Wednesday, May 31, 2017

What Are The More Common Phishing Malware Attacks

    Phishing means sending email messages that comes from supposed to be reliable sources but the end result is to get important information from the user’s data. This could mean getting hold of the user’s personal banking accounts and even your credit cards. The user can be fooled by clicking a link that leads them to go to a website and they are told to update personal information. This is a fraudulent website that will steal the user’s information.
   Here Are Some Common Phishing Malware Attacks

1. Deceptive Phishing  - it is a type of phishing scam  where  cybercriminals imitate and copy a legal website. It’s purpose is to steal a person’s confidential information. Mostly they will issue threats and emergency that will make you do what these cybercriminals want.

2. Pharming - This kind of attack emanates from the Domain Name System.  It will now use the DNS servers to convert alphabetical website names to numerical services in order to look for computer services and machines. This cybercriminal will set his sights on a DNS server and he will now alter the IP address related to the alphabetical website name. This is  a way which the cybercriminal can redirect users to a malicious website that they have chosen. This can happen even if they enter the right website name.

3.  Dropbox Phishing - Dropbox is a legitimate site where you can keep your files safe. Cyber criminals will try to trick computer users into entering their log in credentials on a fraudulent DropBox sign that is also hosted by Dropbox.

4. Session Hijacking – This kind of attack will track down the user’s actions until they will sign in into a fixed account and divulge their personal information. When this is done, the malicious malware will be in control and make unauthorized actions and the user will never know about it.  There can be money transfer made and this will surely hurt the user.
5, System Reconfiguration Attacks – It will deviate the user setting on your PC.  It will be used  for malicious purposes.  URL’s in your favorite’s file will be altered to deviate users  to a similar looking website.

6.  DNS Poisoning. -Batch files can modify the transfer zones by editing the host s.txt file that stays inside  ‘C;\windows\system32\drivers\etchosts.txt.’ It will lead you to malicious websites instead of going to a valid website. This can be used for phishing because this is a look alike of the original website and credentials can be stolen.

7. Search Engine Phishing – it happens when cybercriminals create websites that look extremely good  - looking. You can find them on search engines. They seem to be valid and you can find the when you are looking for products and services. Users are deceived into giving important credentials and information.

8 Man In The Middle Phishing – This is very difficult to unearth. Hackers are in the middle of the user and the valid website. They will note down and record all user transactions that have been entered. They will pass it on and the transactions are not put into peril. Eventually, they will sell all the information or they might even use it . this will happen when the user is inactive on the system.

Monday, May 29, 2017

What Is Spear Phishing And How Does It Work

  Spear phishing is an intended direct attack which uses fraudulent emails to target particular organizations or persons. Cybercriminals who do this want to get pertinent information. They will use several ways to get by your anti-malware software. They can do this by impersonation, enticement and access bypass control. Cybercriminals who do this will try to fool you to open an attachment or click on a malicious embedded link. Spear phishing works because it seems to be believable. These criminal hackers want to gain access to your personal data. If you do not recognize a spear phishing attack, the hacker this can be become disastrous because these hackers can gain direct or indirect entry into your computer and steal your computer system passwords, data ( bank accounts ) and other important personal credentials.
   These hackers know a little information about you or any organization. The email  does not address the person in a formal manner. It will probably address you as. “ Hi Teddy. “ it will make you think that you know the person or he knows a mutual friend of yours. You may be caught unaware and provide this scrupulous hacker a bit of information. With companies the email may be asking for immediate action. You may act right away and that is really dangerous. These hackers will scan social networking sites and this is one way they can find information about companies and individuals. You may have bought something from a retail store on the internet.  They can use this information against you by pretending to be a friend. Some of them will ask you for your pass word to your social media sites like Twitter or Instagram.  If you tell them your password they will use it and try it on the retail website that you bought your product. If they are successful then your bill can go sky high.  When he gets the right information, he can also pretend to be somebody from the retailer shop. He will ask you to verify your credit card or reset your password. This can be very harmful.

   Spear phishing is a prelude to a targeted attack and this attack can jeopardize sensitive data. The company will experience data breaches. Companies can lose a lot of cash this way. Smaller companies are mostly targeted because they have fewer IT staff. Employees must be trained to identify doubtful emails, words that are misspelled and unusual words. For protection companies and individuals can use  known email inspector softwares that will help identify and block spear phishing emails at the start of it’s attack.

