Microsoft Patches MS-Word Exploit That Spreads Malware

April 12, 2017

On the same day Microsoft officially began rolling out the Creators Update for Windows 10, they were also rolling out a patch for a zero-day exploit (that spreads malware) for all current Microsoft Office versions used on every Windows operating system (including the latest Office 2016 running on Windows 10). If you are running Microsoft Office at home, make sure you have installed the patch. To learn more, click on the source link below…

All versions of Office on all versions of Windows are vulnerable to this zero-day that spreads malware, so make sure you patch quickly

Source: Microsoft patches Word zero-day booby-trap exploit – Naked Security


Was Informed That A New Version Of Malwarebytes Has Been Released

April 4, 2017

In discussion with a computer geek friend of mine he indicated that Malwarebytes has a new version out (v3.0). I further confirmed this and learned that a new version was released on and about March 20, 2017. Based on what I am reading on their blog (for this release) — CLICK HERE — the excitement over this release is that it is being touted as a next generation anti-virus replacement and will be called only Malwarebytes.

Once you download and install you will be entitled to a 14 day free trial. If you desire to revert to the FREE edition now and turn “off” the free trial, simply click on the “settings” (at the left side) and then click on “my accounts”, then turn off the trial under “subscription details”. If you decide to stick with the free edition, you will need to periodically perform the scans manually.

Malwarebytes is one of the first things I install on a new computer and is my “go to” tool when helping others eradicate malware and other exploits…

This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus.

Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster!

mb3

With the combination of our Anti-Malware ($24.95), Anti-Exploit ($24.95) and Anti-Ransomware (free, beta) technologies, we will be selling Malwarebytes 3.0 at $39.99 per computer per year, 20% less than our previous products combined and 33% less than an average traditional antivirus. But don’t worry, if you are an existing customer with an active subscription or a lifetime license to Malwarebytes Anti-Malware, you will keep your existing price and get a free upgrade to Malwarebytes 3.0. If you have both an Anti-Malware and an Anti-Exploit subscription, we will upgrade you to a single subscription to Malwarebytes 3.0, reduce your subscription price and add more licenses to your subscription.

Source: Malwarebytes


Top 10 Best Sellers – Antivirus and Security Software

March 17, 2017

Antivirus software, now often referred to as security (suite) software, due to the innumerable threats, come in a variety of different brands. To get an idea, check out the top ten sellers at Amazon (see source links below).

I personally use a FREE antivirus program called Bitdefender Antivirus Free Edition; however, you may feel more comfortable using one of the paid commercial versions such as reflected below.

Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.[2] Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks. [source: Wikipedia]

#1: Norton Security Deluxe 5 Device PC/Mac

#2: McAfee 2017 Total Protection – 5 Devices [Online Code]

#3: Norton Security Premium – 10 Devices [Download Code]

#4: Norton Security Deluxe – 3 Devices [Download Code]

#5: Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

#6: Norton Security Standard – 1 Device [Download Code]

#7: Norton Security Deluxe – 5 Devices [Key Card]

#8: McAfee 2017 Total Protection-5 Devices [Key Code]

#9: Webroot Internet Security Complete 2017 | 5 Devices | 1 Year | PC [Download]

#10: Webroot Antivirus 2017 | 3 Devices | 1 Year | PC [Download]


A TIP To Protect Privacy (When sending email to multiple recipients, use “Bcc”.)

March 13, 2017

The article reflected below I have posted several times since its’ original posting (back in 2010). What prompted me to dust this off and bring it back out of the archives is that today I received a local government generated email to advise recipients of other government agencies of an impending snowstorm.  What caught my attention was that as this email was sent to a very large body of people.  I was able to see every name and email address to folks I am guessing would not want their email address and name made that public. As this email get’s forwarded, more and more email addresses will be revealed. To protect the privacy of others, it is best practice to use “Bcc” when sending email to multiple recipients.

Bcc = Blind Carbon Copy

Did you know that if you use the Bcc field in your email client to address and send an email or want to send a copy of an email to multiple users, the recipients will not see whom you sent the email to?

Many know this trick; however, I still find that many do not. When using the Bcc field to send your emails, the people receiving the email will not know who the other recipients are. It is not a trick of hidden magic. It is that the addresses of the other recipients are simply not shared.

