Archive | Uncategorized RSS for this section

Now Accepting New Experienced Freelance Writers for Computer Security Blog

Hi there!

Have a passion to write about computer security? Does forensics intrigue you? What do you like when exploring in the security world?

If our purpose in this blog satisfies you, and you’d like to get more writing skills, please contact us today! Please include your full name, WP username (if you have one), and other pertinent information.

Note: This is NOT a paid position. It rather is a partner position, where you will be helping lead this security blog into the future to inform others about cybersecurity.

We do appreciate any and all help.

This position expires 3/31/13

Five Ways to Secure a Web Browser for a Tablet

It is important to secure your tablet’s web browser before you go internet surfing. Here are five ways to do it…

  1. Use a secured wireless network for WiFi or 3G/4G connection. Using unencrypted wireless networks are very insecure and can be a way for hackers and other threats to happen to your device.
  2. Use a Virtual Private Network (VPN). VPNs are available through your mobile service provider (if you have one, like 3G/4G access). They provide an extra layer of protection (sometimes multiple layers of encryption) to secure your web browsing.
  3. Keep the OS and apps up-to-date. Check for updates at least twice a week for the OS and apps. System upgrades provide multiple security and functionality updates. It’s good to keep apps up-to-date to avoid security exploits.
  4. Only download from trusted sources. If it looks bad, it probably is. Stick to trusted apps stores such as Apple App Store, Google Play, Amazon: App Store.
  5. Have a good secure plan. Use a pin code or passphrase to secure access. It’s important to use adequate mobile protection. Because hackers and virus makers are always crafting new threats. Monitoring the latest security threats is a great idea as well, to know how to stay protected from them also.

DNSChanger cleanup investigated

This is the description of an attack happening in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, which affected 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems.

We will show how cybercriminals exploited an under-the-radar vulnerability which affected thousands of outdated DSL modems across the country. This enabled the attack to reach network devices belonging to millions of individual and business users, spreading malware and engineering malicious redirects over the course of several months. The scenario was fuelled by the widespread neglect of ISPs, blunders from hardware manufacturers, under-educated users and official apathy.

If you think the task of cleaning up victims of the DNS Changer malware was a big challenge, imagine what it would be like to deal with 4.5 million modems compromised in this attack – all of them in sunny, beautiful Brazil.

Read more by Kaspersky Lab

 

Kaspersky Internet Security 2012

Symantec’s New Chairman: Steve Bennett

Symantec (NASDAQ:SYMC) today announced that Enrique Salem, president and chief executive officer (CEO), has stepped down effective immediately and Symantec’s board of directors has appointed Steve Bennett president and chief executive officer, in addition to his continued role as chairman of the board.

About Steve Bennett

Steve Bennett joined Symantec’s board of directors in February 2010 and became chairman in 2011. Bennett previously led Intuit serving as president and chief executive officer from 2000 to 2007. At Intuit, Bennett combined the company’s historic innovative and customer-driven expertise with strategic and operational rigor. Intuit revenue grew to $2.7 billion in fiscal 2007 from less than $1 billion in fiscal 2000. Under Bennett’s leadership Intuit grew its existing businesses while simultaneously expanding into new markets, such as online banking and healthcare.

Read more on the Press Release from Symantec

Mitt Romney to Ban Porn?

Mitt Romney has taken on a view to potentially ban ‘as much porn as he can’ in a new tactic that will not bring him much popularity.

According to The Daily Caller, Romney’s foreign and legal policy director, Alex Wong, personally assured former Justice Department porn prosecutors Patrick Truman and Bob Flores, that a Presidential Romney would go after porn peddlers with a pitchfork. “Wong assured us that Romney is very concerned with this, and that if he’s elected these laws will be enforced,” Trueman told The Daily Caller. ”They promised to vigorously enforce federal adult obscenity laws.”

The Utah Attorney General’s website states interesting data:

“Many people believe material must be legal if it is available in their community such as at a store, on television or on the radio. This belief is false. The mere fact that the material is available does not mean it is legal, but law enforcement cannot seize suspected pornographic material without a court order… Citizen complaints are crucial for prosecutions to occur.”

The apparent collapse of porn, especially in British countries, is continuing in different parts around the world.

How to remove Windows Virtual Firewall and Windows Premium Defender

Two similar rogue antivirus programs were released recently from the FakeVimes family.

Windows Virtual Firewall and Windows Premium Defender

Serial code:  0W000-000B0-00T00-E0020

Screenshots of Windows Premium Defender (click to enlarge)

 

 

 

 

 

 

Screenshots of Windows Virtual Firewall (click to enlarge)

 

 

 

 

 

 

How to remove this rogue

STEP 1 – First tasks

  • It is possible that this rogue prevents you from downloading anything, so please transfer any files necessary to remove this infection from a clean computer, using a flash/usb storage drive, CD/DVD, etc.
  • If it becomes impossible to remove this rogue or follow any steps below, immediately skip to STEP 4
  • Please download and run RKill.Download mirror 1Download mirror 2Download mirror 3
    • Save it to your Desktop.
    • Double click the RKill desktop icon.
    • It will quickly run and launch a log. If it does not launch a log, try another download link until it does.
    • Please post its log in your next reply.
    • After it has run successfully, delete RKill.

    Note: This tool only kills the active infection, the actual infection will not be gone. Once you reboot the infection will be active again! Please do not reboot until after STEP 3.

STEP 2 – Clean rogue files

Download TFC by OldTimer to your desktop

  • Please double-click TFC.exe to run it. (Note: If you are running on Vista or 7, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it’s finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.

STEP 3 – Malwarebytes’ Anti-Malware

Please download Malwarebytes Anti-Malware from Download.CNET.com.
Alternate link: BleepingComputer.com.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select “Perform Quick Scan“, then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If you are prompted to restart, please allow it to restart your computer. Failure to do this, will cause the infection to still be active on the computer.

STEP 4 – Infection gone?

Check to see if the infection is gone.

If the infection is not gone, then please do the following:


If your current anti-virus solution let this infection through, you may want to consider purchasing the PRO version of Malwarebytes’ Anti-Malware to protect against these types of threats in the future.

%d bloggers like this: