts the nation’s largest radio show about the digital lifestyle, heard on 435 stations in the USA and globally on American Forces Radio. Find your local radio station, get the podcast and more at Komando.com.

SOURCE: USAToday – Kim Komando


Thank You For Visiting

MAKE SURE YOU ALSO VISIT

Main Page

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Deals  –  Archives (of all articles)


Leave A Comment

Microsoft Patches MS-Word Exploit That Spreads Malware

On the same day Microsoft officially began rolling out the Creators Update for Windows 10, they were also rolling out a patch for a zero-day exploit (that spreads malware) for all current Microsoft Office versions used on every Windows operating system (including the latest Office 2016 running on Windows 10). If you are running Microsoft Office at home, make sure you have installed the patch. To learn more, click on the source link below…

All versions of Office on all versions of Windows are vulnerable to this zero-day that spreads malware, so make sure you patch quickly

Source: Microsoft patches Word zero-day booby-trap exploit – Naked Security

Was Informed That A New Version Of Malwarebytes Has Been Released

In discussion with a computer geek friend of mine he indicated that Malwarebytes has a new version out (v3.0). I further confirmed this and learned that a new version was released on and about March 20, 2017. Based on what I am reading on their blog (for this release) — CLICK HERE — the excitement over this release is that it is being touted as a next generation anti-virus replacement and will be called only Malwarebytes.

Once you download and install you will be entitled to a 14 day free trial. If you desire to revert to the FREE edition now and turn “off” the free trial, simply click on the “settings” (at the left side) and then click on “my accounts”, then turn off the trial under “subscription details”. If you decide to stick with the free edition, you will need to periodically perform the scans manually.

Malwarebytes is one of the first things I install on a new computer and is my “go to” tool when helping others eradicate malware and other exploits…

This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus.

Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster!

mb3

With the combination of our Anti-Malware ($24.95), Anti-Exploit ($24.95) and Anti-Ransomware (free, beta) technologies, we will be selling Malwarebytes 3.0 at $39.99 per computer per year, 20% less than our previous products combined and 33% less than an average traditional antivirus. But don’t worry, if you are an existing customer with an active subscription or a lifetime license to Malwarebytes Anti-Malware, you will keep your existing price and get a free upgrade to Malwarebytes 3.0. If you have both an Anti-Malware and an Anti-Exploit subscription, we will upgrade you to a single subscription to Malwarebytes 3.0, reduce your subscription price and add more licenses to your subscription.

Source: Malwarebytes

Top 10 Best Sellers – Antivirus and Security Software

Antivirus software, now often referred to as security (suite) software, due to the innumerable threats, come in a variety of different brands. To get an idea, check out the top ten sellers at Amazon (see source links below).

I personally use a FREE antivirus program called Bitdefender Antivirus Free Edition; however, you may feel more comfortable using one of the paid commercial versions such as reflected below.

Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[2] Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. [source: Wikipedia]

#1: Norton Security Deluxe 5 Device PC/Mac

#2: McAfee 2017 Total Protection – 5 Devices [Online Code]

#3: Norton Security Premium – 10 Devices [Download Code]

#4: Norton Security Deluxe – 3 Devices [Download Code]

#5: Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

#6: Norton Security Standard – 1 Device [Download Code]

#7: Norton Security Deluxe – 5 Devices [Key Card]

#8: McAfee 2017 Total Protection-5 Devices [Key Code]

#9: Webroot Internet Security Complete 2017 | 5 Devices | 1 Year | PC [Download]

#10: Webroot Antivirus 2017 | 3 Devices | 1 Year | PC [Download]

A TIP To Protect Privacy (When sending email to multiple recipients, use “Bcc”.)

The article reflected below I have posted several times since its’ original posting (back in 2010). What prompted me to dust this off and bring it back out of the archives is that today I received a local government generated email to advise recipients of other government agencies of an impending snowstorm.  What caught my attention was that as this email was sent to a very large body of people.  I was able to see every name and email address to folks I am guessing would not want their email address and name made that public. As this email get’s forwarded, more and more email addresses will be revealed. To protect the privacy of others, it is best practice to use “Bcc” when sending email to multiple recipients.