Friday, May 26, 2017

What Are Online Shopping Scams

   There are a lot of sellers on the internet that are fake. They seem to be legitimate but are not.  These criminal minded persons use counterfeit ( fake ) websites to lure people to buy products from them that does not exist. They can do these things by making fake advertisements on social media networks and even on legitimate retailer sites.
   Online shopping scams work by using websites that are fake. These are retailer websites that look believable. Everything on the site may look authentic, but it is not. They use a payment system that is risky. Often they ask you to send money via wire transfer, money order or pre - loaded money card.  If you do this , you will never get your money back nor will you get the item that you purchased. Scammers make their deals not using an auction site. Online auction sites have stringent rules and scammers know this. Never negotiate with an advertiser outside of a website that doesn’t use any credible online payment system.  Online classified websites allow this to happen. These scammers can post fake ads and fool prospective buyers

      There Are A Number Of Ways To Know Whether The Site Is Fake Or Not:

1. Make an engine search and type the name of the website.  If the website is questionable or illegitimate, a casual google check will give you the right information. Using the search engine google is really good because it collates user reviews of high end traffic sights. Look at reviews and feedback that have no connection with the website

2. There must be a security status on the site and it should appear on your browser’s address. Click on the padlock icon to confirm the details of the website.There is a certain kind of encryption that is used.

3. Make an assessment of the site’s URL. The site should not emulate a credible business website 
(  http or https ).Domain extensions that use “ biz” and “ info” tend to be unreliable.  It can be doubtful if it contains a lot of dashes and symbols in the domain name.  Using .com or .net  is an integral part of a domain’s name, but it is easy to acquire.

4. Legitimate sites usually have good grammar. If the site has bad English grammar then it could be suspicious.

    Here Are Some Safety Tips That Buyers Should Remember;
  
1. Do not buy products that are sold at a considerably low price or products that have so many advantages.

2. Beware of online retailers that do not divulge sufficient information about privacy, terms and conditions of use and other pertinent information.

3. Tell the seller that you will only pay up when you have seen the product or received the product. This you should do when you are buying from a classified ads website.

4. Use an escrow service when you are buying from an online auction site. Escrow services will hold the payment until you receive the product and then it will pay the amount to the seller.

5. Always use a secure online payment service when making payments 

Wednesday, May 24, 2017

Why Bitcoin Is The Preferred Choice Of  Payments By Cyberhackers
    
   Invented by Satoshi Nakamoto, an alias that was used but nobody knows his identity Satoshi means quick witted wise, clear thinking. Naka can mean medium. Moto means origin or motion, His identity is a mystery. When Bitcoin became an official cryptocurrency, it gave 2 main advantages to cybercriminals. First of all it is decentralized currency. You don’t need a third party like a bank. Two people can pay each other without using a middleman.  The person that you are paying bitcoins to is anonymous. As of today  1 Bitcoin is worth $2329.00. Your wallets where your bicoins are placed can only be identified by numbers. At least 6 to 7 million people have these wallets. You can spend these bitcoins on almost anything now. There are already plenty of retailers around the world who accept bitcoins as payments. You can buy contraband goods in the blackmarket.

   
   There are only simple skills needed to do this . It’s like downloading simple accounts oin the internet. If you can make a google account, you can also do this. Downloading a ransoware toolkit is so easy to do and then you can start dispersing it. You can now money launder  your money in the darknet. Your bitcoins will be turned into cash. These toolkit developers make money by taking a percentage of the ransom that is paid this is done by automation . The softwares are kind of sophisticated and very accessible. It can launch attacks at scale. They make the ransom demands affordable . Instructions are given on how to create a virtual wallet and buy enough bitcoins to pay the ransom. In return the cybercriminal will hand you over the code so that the data can be unlocked 
on your computer or a network.


Monday, May 22, 2017

What Kind of Currrency Is Bitcoin


   Bitcoin is a type of digital currency. It is not controlled by anyone. There is no bank, credit card or third party that you have to go through.. It is not a printed currency. Bitcoins are produced by people . Transactions do not need any middlemen. Transaction fees ear not needed.  You do not even need to give your real name.  Persons and companies dealing with wholesale trade are beginning to accept this currency also known as cryptocurrency. With Bitcoins you can buy things electronically. It’s similar to dollars and euros that can be traded digitally.
  The thing that makes Bitcoins different it is because it is decentralized.  No single organizations like ( Banks ) control their money. In some ways, it makes people safe because no large institution controls their money. This currency is not printed by a Central Bank. It is not accountable to people as a whole because it makes it’s own rules. Bitcoin is created digitally by people . This cryptocurrency is created digitally by group or community of people and anyone can join. This currency is mined using computing power in a distributed network.
   
