Member Avatar
Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/
by Itsdigger 18 in Information Security ()
Member Avatar
Hi Friends, Upon a recommendation I have installed Advanced System Care 93. It seems to be doing what it claims. I have not yet paid anything to upgrade but wonder if this is just another 'cash cow'? Anyone got any advice on ASC 93 please?
by tez in Information Security ()
Member Avatar
Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, …
by owok2002 in Information Security ()
Member Avatar
Member Avatar
Hi guys, something a little strange has happened. While I browsed to google.co.uk home page I've seen a message flashing on the top left of the screen, it flashed literally for about half a second and after ctrl+f5 numerous times I managed to get a screenshot and it says "Online …
by Violet_82 35 in Information Security ()
Member Avatar
HI There is many method to bypass Antivirus detection! The Best way is writing your own toolsespecailly using python language. My question is How to protect your self againt PE portable excuteble and how we make Antivirus to detect for example metasploit payloads? I will appriciate for yur help
by tony75 10 in Information Security ()
Member Avatar
CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This …
by IntegratedTweak 16 in Information Security ()
Member Avatar
You all should raise your guard! CryptoWall 4.0 has been released and analysed by Nathan Scott: http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/
by IntegratedTweak 16 in Information Security ()
Member Avatar
I havent been here for a long time, my son got his hands in my laptop and now its really messed up with a lot of stuff, was looking for the old "Read me first before requesting help" sticky but cant find it anywhere, Could anyone give me the list …
by jackraf27 in Information Security ()
Member Avatar
Had anyone else problems with this add on. Seems to be almost impossible to get rid of it
by Minimalist 54 in Information Security ()
Member Avatar
There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of …
by happygeek 1,655 in Microsoft Windows ()
Member Avatar
My friends website got hacked by the Sole Sad & Invisible malware. I'm not sure how or where to go to find how to remove / clean all the files and was wondering if any might be able to point me in the right direction.
by joeywheels 3 in Information Security ()
Member Avatar
![malware.JPG](/attachments/small/3/ecdb0eff0540a2768235d4e2ba8ed791.JPG "align-left") Good day, I have been experiencing such problems. An error message keeps on reappearing on my PC saying that AVAST has blocked a harmful website(I have uploaded a picture of the error message). I ran all my antivirus software and are saying that no threat detected but the …
by akasekaihime -6 in Information Security ()
Member Avatar
A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for …
by happygeek 1,655 in Information Security ()
Member Avatar
I got infected right after a Java and Adobe update on my Windows7 machine. folder \jnihmpibahpjjmcodbopcpdaelkbpjnc is most likely a random generated folder. Note on malware **PriceLess** (pops up as Chrome extension, highlights strings for ads): PriceLess is in folders: C:\Users\HomeGroupUser$\AppData\Local\Chromatic Browser\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Google\Chrome\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 …
by sneekula 969 in Information Security ()
Member Avatar
It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of …
by happygeek 1,655 in Software Development ()
Member Avatar
Researchers at security company AppRiver have issued a [warning](http://blog.appriver.com/2015/06/amazon-based-malware-targets-crypto-currency/) regarding a variant of the Fareit malware family which is using fake Amazon purchase confirmation emails to inject itself and steal any type of crypto currency that can be found on the target machine. ![amazonmalware.jpg](/attachments/large/0/4ed9d9dbe506fcd950aef08620e1e144.jpg "align-center") Troy Gill, manager of security …
by happygeek 1,655 in Community Center ()
Member Avatar
While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes …
by happygeek 1,655 in Software Development ()
Member Avatar
Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i …
by ehpratah 48 in Information Security ()
Member Avatar
Hi , my computer was running slow , acting weird , getting pop ups , etc . I ran an anti spy , malwarebytes , & my virus scan ... Overkill yes but thecomputer is now clean . Problem is I not only lost the viruses / spyware , I …
by William_10 in Information Security ()
Member Avatar
As with any online service that starts to get popular traction and experiences rapid growth, social network come micro-blog platform Tumblr has been the target of just about every kind of scam and attempted cyber-criminal subversion out there [inclduing some of its own making](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/459258/tumblr-warns-users-to-change-password-after-security-mess). Most of the time it's not …
by happygeek 1,655 in Digital Marketing ()
Member Avatar
I don't usually write about acquisitions and all that financial stuff, but news that PayPal has acquired CyActive caught my eye as apparently this brings the promise of 'bio-inspired predictive security' into the online payments provider threat protection mix. Which made me think, just what the heck is bio-inspired predictive …
by happygeek 1,655 in Digital Marketing ()
Member Avatar
An increasing number of my acquaintances seem to be in the habit of buying cheap Android smartphones when in China on business and, increasingly, from online auction sites. More often than not these will be clones of flagship models but without the flagship price tag; however, cheap is not always …
by happygeek 1,655 in Mobile and Wearables ()
Member Avatar
Google has been quick to blacklist domains implicated, most often unwittingly, in the distribution of what has become known as the SoakSoak malware campaign courtesy of soaksoak.ru being the first domain in the redirection path it used. With 11,000 domains blocked over the weekend, you might be forgiven for thinking …
by happygeek 1,655 in Web Development ()
Member Avatar
Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in …
by happygeek 1,655 in Information Security ()
Member Avatar
More often than not I'll be writing about the security problems facing Windows XP users, such as when I recently reported how a large number of enterprises are still running XP SP2 machines which will shortly [URL="http://www.daniweb.com/news/story287954.html"]stop being supported by Microsoft[/URL] in terms of security updates, hotfixes and the like. …
by happygeek 1,655 in Microsoft Windows ()
Member Avatar
Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as …
by happygeek 1,655 in Information Security ()
Member Avatar
Goodwill Industries International, a network of 165 community-based agencies in North America, has been breached. This follows a previous announcement of a potential attack back in July. After an extensive forensic investigation lasting a month, Goodwill has now [confirmed](http://www.goodwill.org/press-releases/goodwill-provides-update-on-data-security-issue/) that "a third-party vendor’s systems" were indeed "attacked by malware, enabling …
by happygeek 1,655 in Digital Marketing ()
Member Avatar
Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive target; …
by happygeek 1,655 in Mobile and Wearables ()
Member Avatar
Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …
by happygeek 1,655 in Information Security ()