Bcc = Blind Carbon Copy

Did you know that if you use the Bcc field in your email client to address and send an email or want to send a copy of an email to multiple users, the recipients will not see whom you sent the email to?

Many know this trick; however, I still find that many do not. When using the Bcc field to send your emails, the people receiving the email will not know who the other recipients are. It is not a trick of hidden magic. It is that the addresses of the other recipients are simply not shared.

I often receive forwarded chain emails; usually consisting of jokes, humorous movies, prayer requests, etc… Occasionally I will find one these emails humorous or important enough that I will pass it on; HOWEVER, prior to doing this I perform some housecleaning steps.

I will remove any “FWD” text (usually in the subject line) and will remove any email addresses I find in the body of the email that reflects the email addresses of recipients who have already received the email. After performing these housecleaning steps, I will enter into the the Bcc field, in my email client, the recipient’s email addresses, from my address book, to send (or forward) the email. If the email client requires at least one entry in the “To” field, I simply enter my own email address.

The benefits of using the Bcc field is simply this. You are protecting the privacy of other people. Currently I have approximately (5)-five email accounts that I use for specific purposes, from a variety of email services, with one of those accounts being my primary email account. I am very protective of that primary email account address and do not want it thrown about for the spammers to get hold of or for strangers to see. For example, I have found people’s email addresses in forwarded emails that I know and have not seen for years. They are very surprised when I contact them; and, will often ask, “How did you get my email?”. I explain that I simply pulled it from a forwarded email.

Be courteous to others and learn to use the Bcc field in your email; AND, when possible avoid chain emails all together.

Did you know that Google knows almost everything that you do on their services?

You need to see this article that Phandroid has posted (see source link below) that will show you what Google knows about you, how this information is collected, where you can find this information and how you can opt out. Google collects this information, as a form of profiling, in order to better improve their products and services.

You may have already opted out of this collection of information; but, my guess is, you did not.

Did you know that Google knows almost everything that you do on their services? Find out what they know and how you can do something about it.

Source: Here is everything Google knows about you

A FREE Synchronization Program That I Am Messing Around With

I have found that using synchronization software is a very easy way for the home based computer user to backup data vs. the full blown backup type software (which can hard to understand for the home computer user). I am currently messing around with the FREE synchronization program called SyncFolders; that, so far in my testing, could end up being my default (go to) backup software for my computers here at home. If you are interested in giving SyncFolders a try, the source link is reflected below. SyncFolders is also available as a portable app.

SyncFolders

SyncFolders main window...

Features of SyncFolders

  • Supports two-way synchronization of files and folders.
  • Can easily be used as backup tool.
  • Shows a preview before the actual synchronization takes place. You can override actions if desired.
  • Detects conflicts or file collisions when a file has changed in both locations since the last sync operation. Therefore, SyncFolders tracks file modifications and deletions in a local database.
  • Propagates deletions and detects file renames.
  • File comparison by date and size or by content.
  • Default actions can be defined in case of synchronization conflicts.
  • Integrates with Windows’ Task Scheduler to support scheduled synchronizations.
  • Supports file and folder filters.
  • Can handle long file names and files of any size.
  • Synchronization from or to UNC paths is supported.
  • Supports multiple synchronization rules in a single rules file.
  • Deleted or overwritten files can be moved to the recycle bin or to a time-stamped history folder.
  • History files can be deleted after a user-defined period.
  • Unlimited number of files.
  • Synchronization from command line.
  • Can ignore one-hour timestamp differences caused by DST switch for synchronization to FAT file systems.
  • Easy-to-use.
  • Unrestricted freeware.
  • No spyware, adware or malware.
  • Portable, although .NET Framework is required.

AxCrypt – File Security Made Easy

If you are concerned about file (and folder) security, AxCrypt 2.0 is good choice in protecting what matters to you. In addition to the full install version, there is a portable version, as well as, a mobile app (for Android and iOS).

