A Community of Learning

Malware

Top Experts’ Personal Stories about Online Privacy

Nervous about your privacy online? We’ve asked data and analytics experts how they protect their own privacy. Here’s what they said.

onlineprivacy

How do you protect your personal information online these days, especially in the wake of the recent Facebook and Cambridge Analytica news about a huge data leak of consumer data?

Do you turn on Amazon Alexa’s microphones only when you need her help? Do you keep a Post-it note over your webcam? Have you turned off the microphone on your mobile phone? Will you delete your Facebook account?

Click on picture for article.

 

Advertisements

FAQ: Are you in danger: WannaCry ransomware?

WannaCry took down wide swaths of the internet over the weekend, then disappeared. Here’s what you need to know, without the hype.  

(click on the picture for the full article.)

 

So I don’t need to worry about it right now?

Wrong. Very wrong. This is one of those rare times when the Windows sky is falling. We already have reports from Matt Suiche of a new WannaCry variant that’s been sinkholed with 10,000 infections logged. The clones are coming, and many of them won’t be easy to stop. You have to get your Windows PC patched now.


Free tools to support cyber security efforts

More cyber security freebies than you knew existed.

There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey premium counterparts of these freebies, many are full-blown utilities. A few important categories include threat intelligence tools, tools to build security in during the development stage, penetration testers, and forensics tools.  (click on the picture above for the full story)


Sniff out and kick out

skull-n-cross-bones

Like it or not, your PC is susceptible to malware. This page will teach you how to locate the bad stuff, then remove it from your system.

Click on the Skull and Cross Bones to Sniff out and kick out Windows malware for free.

 

For videos on how Sysinternals Process Explorer works click on the YouTube link below.

https://www.youtube.com/results?search_query=Sysinternals+Process+how+does+it+work

 

For a video for how VirusTotal click on the video below.


VIKING …… oh oh

viking danger

New Android malware poses as popular game, but enlists phones into botnet

The malware has evaded Google Play’s malware scans for weeks.

At least five instances of the app have so far been able to evade Google Play’s malware scans for almost a month, since it was first submitted to the app store.

When the user installs the app, it will automatically join a botnet — a network of devices controlled by an attacker — which disguise ad clicks to generate money

http://www.zdnet.com/article/new-android-malware-poses-as-app-joins-device-to-botnet/ 


Marshmallow Security

How to find your patch level.

The Security Patch Level can only be found on devices running Android Marshmallow.

The good news for Android Marshmallow (6.0) users is that the release includes very important improvements that go a long way to protect your device. One addition allows you to quickly find out the security patch level on your smartphone or tablet.  It all started with the Stagefright vulnerability. Once the dust settled from that disaster, Google (and Samsung) made a promise to start rolling out monthly security updates. To that end, they decided to include a field in the device settings that would list for users to see when the last security patch was applied to the operating system.

android safety level Click on the LOCK to read the complete story.


Sure signs you’re hacked . . . .

CSO logo

“The hope of an anti-malware program that can perfectly detect malware and malicious hacking is pure folly. Keep an eye out for the common signs and symptoms of your computer being hacked as outlined above. And if you are risk-adverse, as I am, always perform a complete computer restore with the event of a breach. Because once your computer has been compromised, the bad guys can do anything and hide anywhere.”

Sure sign of system compromise No. 1:

Fake antivirus messages

Sure sign of system compromise No. 2:

Unwanted browser toolbars

Sure sign of system compromise No. 3:

Redirected Internet searches

Sure sign of system compromise No. 4:

Frequent random popups

Sure sign of system compromise No. 5:

Your friends receive fake emails from your email account

Sure sign of system compromise No. 6:

Your online passwords suddenly change

Sure sign of system compromise No. 7:

Unexpected software installs

Sure sign of system compromise No. 8:

Your mouse moves between programs and makes correct selections

Sure sign of system compromise No. 9:

Your antimalware software, Task Manager, or Registry Editor is disabled and can’t be restarted

Sure sign of system compromise No. 10:

Your bank account is missing money

Sure sign of system compromise No. 11:

You get calls from stores about nonpayment of shipped goods

(Click on CSO logo above for the ‘full’ article.)