I often receive forwarded chain emails; usually consisting of jokes, humorous movies, prayer requests, etc… Occasionally I will find one these emails humorous or important enough that I will pass it on; HOWEVER, prior to doing this I perform some housecleaning steps.

I will remove any “FWD” text (usually in the subject line) and will remove any email addresses I find in the body of the email that reflects the email addresses of recipients who have already received the email. After performing these housecleaning steps, I will enter into the the Bcc field, in my email client, the recipient’s email addresses, from my address book, to send (or forward) the email. If the email client requires at least one entry in the “To” field, I simply enter my own email address.

The benefits of using the Bcc field is simply this. You are protecting the privacy of other people. Currently I have approximately (5)-five email accounts that I use for specific purposes, from a variety of email services, with one of those accounts being my primary email account. I am very protective of that primary email account address and do not want it thrown about for the spammers to get hold of or for strangers to see. For example, I have found people’s email addresses in forwarded emails that I know and have not seen for years. They are very surprised when I contact them; and, will often ask, “How did you get my email?”. I explain that I simply pulled it from a forwarded email.

Be courteous to others and learn to use the Bcc field in your email; AND, when possible avoid chain emails all together.


Did you know that Google knows almost everything that you do on their services?

March 11, 2017

You need to see this article that Phandroid has posted (see source link below) that will show you what Google knows about you, how this information is collected, where you can find this information and how you can opt out. Google collects this information, as a form of profiling, in order to better improve their products and services.

You may have already opted out of this collection of information; but, my guess is, you did not.

Did you know that Google knows almost everything that you do on their services? Find out what they know and how you can do something about it.

Source: Here is everything Google knows about you


A FREE Synchronization Program That I Am Messing Around With

February 21, 2017

I have found that using synchronization software is a very easy way for the home based computer user to backup data vs. the full blown backup type software (which can hard to understand for the home computer user). I am currently messing around with the FREE synchronization program called SyncFolders; that, so far in my testing, could end up being my default (go to) backup software for my computers here at home. If you are interested in giving SyncFolders a try, the source link is reflected below. SyncFolders is also available as a portable app.

SyncFolders

SyncFolders main window...

Features of SyncFolders

  • Supports two-way synchronization of files and folders.
  • Can easily be used as backup tool.
  • Shows a preview before the actual synchronization takes place. You can override actions if desired.
  • Detects conflicts or file collisions when a file has changed in both locations since the last sync operation. Therefore, SyncFolders tracks file modifications and deletions in a local database.
  • Propagates deletions and detects file renames.
  • File comparison by date and size or by content.
  • Default actions can be defined in case of synchronization conflicts.
  • Integrates with Windows’ Task Scheduler to support scheduled synchronizations.
  • Supports file and folder filters.
  • Can handle long file names and files of any size.
  • Synchronization from or to UNC paths is supported.
  • Supports multiple synchronization rules in a single rules file.
  • Deleted or overwritten files can be moved to the recycle bin or to a time-stamped history folder.
  • History files can be deleted after a user-defined period.
  • Unlimited number of files.
  • Synchronization from command line.
  • Can ignore one-hour timestamp differences caused by DST switch for synchronization to FAT file systems.
  • Easy-to-use.
  • Unrestricted freeware.
  • No spyware, adware or malware.
  • Portable, although .NET Framework is required.

AxCrypt – File Security Made Easy

February 17, 2017

If you are concerned about file (and folder) security, AxCrypt 2.0 is good choice in protecting what matters to you. In addition to the full install version, there is a portable version, as well as, a mobile app (for Android and iOS).

AxCrypt works as a separate program in it’s own window, but it’s also fully integrated into the Windows Explorer – the part of Windows where you browse your folders and files. Here is a quick video tutorial on how to use the basic functions of AxCrypt 2.0.

AxCrypt is a simple file encryption software for Windows. It integrates seamlessly with your workflow to encrypt, decrypt, store, send and work with files.

New and Updated Features

  • 256 bit encryption
  • Mobile App for iOS
  • Mobile App for Android
  • Passwordless sharing
  • Portable app for Windows
  • Secured Folders
  • Cloud Service Awareness
  • Password Manager
  • Single sign in for encryption / decryption

Source: AxCrypt – File Security Made Easy