This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
Member Avatar
+0 forum 2

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
Member Avatar
+0 forum 26

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
Member Avatar
+0 forum 1

Which is the most reliable free antivirus for USB flash drives that resides and runs from the device itself and doesn't need to be installed on the computer?

Member Avatar
Member Avatar
+0 forum 5

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

Hi Friends, Upon a recommendation I have installed Advanced System Care 93. It seems to be doing what it claims. I have not yet paid anything to upgrade but wonder if this is just another 'cash cow'? Anyone got any advice on ASC 93 please?

Member Avatar
Member Avatar
+0 forum 1

Be careful gamers http://arstechnica.com/security/2016/07/fake-pokemon-go-app-on-google-play-infects-phones-with-screenlocker/

Member Avatar
Member Avatar
+1 forum 2

Earlier last year, I bought the Acer Aspire E-16 START with a windows 8 operating system, I was using the lastest Kapersky 2015 which worked perfectly with the OS, Ever since I upgraded to windows 10 OS via the internet , Old files of Kapersky application were not executable, Luckily, I still have the Kapersky driver CD, I tried to redownload the set up but it fails when running, I tried on several occasions but Kapersky won't work on my Windows 10 OS. Presently I don't have any antivirus,I know Kapersky is the best A/V out there. Please guys do …

Member Avatar
Member Avatar
+0 forum 1

Help held to $700.00 ransom for file recovery.

Member Avatar
Member Avatar
+0 forum 1

Hi guys, something a little strange has happened. While I browsed to google.co.uk home page I've seen a message flashing on the top left of the screen, it flashed literally for about half a second and after ctrl+f5 numerous times I managed to get a screenshot and it says "Online Security this site has no rating". I saw that message in windows chrome, I'm logged in, I haven't checked in Ubuntu, but it is definitely the first time I saw it. I'm running a scan with malaware byte just in case, and a google search for that hasn't really revealed …

Member Avatar
Member Avatar
+0 forum 6

HI There is many method to bypass Antivirus detection! The Best way is writing your own toolsespecailly using python language. My question is How to protect your self againt PE portable excuteble and how we make Antivirus to detect for example metasploit payloads? I will appriciate for yur help

Member Avatar
Member Avatar
+0 forum 3

CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This time the message is different and more filenames had been added to the list. Also users have to fork out $700 for the decryption key which makes it a hefty price to pay. Firstly the Pony Information Stealer scrapes the computer of usernames and passwords by scouring the victims computer. …

Member Avatar
+0 forum 0

You all should raise your guard! CryptoWall 4.0 has been released and analysed by Nathan Scott: http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/

Member Avatar
Member Avatar
+0 forum 1

I havent been here for a long time, my son got his hands in my laptop and now its really messed up with a lot of stuff, was looking for the old "Read me first before requesting help" sticky but cant find it anywhere, Could anyone give me the list of programs needed to post the logs?

Member Avatar
Member Avatar
+0 forum 2

Had anyone else problems with this add on. Seems to be almost impossible to get rid of it

Member Avatar
Member Avatar
+0 forum 4

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of security software such as real-time malware scanners and firewalls. Truth 2 - when it comes to malware there is no single 'removes it all' solution, there are far too many malware variations out there from rootkits and zero-day exploits through to long-established malware families which are continuously evolving in order …

Member Avatar
Member Avatar
+5 forum 23

My friends website got hacked by the Sole Sad & Invisible malware. I'm not sure how or where to go to find how to remove / clean all the files and was wondering if any might be able to point me in the right direction.

Member Avatar
Member Avatar
+0 forum 2

![malware.JPG](/attachments/small/3/ecdb0eff0540a2768235d4e2ba8ed791.JPG "align-left") Good day, I have been experiencing such problems. An error message keeps on reappearing on my PC saying that AVAST has blocked a harmful website(I have uploaded a picture of the error message). I ran all my antivirus software and are saying that no threat detected but the eeror is still there. I am thinking of deleting the file but when I searched about it, it sats that it shouldn't. Can anyone help and clear my thought about this....

Member Avatar
Member Avatar
+0 forum 5

A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for stuff which was effectively hidden in plain sight that way. That way being the use of something called steganography, from the Greek steganos which means covered and graphie which means writing; so literally covered writing. I used it to good effect during my period as an explorer of networks belonging …

Member Avatar
Member Avatar
+3 forum 1

I got infected right after a Java and Adobe update on my Windows7 machine. folder \jnihmpibahpjjmcodbopcpdaelkbpjnc is most likely a random generated folder. Note on malware **PriceLess** (pops up as Chrome extension, highlights strings for ads): PriceLess is in folders: C:\Users\HomeGroupUser$\AppData\Local\Chromatic Browser\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Comodo\Dragon\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Google\Chrome\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 C:\Users\HomeGroupUser$\AppData\Local\Torch\User Data\Default\Extensions\jnihmpibahpjjmcodbopcpdaelkbpjnc\5.2 go down to /Extensions each and delete folder \jnihmpibahpjjmcodbopcpdaelkbpjnc do the same for folders: C:\Users\Guest\AppData\Local\Chromatic Browser\User Data\Default\Extensions C:\Users\Guest\AppData\Local\Comodo\Dragon\User Data\Default\Extensions C:\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions C:\Users\Guest\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions C:\Users\Guest\AppData\Local\Torch\User Data\Default\Extensions also do the same for folders: C:\Users\Administrator\AppData\Local\Chromatic Browser\User Data\Default\Extensions C:\Users\Administrator\AppData\Local\Comodo\Dragon\User Data\Default\Extensions C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions C:\Users\Administrator\AppData\Local\Google\Chrome SxS\User Data\Default\Extensions C:\Users\Administrator\AppData\Local\Torch\User Data\Default\Extensions in each case remove …

