November 30, 2016
Gooligan is a new malware campaign that has been engineered to infect Android phones by stealing your Google Account Credentials. Anyone who owns a device running Android 4 and 5 that includes Android Jelly Bean, KitKat, and Lollipop — is most at risk The infection typically occurs via Gooligan infected apps or links in phishing email messages. Once infected, attackers are able to gain access to your sensitive information from Google apps, like Gmail, Drive, Photos, etc… Once attackers hack into the device, they’re buying apps on the Google Play store and writing reviews posing as the phone’s owners. To get the skinny on Googligan please read this article, “More Than 1 Million Google Accounts Breached by Gooligan” at a site called Checkpoint.
To determine if your account has been compromised, go to Checkpoint’s “Gooligan Checker” and enter your Gmail address…
November 26, 2016
Malwarebytes Junkware Removal Tool is a portable tool that removes all traces of Adware, Potentially Unwanted Programs, Toolbars, Crapware from Windows PC. This tool is a portable app (just download and run). Read more about how to use this tool (see source link below).
Source: Malwarebytes Junkware Removal Tool removes Adware and PUPs
June 28, 2016
If you are an IT Professional I think you will appreciate the site called SecurityXploded. They feature a smorgasbord of password dump tools, system security tools, network security tools, anti-spyware tools, and online security tools.
234 tools at this time, to be exact… Check out their current listing of tools HERE
SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.
June 18, 2016
There are occasions where we need to safeguard a file or a folder that contains sensitive information. This is especially true if you are storing the files online. The program that I use on a regular basis to accomplish this is EncryptOnClick (by 2BrightSparks). EncryptOnClick meets four of my conditions when it comes to encryption software:
- It is not here today and gone tomorrow. I have been using this program going on 5 years (or more) and it continues to be improved and up-to-date with changes in the operating system;
- It is very easy to use. Many encryption programs can be difficult to understand and navigate. EncryptOnClick is not one of them;
- It can be made portable to carry around on my flashdrive (or stored online for quick download). This is important since I use EncryptOnClick as my main encryption program (at home and at work);
- It is a very secure method of encryption (256-bit AES encryption) that is password protected. The encryption file result is also compressed to make the file smaller.
June 8, 2016
I recently featured the AnVir Task Manager here on the blog and can’t say enough about its’ usefulness. If you are a tech or someone who assists other’s with their Windows based computers I highly recommend you download the portable version of this application. To explain everything that this program can do (and monitor) I have posted below a link to a tutorial video. This program has many, many features and will even serve as a level of protection for your computer to protect you from malware and viruses. Anvir Task Manager goes over and above any task managers that I know of.
CLICK HERE to see an extensive Overview Video
June 7, 2016
At times I think we are getting to comfortable with storing our personal files in the cloud; whether be Dropbox, GDrive, OneDrive, etc… Once those files leave your PC they are out there and in essence will always be out there (even if you delete them). A level of protection to look at that I found at I Love Free Software is Cryptomator.
I Love Free Software provides a very nice (and brief) tutorial on how to set up Cryptomator to ultimately encrypt the files you are syncing with Dropbox; however, as pointed out, this process will work with many of the online cloud drive providers.
HOW TO AUTO ENCRYPT FILES
BEFORE UPLOADING THEM TO DROPBOX
June 6, 2016
Hardly a week goes by anymore that I don’t run into someone (or assist someone) that is experiencing a malware infection of some magnitude on their computers. I typically do not commit myself to removing these infections anymore due to the time element (many hours) involved in researching the issue, gathering (and updating) the necessary removal tools, and actually attempting to remove the infection. Removing a malware infection can be frustrating and in the end it is even questionable (after an infection) whether it is completely removed. In the end, probably the best tool to have around is your OS recovery disks.
If you are someone that does provide a service for removing malware, a tool to consider (that is portable), in your tech toolbox, is the Emsisoft Emergency Kit.
The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner and Emsisoft Command-line Scanner.
I downloaded the kit (approx. 233mb) and launched the “Start Emergency Kit Scanner.exe”; peformed and updated the malware signature database files; and, performed a scan. What I found is that it is pretty easy to use; however, I am not sure of the how powerful the scanner is in comparison to the competitors. If you are familiar with this kit, please feel free to let us know your experiences with it. I like the idea it is portable, can be used in safe mode (or from a recovery environment) and can be run from the command-line in order to remove a particularly stubborn infection. Many malware infections will overtake your computer to the point that you may not be able to run, update and/or install malware removal software; thus, the portability of this kit and other outside the box options are a plus.
Emsisoft Emergency Kit