   You cannot have unlimited bitcoins and that is their official procedure. Only 21 million bitcoins can be created by miners and this is what make bitcoins work. It can be divided into smaller parts ( the smallest divisible amount is one hundred millionth of a bitcoin and it is called Satoshi after the founder of Bitcoin ). It’s founder is Satashi Nakamoto. it’s an alias for an anoymous programmner launched in 2009. Conventional currency is based on gold and silver. That is not so with bitcoin , it’s based on mathematics.  There is a mathematical formula done by people that produces bitcoins . This formula is available and you can check on it. It is an open source. You can take a peep on it and see what it does

   Here are it’s Features:

1, It Is Not Controlled By One Central Authority

There is no one central governing authority. Every machines that mines bitcoins and summons a series of transactions is part of the network and the machines work together. That means that one machine can’t play around with monetary policy and cause a disastrous event. It cannot take away bitcoins from them.  If the network goes off line, the network keeps on running.

2. Very Easy To Set Up

With Banks you will have to sign a lot of documents to open a bank account. You can set up bitcoin addresses in seconds. There are no questions asked and no fees to be paid.

3. Your Identity is Anonymous

You can have multiple addresses and  they  are not connected to names, addresses and your personal identification is not known.

4. Transactions are Transparent

Bitcoins keep every details of your transaction by using a general ledger called blockchain which reveals everything. If your bitcoins are on a public address. They can tell how much bitcoins are kept on that address. They just won’t know it’s yours. You may make your transactions non-transparent on the bitcoin network. You may do this by not using the same business addressses consistently and do not distribute a lot of bitcoins to the same addresses.

5. Transactions Fess Are Almost Nothing

Banks will charge you a certain amount for transferring fees while Bticoins won’t charge you. If they do it’s just a tiny amount.

6. Sending Money is Fast

Send money anywhere and it will arrive in minutes , when the bitcoin has processed.

7. Non-Refundable

The moment you send your bitcoins, you cannot get it back. The sender has to give it back to you.

1 bitcoin as of today cost $2,165.51 dollars.






Friday, May 19, 2017

What are The Two Types of Ransomware

  Ransomware is a type of malware that will limit or stop computers users from accessing their system. It will lock your system screen or lock the user’s files until you pay the ransom.There are two types of Ransomware:


1. CRYPTO RANSOMWARE - This is a kind of ransomware that encrypts files on your computers and even your mobile devices . The encryption will scramble the contents of the file. When this is done, your files become illegible. This means it becomes unreadable. You need a decryption key for your device to become normal again. The hacker is holding you as a hostage until you pay the ransom demand. You will see the demand of payment on your screen. When payment is paid, they will give you the decryption key. There are many forms of crypto – ransomware.
   Here are some types of CRYPTO RANSOMWARE:

a. Apocalypse  Ransomware - This ranmsomware encrypts the victim’s file and then it will change the extension of the encrypted files to .encryption files.  The victim now will have to send an email for instructions on how the ransom must be paid. It spreads through spam email.

b. Crypto  Ransomware 2.0 - This ransomware also encrypts the files and it becomes inaccessible. Your files will be all muddled up. This way you cannot get your files back. Your restoration mode and return to previous mode is taken out from the system. Spam campaigns and malvertising are used to distribute this ransomware

c. CryptoLocker Ransomware - This ransomware spreads through infected email attachments and botnets. Botnet is a collection of internet – connected user computers infected by malware that allows computers to be controlled by a bot herder ( operator ). The ransomware encrypts certain types of files that are kept on network drives using RSA public- key cryptography. The key is kept on the malware’s control services. This ransomware will display a message which offers to decrypt the message when payment is made. You are not sure whether the cyber hacker will decrypt the message.

d. Decryption Max Ransomare - It encrypts the file of a victim. It will add .Crypt,.pzdc.extension after each file that was encrypted.  The ransomware will now change the wallpaper of the victim with a snapshot image of how the ransom must be paid so that you can get the key for the encryption.