AxCrypt works as a separate program in it’s own window, but it’s also fully integrated into the Windows Explorer – the part of Windows where you browse your folders and files. Here is a quick video tutorial on how to use the basic functions of AxCrypt 2.0.

AxCrypt is a simple file encryption software for Windows. It integrates seamlessly with your workflow to encrypt, decrypt, store, send and work with files.

New and Updated Features

  • 256 bit encryption
  • Mobile App for iOS
  • Mobile App for Android
  • Passwordless sharing
  • Portable app for Windows
  • Secured Folders
  • Cloud Service Awareness
  • Password Manager
  • Single sign in for encryption / decryption

Source: AxCrypt – File Security Made Easy

This Gmail Phishing Attack Is Even Fooling The Tech-Savvy 

This Gmail Phishing attack (see source link below) has been making tech news and is very important that you are made aware. It has been known by Google since March of 2016. This deceptive sneaky attack is currently only targeting Gmail accounts. The cybercriminals trick you into giving away your Google or Gmail Login Credentials. It is even fooling those who are tech-savvy and very familiar with phishing schemes.

Once an account has been compromised, the attackers immediately access it and start targeting the victim’s contacts.

 

Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts

Source: Phished Gmail Accounts Immediately Accessed by Hackers | SecurityWeek.Com

Hyper Crypt | Portable Encryption Software

Looking for a method to protect sensitive files and folders?  If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…

hyper-crypt

One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…

By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.

Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.

With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.

Source: Hyper Crypt | Portable Encryption Software

AOMEI Backupper Standard 4 Now Includes Real-Time Syncing | Betanews

AOMEI is an excellent software package that will assist you with backing up your files. The newest version now includes a live syncing option. Read more at Betanews (source link below).

AOMEI has released AOMEI Backupper Standard 4.0, the second major update of its freeware Windows backup, imaging and cloning tool in 2016. Version 4.0 adds an additional arrow to the tool’s bow …

Source: AOMEI Backupper Standard 4 adds real-time file sync, supports backup to cloud

How To Check If Your Google Account Has Been Breached by “Gooligan”

Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk  The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.

To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…

Googligan

Malware Called “DressCode” Found In Android Apps

If you think you are immune from malware in Android Apps; “Think Again”…

“Researchers from Check Point discovered malware they’re calling DressCode in 40 Google Play store apps and more than 400 apps listed in third-party app stores”…

“Once installed on the device, DressCode initiates communication with its command and control server,”

READ MORE @ BGR

The following video also explains how DressCode works:

A Smorgasborg Of Security and Forensic Tools For The IT Professional

If you are an IT Professional I think you will appreciate the site called SecurityXploded. They feature a smorgasbord of password dump tools, system security tools, network security tools, anti-spyware tools, and online security tools.

234 tools at this time, to be exact… Check out their current listing of tools HERE

SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.

SecurityXploded

Geek Squeaks (#2015-25) FEATURING — Take A Virtual Reality Ride On A New Dive Rollercoaster Coming In 2016 — and MORE GREAT STUFF

Take A Virtual Reality Ride On A New Dive Rollercoaster Coming In 2016 – When introduced in 2016, this rollercoaster (called the Valravn) will establish itself as being the world’s tallest, fastest and longest dive coaster.  You can read more about it here.  In the meantime you can take a virtual reality ride on it from your computer (see video below) and even on your phone as an Android or Apple app.

Start Video Below To Ride The Valravn
(Click full screen to get the full effect. There is a control at the top left
corner that can be used to get a panoramic view)

Campaign To Ban The Development of Sex Robots – Folks, this is not a joke. Knowing what I know about computer technology and the rapid development of robotics, we are very close to the time where you will be able to purchase your own sex robot. From an ethical standpoint, this is very disturbing. “Dr Richardson, a robot ethicist at De Montfort University in Leicester, wants to raise awareness of the issue and persuade those developing sex robots to rethink how their technology is used — READ MORE

Roxxxy the robot in a publicity shot

Free Security Protection and Speed Booster for Android Phone – If you are looking to take protective measures on your Android smartphone or tablet, you may want to take a look at the 360 Security – Antivirus Boost app. I am currently testing this on my tablet and phone and in comparison to many of the other security apps I have tried, I am really liking what I am seeing with this app. In summary 360 Security is a Security & Antivirus app with features such as:  junk-file remover, memory booster, power saver, anti-theft components (locater, eraser, alarm and lock), privacy & app locks, and real-time protection. This app runs as smooth as silk on both of my devices and carries a high rating at the google play store. I have added 360 Security to the downloads page under the Android Apps swarm.