Member Avatar
Member Avatar
+1 forum 18

It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of this. The lion's share being split pretty evenly between European and North American users. So I was interested to spot this Tweet from Ronnie T [@iHeartMalware](https://twitter.com/iheartmalware) who is actually Ronnie Tokazowski, a senior researcher at PhishMe, which declares: "I'm tired of dumping #Dyre configurations by hand. So I wrote a …

Member Avatar
Member Avatar
+1 forum 4

Researchers at security company AppRiver have issued a [warning](http://blog.appriver.com/2015/06/amazon-based-malware-targets-crypto-currency/) regarding a variant of the Fareit malware family which is using fake Amazon purchase confirmation emails to inject itself and steal any type of crypto currency that can be found on the target machine. ![amazonmalware.jpg](/attachments/large/0/4ed9d9dbe506fcd950aef08620e1e144.jpg "align-center") Troy Gill, manager of security research at AppRiver, details how his team have been monitoring, and blocking, what he describes as a stream of malicious emails during the last week. All posing as legitimate Amazon purchase confirmations, all stating that 'your order has been confirmed’ and all directing the reader to the attached, and infected, …

Member Avatar
+1 forum 0

While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes for use with a BlackCoffee malware variant. This method of hiding in plain sight is nothing new, but it can make detection problematical as the data (especially within a technical forum such as TechNet) is simply 'lost' in a sea of similar code from genuine users of a well respected …

Member Avatar
+1 forum 0

Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i need to pay a certain amount of money for them to give the decryption key. i already tried using some decrypter tools that i found and also tried uploading it to decryptcryptolocker.com in hopes that it can still be decrypt , i already scan the computer using a bootable antivirus, …

Member Avatar
Member Avatar
+0 forum 4

Hi , my computer was running slow , acting weird , getting pop ups , etc . I ran an anti spy , malwarebytes , & my virus scan ... Overkill yes but thecomputer is now clean . Problem is I not only lost the viruses / spyware , I Also lost my internet connection . I tried Firefox & win ie but nothing . My WiFi is workin on everything else just this computer has no connection immedeiately following the removal off the files found on my scans . Please help me get this fixed if there is a …

Member Avatar
Member Avatar
+0 forum 12

As with any online service that starts to get popular traction and experiences rapid growth, social network come micro-blog platform Tumblr has been the target of just about every kind of scam and attempted cyber-criminal subversion out there [inclduing some of its own making](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/459258/tumblr-warns-users-to-change-password-after-security-mess). Most of the time it's not worth reporting on these as they fall into the 'same old, same old' category, and if we did then DaniWeb would be so awash with scam warnings that every other posting would be drowned into obscurity. However, this one is worthy of our attention. Not least as it seems to …

Member Avatar
Member Avatar
+0 forum 4

I don't usually write about acquisitions and all that financial stuff, but news that PayPal has acquired CyActive caught my eye as apparently this brings the promise of 'bio-inspired predictive security' into the online payments provider threat protection mix. Which made me think, just what the heck is bio-inspired predictive security when it's at home, and why has PayPal bought into it? ![cyactive.jpg](/attachments/large/0/262c724e7b79e730b40c8e9772dd6fb5.jpg "align-center") My first port of call in trying to get a line on this was the [official PayPal blog posting](https://www.paypal-community.com/t5/PayPal-Forward/PayPal-Establishes-New-Security-Center/ba-p/956298) on the thing. "While we have industry-leading fraud models and verification techniques, and a world-class security team" …

Member Avatar
+2 forum 0

An increasing number of my acquaintances seem to be in the habit of buying cheap Android smartphones when in China on business and, increasingly, from online auction sites. More often than not these will be clones of flagship models but without the flagship price tag; however, cheap is not always cheerful. I've seen some of these devices with their look-alike operating systems and their flimsy construction, and given a quick once over have to say I wouldn't trust them with my calls, texts and data. That level of mistrust appears to be well founded, not least because it would seem …

Member Avatar
Member Avatar
+1 forum 2

Google has been quick to blacklist domains implicated, most often unwittingly, in the distribution of what has become known as the SoakSoak malware campaign courtesy of soaksoak.ru being the first domain in the redirection path it used. With 11,000 domains blocked over the weekend, you might be forgiven for thinking that it's another WordPress hosting sites security problem sorted before it can do any harm. However, most experts I have spoken to would seem to agree that 11,000 domains is just the tip of this particular iceberg and the actual number of soaksoak impacts on WordPress specific sites is in …

Member Avatar
+2 forum 0

Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in from using readily available malware purchased within the dark market. Kaspersky Lab researchers have been doing the math, and their figures suggest that when comparing the cost of the most common hacker tools with the cold cash stolen using them the profit is around 20 times greater than the outlay. …

Member Avatar
+2 forum 0

The End.