2. LOCKER RANSOMWARE - It is also known as computer locker. It will not encrypt your files but it will not allow access to your computers and other mobile devices.  It will lock the user interface and then it will order you to pay the ransom. It will leave you very few choices. You could communicate with the hacker ( attacker ) or just pay the ransom.

    Here Are Some Of Forms LOCKER RANSOMWARE:

a. Department Of Justice Ransomware -  This ransomware will create a registry entry. Once this is running on your computer, your device will shut down and your system will be completely locked . You will not be able to do any work or task. This ransomware will order you to pay a certain amount of cash through Paysafe or Moneypak card. This is a big scam and you won’t be able get your money back.

b. Urausy Police Ransomware - Also known as Police Virus or FBI virus ( Trojan ). It will determine the place and country location. It will download a variety of Trojans.  After this is done, it will start creating false notices from a police force in your location. This is usually spread through fake updates and email attachments. Once this gets in to the system of your device, it will show a ransom note page. It will now order you to pay the ransom using money gram, money pak and Bitcoin. You may never get your files back if you don’t pay.  This is another scam.

c. Ophion Locker - It will encrypt  data with ransoms that will differ from country to country. This  ransomware  is dispersed through online advertising campaigns. It will trick you to click on a certain part of a website. When you do this, it takes hold of your computer.




Wednesday, May 17, 2017

What You Can Do To Prevent Ransomware Attacks

   Last May 14, 2017 was D-DAY for a lot of companies that were using Windows OS Systems . I am referring to Windows XP, 7, 8 and 10. Thousands of computers were struck hard by the ransomware Wanna Decrptor Ransomware more popularly known as WannaCry Ransomware.  A lot of big organizations in 150 countries were hit and were asked to pay a ransom amounting to $300. The total amount syphoned off by these cyber criminals reached $53,000 plus. Cybercriminals are the worst and most vicious hackers out there on the internet. There are around 450 types of rmalware that can infect your computers If you are not protected. Ransomware is a kind of malware.
   Here are some ways you can protect your computers from infections of these kinds:

1. Know the Patch Of Your Windows OS  - Every Windows OS has a patch. If you are using an older verison of Windows, you will have to go to the Microsoft Windows Website to get the right patch. A patch is a code that is used as an add - on to update a software. In this case it is Windows OS.  You can do the same thing for Windows 10. I know that Microsoft issued a patch last March for Windows 10.

2.  Always Enable Your Automatic Updates - Everyone who uses Windows OS must enable their automatic updates. It is for your own good.   This will help you in protecting your computer from malicious software. Security issues can be identified when your Operating System is updated. You may be running an anti – malware or anti – virus program but you still need to be amply protected.
3. Use Only Proper Software – many causes of infections come from third party software.  Pirated software are the causes of a lot of infections . Your Windows OS must be a legal copy. You won’t be issued patches if you are using an illegal Windows OS.  If you are using an illegal Windows OS, you are susceptible to all kinds of attacks.

4. Always Be Protected  - Do not just keep on downloading files and not knowing that the files have been infected. Get a credible Anti - Malware Security software.

5. Backup Your Files - You need to backup your system on a constant basis. If you lose your data, you can recover it. You can use an external hard drive or store data on Cloud for this purpose.  Catastrophes can happen like being hacked by cybercriminals who use any type of ransomware to demand payment.  Companies and other large organizations should have a systems administrator that will regularly update their network.
   It is always better to be alert and aware that the e are cyber criminals out there ready to steal documents and demand payment.

   

