files

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Mon
22
Oct
John Lister's picture

Windows 10 Hit By Second File Deletion Bug

Another file deletion bug appears to have hit Windows 10's latest update. It's raised questions about Microsoft's review process. This is a separate issue to the recent bug that deleted user documents . The new problem - which is also related to the ... October Update - affects .ZIP files. ZIP files are used to store multiple files (and sometimes backups) into a single, archived file. Archives usually offer a high compression ratio, which means files inside the archive are shrunk. This makes .ZIP files especially useful for downloading files from websites because it takes less time. Duplicate ... (view more)

Tue
16
Oct
John Lister's picture

Windows 10 October Update Deletes User Documents

Microsoft has fixed a problem with a Windows 10 update that inadvertently deleted user documents. Oddly the problem had been highlighted in early testing, but doesn't seem to have been fixed. The issue received widespread attention when the October ... 2018 Update started rolling out to the wider public. That's the second of the two big annual updates that bring new features to Windows 10, a system that replaces the old set-up of having service packs rolled out every few years. Some users discovered that after the update, everything they had stored in their Documents folders had disappeared. Some ... (view more)

Mon
17
Sep
Dennis Faas's picture

Explained: Is Ransomware a Real Threat? Should I worry?

Infopackets Reader Tina A. writes: " Dear Dennis, I've been reading articles on the Internet about cyber criminals breaking into computer networks, encrypting files and then demanding a ransom. I've also read that if I leave my computer connected to ... the Internet, I could be susceptible to ransomware. I don't know what to believe. So my question is: is ransomware a threat? Is ransomware malware? Should I be worried? " My response: This is a pretty big question to answer. The simple answer is that: yes , ransomware is a threat, and yes you can get infected with ransomware just by having your ... (view more)

Mon
13
Aug
Dennis Faas's picture

How to Fix: WD My Book Read Only (Remove Write Protect)

Infopackets Reader Larry O. writes: " Dear Dennis, I don't know what's going on but all my files on my external western digital 'My Book' are marked as ' READ ONLY '. I have tried formatting the My Book drive using File Explorer, but it tells me the ... drive is write protected. I have looked but there is no tab or switch on the USB drive to unlock or disable the write protect . I have also tried formatting the drive with Windows Disk Management but it fails. Also, if I right click the drive partition in Disk Management, the delete option is missing. I am at a complete loss. I have searched for ' ... (view more)

Wed
11
Apr
John Lister's picture

New Ransomware Demand: Play Video Game, Not Cash

A newly unleashed ransomware attack doesn't force victims to pay money to regain access to files. Instead, it demands they play a video game. It's not clear yet what the point of the attack is, though it's most likely the work of a prankster who ... wants to test their skills at creating and distributing ransomware without doing any permanent harm. Ransomware is a form of malware that encrypts files on a computer and normally only unlocks them if the victim pays a fee. In most cases every file on the computer is encrypted, meaning that victims are locked out of their systems and unable to access ... (view more)

Thu
05
Apr
John Lister's picture

Chrome Browser PC Scans Come As Surprise

Google Chrome users have been surprised to discover that the Chrome browser scans their computers in search of malware. It doesn't appear to be a reason to panic, but arguably Google could have been more up front about it. The scans were spotted by ... Kelly Shortidge who works at a cyber security company. She noticed that the chrome.exe executable file (which is visible in Windows Task Manager) was scanning files in her Windows documents folder. On further investigation, she discovered Chrome has been doing this since around October, 2017. The scans are being done through Chrome Cleanup, a tool ... (view more)

Tue
13
Mar
John Lister's picture

Infected Routers Spread Malware, Log Keystrokes

A security firm says malware that targets routers is so sophisticated it's highly likely a government is behind it. Dubbed "Slingshot," the malware appears to have been working for six years without detection. The attack was on a specific brand of ... routers, namely Mikrotik. Although based in Latvia, its products have shipped around the world to business and home users. The big problem was with an associated piece of software named Winbox, used to manage the router. The way Winbox works involves taking DLL files stored on the router itself and running them directly in the computer's ... (view more)

Mon
22
Jan
Dennis Faas's picture

How to Fix: 'Access Denied' Folder on Mounted VMWare Virtual Disk

Infopackets Reader Ted G. writes: " Dear Dennis, Thank you for your pearls of wisdom! I have a question regarding VMWare Workstation . I recently virtualized a friend's PC which was facing numerous blue screens - I suspect his PC has a hardware ... error. After virtualizing the machine I mapped his drive in Windows Explorer; when I try to access c:\users\jim (his user folder), Windows keeps giving me an ' Access denied ' error. There does not seem to be any way to access his files using this method. For the record I have tried copying the files by networking his virtual machine to mine but it is ... (view more)

Tue
16
May
John Lister's picture

WannaCry Ransomware Worm: What You Need to Know

Beginning Friday, May 12, 2017, reports surfaced of a new Internet worm capable of infecting Windows machines instantaneously. The worm has been dubbed "WCRY" or "WannaCry" because of its malicious intent to install ransomware on the target machine. ... The Internet worm was made possible because of a leaked NSA (national security agency) document which essentially explained how to carry out the exploit. In this case, the malicious software locks computers such that their files are encrypted and cannot be accessed unless the victim pays a ransom (and the culprits then stand by ... (view more)

Pages

Subscribe to RSS - files