 360 Security - Antivirus Boost

Could You Spot A Fake Product Review? – When I intend on making a purchase online, I head straight to the customer reviews to see what other people are saying about the product. The problem with this is that there are people paid to post fake reviews (often using automated technology) and you really have to be careful.  I typically will head to other sites that have the product and also check out their customer reviews so that I have a good comparative analysis. I typically try to stick with Amazon for reviews because there are typically many reviewers (often with pictures and videos).  As a matter of fact Amazon will often contact you, after making a purchase, to encourage you to post a review and/or answer a question about the product.  So, how do you spot fake reviews?  I encourage you to take a look at this article at TNW News, “How to spot fake reviews“… As the article states, “The bottom line is that you should easily be able to figure out if an item is a quality product or which companies have superior customer service without going through an exhaustive or misleading web experience”.

How spot fake reviews @ TNW News

How To Spot A Fake Review

Always Check The Deal Of The Day (@Amazon) – At the bottom of the blog you will see an icon for “The Deal Of The Day“.  When visiting, always click on that icon to see what Amazon has going on. For example, as of today’s blog post, they are offering tremendous savings on TP-Link Networking products

Deal of the Day

What Antivirus Do I Use? – I can tell you this… I have NEVER paid for any antivirus software EVER. Much of what we do on the internet and how we do it determines what our risk level is when it comes to becoming a victim of malware. The antivirus software that I currently use is Bitdefender Antivirus Free Edition. Once you install it, establish an online account, you will not even know it is there.

Bitdefender Free Edition

____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the DayLeave A Comment

Read About Malwarebytes Amnesty Program

If you have been pirating the Malwarebytes Anti-malware Premium version, you will receive an amnesty.

Malwarebytes Anti-Malware Premium

The developers of Malwarebytes is rolling out a new licensing key system to track their licensees and to prevent pirating; however, to bring this system up to speed they are giving the software pirates an amnesty by giving them a 1 year subscription key (for FREE). From what I have researched, the developer, “in a nutshell”, lost track of who was legal and who was not; and, the only way to remedy the issue was to perform an audit to collect data to determine what keys are still alive, and who are they used by. If you are a true pirate, the furthest you will get is a year’s worth of Malwarebytes. To read a good article about this CLICK HERE

What the end user of Malwarebytes will see, whether you are a pirate of not, is the following message:

Select the option below (in your Malwarebytes Anti-Malware Premium product) that describes how you originally received your Malwarebytes Anti-Malware Pro or Premium license. We’ll assign you a new key, and you’ll be good to go.

  1. I’m not sure where I got my key, or I downloaded it from the Internet. (Select this option and we will issue you a brand-new key with 12 free months of Malwarebytes Anti-Malware Premium.)

  2. I purchased my key. (Select this option and we will issue you a replacement key with the same license to Malwarebytes Anti-Malware as your original key.)

Malwarebytes Anti-Malware is an industry-leading scanner that detects and removes worms, Trojans, rootkits, rogues, spyware, and other dangerous malware from your home PC. There is a FREE version and a paid premium version. The FREE version does not perform background scanning; whereas, the premium version (with background scanning and more features) is ready and alert at all times.

 ____________________________

Thank You For Visiting Today

MAKE SURE YOU ALSO VISIT

Bookmarks4Techs  –  GEGeek  –  Downloads
 Tech News  –  Tech Toys  –  Archive (of all articles)
– Earth’s Biggest Selection – Deal of the Day Leave A Comment

Powered by WordPress.com.

Up ↑