Monday, May 15, 2017

What Is Wanna Decryptor Ransomware

   Wanna Decryptor Ransomware ( A.K.A. WannaCry )  is a type of malware comes in the form of a Trojan and it is transmitted through a loaded hyperlink that can be transferred through a loaded hyperlink that can be unintentionally opened by a victim through an email, advert on a webpage or Dropbox link. Once it is activated, this program spreads through the computer and all the files will be locked down with the same encryption used for instant messages. The moment the files have been encrypted , all original files will be deleted.  It will now give out a ransom note in the mold of a readme file. Your wallpaper will be changed and will demand payment to return the files.  It’s a type of malware that modifies files in the /Windows and/windows/ system32 directories and it can identify other users on the network that it will infect.  Both these actions need administrative privileges. This type of attack also can spread by phishing emails and unpatched systems like a computer worm. The payment is usually done in Bitcoins. One bitcoin is equivalent to $400. This problem can occur when you do not update your Windows OS.
   Last Friday, this vicious ransomware hit at least 200,000 computers  in at least 150 countries. Hospitals, major companies and government were the ones really affected by this malware. A 22 year old security researcher whose identity is known as Malwaretech  was able to register the domain  and keep it from spreading. Although, it  has stopped  spreading for awhile. It still can damage computers when people open their computers on Monday morning May 15, 2017. This malware is still hanging around inside computers that have not been used since Friday May 12, 2017.  Other attacks may still emulate. I call this a criminal attack because it affected hospitals in the U.K. and Scotland. They cannot use their s MRI scanners and other equipment like refrigerators for blood storage. As of May 14, 2017 $33,000.00 has been paid in ransom. It still may escalate higher come Monday morning May 15, 2017. Just be careful and always be protected by acquiring very good AV products.



Sunday, May 14, 2017

What Is Backdoor. Mac.Eleanor Malware

   This Malware was discovered by Bitdefender in May 2016 and they named it Backdoor. Mac. Eleanor.  This was the second malware to attack APPLE Computers . The first malware to do this was KeRange. This malware can come in to your computer when you open the app called EasyDoc Converter. This is a drag and drop converter. EasyDoc converter will install a wide range of malware in your laptop or destop computer. This fake file converter app once installed will download a malicious script. After it is installed, it will pick up a lot of tools that can take hold of Face Time camera. It will download files and execute  commands and it will send emails that have attached files. Face Time camera  can be accessed because this dubious app has a tool known as “ wacaw .” This is an open camera tool.
  

   If you do not have a tool known as little Snitch, this malware will creep in by installing three launch agents in the user folder and it will have a folder that is hidden. All of these folders contain executable files. They seem to be legitimate Dropbox  elements but they are not. The legitimate Dropbox is located in your user user folder. This fake dropbox is located in your  user's library folder. This three launch agents will trigger the Tor hidden service, a web service and a Patebin service. What the Tor service will do is set up an address. This way the hacker can send commands to the computer that has been infected. Patebin is used to upload the infected Mac. Tor address  to Patebin where the hacker can find it. Patebin is a popular website for storing and sharing text. It’s usually used to distribute legitimate data. Hackers use it to deposit stolen information,

    This is really dubious and bad malware. Apple has removed EasyDoc converter from it’s update. It is still out there in the internet . Do not download this type of software from the internet. Do not download apps that have not been updated. Always be aware of what you are downloading. It maybe 2017 now but this malware might still be on the internet. It is best to be protected. Get an Anti-Malware that is suitable for Macs and always keep your Gatekeeper enabled.

Wednesday, May 10, 2017

What Are The Types Of Spyware That May Invade Your Computer

   Spyware means any software that can get information from your Laptop and Desktop computer  without your prior knowledge. There are two classes of spyware: ( Domestic and Commercial ). Domestic spyware is a software that you buy and it acts like a watchdog. It tracks down the behavioral patterns of your internet activity. Business owners buy this type of software so that they can look into the online activities of their employees. Parents can even buy this type of software so that they can look into the internet activities of their children. All you need is a computer network and these things can be done. A third party can also install this software onto your Laptop or Desktop without your knowing it. These criminal hackers will do this to get valuable information from you.  Commercial Spyware is known as adware.  Companies that usually sell things use this kind of software to track down what you do on the internet and then they sell the information to marketers. These marketers will then send you advertising ads that will fit your needs.  Never click on suspected malicious links or any link that you are uncomfortable with.  It may be disastrous because you might be allowing hackers to steal your important passwords.

   Here are the most common spywares:
1. Chat loggers and email recorders  - These types of  Domestic  spyware will make a duplicate copy of all your chats, outgoing and incoming email.

2. Keyloggers and Password recorder - When this type of spyware enters your laptop or desktop computer it will record any key entry you make on your keyboard.  It is risky because someone out there is on the prowl looking at every key entry you make. Passwords can be stolen
3. Internet URL loggers and screen recorders  - This Domestic spyware  looks in to whatever you are doing online. URL loggers record the sites that you visit. Screen recorders take photos of your screen every time it is changed.

