malware

Mon
17
Sep
Dennis Faas's picture

Explained: Is Ransomware a Real Threat? Should I worry?

Infopackets Reader Tina A. writes: " Dear Dennis, I've been reading articles on the Internet about cyber criminals breaking into computer networks, encrypting files and then demanding a ransom. I've also read that if I leave my computer connected to ... the Internet, I could be susceptible to ransomware. I don't know what to believe. So my question is: is ransomware a threat? Is ransomware malware? Should I be worried? " My response: This is a pretty big question to answer. The simple answer is that: yes , ransomware is a threat, and yes you can get infected with ransomware just by having your ... (view more)

Mon
10
Sep
Dennis Faas's picture

Explained: If I Reset Windows 10 will it Remove Malware?

Infopackets Reader Abdul M. writes: " Dear Dennis, A few weeks ago my computer gave me a warning message that I was infected with virus and that I needed to call 1 800 208 0798 to fix the problem. The man I spoke to had an Indian accent and said he ... was from Microsoft. He then connected to my computer and removed the virus, then demanded $199 payment which I paid. He then forwarded me to another security specialist, who examined my system and said that my firewall was broken and it would cost another $350 to fix it. If I didn't pay it, he said hackers would attack my computer . At this point I ... (view more)

Mon
20
Aug
Dennis Faas's picture

Samsung: Smartphones Most Secure for Cryptocurrencies

Samsung Provokes Debate with Claims that Smartphones Are The Most Secure for Cryptocurrencies Last month, leading Samsung author Joel Snyder penned a blog post in which he made the bold assertion that smartphones encompass the best security for ... owning, trading and managing cryptocurrency. He put this down to the Trusted Execution Environments (TEEs) in which smartphones, and particularly those developed by Samsung, operate. A trusted execution environment (TEE) is a secure area of a processor found on smartphones (not PCs), originally developed in 2010 by Open Mobile Terminal Platform ... (view more)

Mon
30
Jul
Dennis Faas's picture

Best Anti Ransomware Software Free - 5 Steps

Infopackets Reader Kevin L. writes: " Dear Dennis, I have been researching the best anti ransomware software for 2018 and came across your website. I was wondering if you had any recommendations? While searching for the best anti ransomware software ... (free), many websites have their own opinion on what anti ransomware software is the best, but most require a paid subscription. What is your opinion on the best anti ransomware software for PCs? " My response: I've answered this question in depth before (in a round about way) with my guide on How to Prevent Ransomware in 2018 - 10 Steps . This ... (view more)

Mon
11
Jun
Dennis Faas's picture

How to Fix: Computer / Network Infected with Ransomware (10 Steps)

Infopackets Reader Robert S. writes: " Dear Dennis, I have a network of computers I use for accounting purposes. Suddenly, many of my desktop icons started appearing to have strange names, such as ... '1HjgN1BdTZE3OIqorcj2E5b6CXIE=gdFae89IWgo0RrVfPbCHt851oogccs.ssimpotashka[at]gmail.com'. When I try to open these files, Windows warns me the file may be malicious. When I look in my Documents folder, I see more files similarly named to the one I just mentioned. Some of my .PDF files won't even open. On the desktop there is a text document that says ' HOW TO DECRYPT YOUR FILES.TXT ' - when I open ... (view more)

Thu
05
Apr
John Lister's picture

Chrome Browser PC Scans Come As Surprise

Google Chrome users have been surprised to discover that the Chrome browser scans their computers in search of malware. It doesn't appear to be a reason to panic, but arguably Google could have been more up front about it. The scans were spotted by ... Kelly Shortidge who works at a cyber security company. She noticed that the chrome.exe executable file (which is visible in Windows Task Manager) was scanning files in her Windows documents folder. On further investigation, she discovered Chrome has been doing this since around October, 2017. The scans are being done through Chrome Cleanup, a tool ... (view more)

Thu
29
Mar
John Lister's picture

Billion Dollar Cyber Crime Chief Finally Caught

A man has been arrested for allegedly stealing more than a billion dollars in cyber attacks. The tactics were so outlandish, they almost sounded like the words used by Richard Pryor's character in Superman III. The unnamed man was arrested in Spain ... after an investigation that involved officials from six countries on three continents plus private cyber security firms. The man is alleged to have led a gang that attacked more than 100 banks and other financial institutions around the world. The gang has been operating for at least three years using three forms of malware, known as Anunak, ... (view more)

Thu
22
Mar
John Lister's picture

US Blamed for Sophisticated Router Malware

Last week security researchers said a piece of malware named "Slingshot" was so sophisticated it was backed by a government. Now it appears that government was the United States and that the revelations may have compromised an anti-terror campaign. ... The original reports didn't name the country involved. That might not quell controversy, however the reports came from Kaspersky Labs, a security company based in Russia. Slingshot exploited a bug in a specific brand of routers. In simple terms, it was able to take advantage of the way the router updated its operating software on an ... (view more)

Tue
13
Mar
John Lister's picture

Infected Routers Spread Malware, Log Keystrokes

A security firm says malware that targets routers is so sophisticated it's highly likely a government is behind it. Dubbed "Slingshot," the malware appears to have been working for six years without detection. The attack was on a specific brand of ... routers, namely Mikrotik. Although based in Latvia, its products have shipped around the world to business and home users. The big problem was with an associated piece of software named Winbox, used to manage the router. The way Winbox works involves taking DLL files stored on the router itself and running them directly in the computer's ... (view more)

Wed
21
Feb
John Lister's picture

Microsoft Details Anti-Malware Cloud-Based System

Microsoft says it used artificial intelligence to not only spot and identify and attempted malware attack, but to block it more than a thousand times in the next half hour. It says the defense was possible thanks to Windows Defender being used ... locally on the victim's computer, as well analyzing the snippet of code using cloud-based antimalware. The company calls it an example of machine learning. This means computers are able to figure things out for themselves, rather than simply following 'true or false' routines that are part of a program. Similar to antivirus, the most basic level of anti ... (view more)

Pages

Subscribe to RSS - malware