4. Browser Hijacking - There are a lot of hijackers on the web and they accomplish this by putting a lot of traffic stats on their website. Their aim is to have higher advertising revenues.

5. Web Bugs - This is just annoying because you will have a lot of pop  up ads showing even if you are not online.
6. Modem Hijacking – If you are using a telephone modem for your internet needs, you can be at risk. No passwords are stolen but it will install an online dialer. These may come in spam and porn emails. Never click on these type of emails. This will install a new internet connection that may be real expensive. You will get shocked when you receive your next phone bill.

7. PC Hijacking – If you are using a high speed internet, you can become a primary target.  These criminal hackers will use your IP address to send a lot of spam emails.  You will not know but you will be receiving many complaints about spam emails coming from your IP address.

8. Trojans and Viruses -  Trojans  may seem harmless but for me it is not. It can destroy your data, copy it and even distribute it. A virus is almost the same, it can repeatedly copy itself and it can damage many computers. Trojans can also be used to transfer a malicious virus or other spywares without being detected by an anti – virus program.


   My advice is that people using Laptops and Desktops must get  a reliable anti – spyware program.

How To Keep Your Laptop In Shape And Safe

   You need to take good care of your laptop because all of your important documents are stored in this machine. If you do so then your laptop can last for a long time.  Give this machine your attention and treat this like your own precious possession. If you can take care of your car, why not take care of your laptop. You need to check on your laptop, since you use it frequently. A damaged laptop is of no use to anyone. The performance of your laptop may suffer, if you do not keep it in shape.
    Here Are Some Ways To Keep Your Laptop In Shape:

1. Clean The Screen of Your Laptop  -   Use a microfiber cloth to clean your screen. Dust can stick to your screen. You can buy a certain type of liquid that is designed to clean laptop screens. Do not use any kind of cleaner because this can ruin your screen.  As for me, the microfiber cloth is the best way to clean your screen because it does not produce lint.  Just wipe your screen gently and this type of cloth will remove the dust.   Do not use alcohol because this can permanently damage your screen.

2. Drain Your Battery  -  Do not keep on using your laptop when your battery is fully charged and your charging adapter is plugged to an electrical outlet.  Doing this will ruin your lithium-ion battery in the long run. Drain your battery to at least 20% and then recharge it. You can use it by removing your battery and using the electrical outlet to power your laptop.

3. Clean Your Keyboard  -  Before doing this power off your laptop. Use a melanine sponge and soak it in water. Let it dry. This way there won’t be any speck of water left in it. Gently rub the corner of the sponge on the dusty and dirty pats of the keyboard. Do not rub so hard because the letters on the key characters may be removed. You can use other kinds of sponge but it will not be as effective a s the melanine sponge.

4. Do Not Eat Or Drink Near Your Laptop -  You have to keep your laptop out of danger.  Spilling any type of liquid like water on your laptop can ruin your motherboard. Laptop motherboards are very expensive. It is better to be aware of this, then feel sorry afterwards.

5. Keep Your Laptop On A Flat and Clean Surface – This way your laptop will not fall and  get damaged.  A clean surface is better because your laptop will not accumulate dust. Do not use your laptop while you are in bed because it can accumulate dust.

6. Have The Right Bag For Your Laptop – Since a laptop is a portable machine, you will have to carry it using a shoulder bag or a backpack. It must have padded portions that are made especially for laptops.

7. Clean Your Laptop Fan – You can do this by acquiring a camera lens air duster. Make sure that your laptop is powered off before you start.  After that, you can insert the nozzle of the air duster into the vents. Make sure you get as close as you can and then start blowing the dust. The fan blades should stop turning and this can be done by inserting a long plastic object to stop it from doing so. You can also open the laptop. If you are not accustomed to this step, bring it to a certified computer technician and let him do it. You will have to pay a certain fee.  If your laptop starts to hum, it might mean that you have to replace your fan.

8. Never Leave Your Laptop Inside Your Car - There are prowling thieves out there. If they see a laptop in your car, they can cut out the window glass of your car and get hold of your laptop.  This is a valuable item.  Do not tempt the thieves.

   
   These are just some tips that any laptop owner must know.

Monday, May 8, 2017

How To Stop Your Laptop From Crashing

    It is important for any user to keep their laptop from crashing. You have to understand that you have important files in your laptop and you must keep them safe. There are many ways to fix the problem . If your laptop crashes, you can try troubleshooting before bringing it to a store that will fix it. Usually the store will tell you just to t buy a new hard drive and increase your hard disk Drive space . What happens to all your data?  It’s all lost.
  

    Here are some tips to help you from preventing your laptops from crashing:

1. Get a free registry cleaner. Install it and run the scan and tests. It will cleanup all the mess in your laptop. It will remove all the unwanted files, temporary files, temporary internet files.  Make sure that all the files that has been detected  is taken out .Tthis will speed up your laptop. Keep on running the registry cleaner until all the problems have been fixed

2. Get a free version of Malwarebytes  Anti Malware.  Allow this software to update . When all the updates have been installed , perform a Quick Scan. Remove all the malicious software from your laptop.  Restart yourlaptopr and check if your laptop does continue to crash.

3. Overheating - can cause your computer to crash. You can update your BIOS or clean you air vents and put in filtered material over the inhalation vents. Overheating can be a regular problem because your laptop has many elements that are in a small area. Dust can build up and block your air vents. You need to clean your air vents regularly. Fans can help your laptop from heating up.

4. Slow Hard Drive - You may experience slow file transfers. The remedy for this is to do disk defragmentation. When your information are not organized, this can slow down your performance. There may be a lot of bad sectors on your hard drive. Defragging can take a lot of time but it is a must if you want to keep your computer safe. Disk Defragmentation can be accessed through your accessories or system tools.
5 Your Battery Quickly Discharges.: You have no choice but to change your battery. After a few years lithium ion batteries  can lose their power.

6. More Memory Needed  - This happens when your laptop becomes slow when you use several applications. The only way to love this is to upgrade your RAM. Booting up becomes slow and you need to add more RAM. There may be some programs that you rarely need and you can just simply delete them.

7. Hard Drive Failure - You can feel a loud click when the laptop retrieves data from yourHhard Drive. You can do online back-up. I usually back-up my files by using an external hard drive. There are plenty of software solutions that you can use and there are a lot of them out there in the market like Norton Save and Restore. You can get it at the price $50. You can back-up your data online and there are many sites that you can use. Dropbox is also good for backing up your important files
7. System Crush  - Your laptop won’t boot up. The only way to solve this is to remove your hard drive and put it on an external enclosure. Afterwards you can run checklist. Problems can arise because of a missing system file or a bad sector in your hard drive. If that is the case, take out your hard drive from your laptop ( Use your instruction manual that comes with your laptop ). Now, place the hard drive in a USB enclosure. These are externa l housings for internal hardware. Afterwards connect the USB cable to a USB cable port.  If the file system remains unchanged, the hard drive will appear as an external hard drive . Now, you can transfer data from the drive. Run checkdisk by opening a DOS prompt ( Start>Programs>Accessories>Command Prompt ) then type in  X. X is the letter of your external drive Press Enter and type”chkdsk/f.” Your system will then ask you to remove the drive; this is right. Type Y and then  press Enter. The laptop will display bit of your information about your drive ( file system type and serial no. ). Now you can scan the drive and fix any errors it meets. You will just be fine once you put back the hard drive to your laptop. Turn it on.

8.  MalWare – This could be a virus or spyware. Install antimalware or free antivirus. Malware can damage your laptop. This happens when there are so many pop-ups that will definitely slow down the sped of your laptop. Dow load a very good security software. You may have to pay for this. You can download free tools like Ad-Aware and Spybot, Search and Destroy. Do regular scanning using these tools.


This write-up just serves as a guide and I am not recommending any product.



Friday, May 5, 2017

What Are The Kinds Of Malware That Affects Your Smartphone



   Your Smartphone is just like a small PC that you keep in your pocket most of the time. There are a lot of details and personal information that people keep on their phone.  You can browse the web and send emails. Most Smartphones have WI-Fi  connection s that allows you to chat with people using viber, facebook and you can even download  applications  from third party vendors. Doing these things can be risky.  You need to be protected. There are certain malwares that you can get from downloading. Remember that there are hackers out there who want to get something from you and even earn money.
   
   Here Are Some Of The Malwares That Every Smartphone User Must Be Aware Of:

1. Expander- It’s main objective is to hit the smartphone’s mobile meters and this can add on to your  phone bill and of course the hackers what to make some profit.
2. Worm – This malware reproduces and it could contaminate other devices. It does contain spurious instructions and if you follow it this can be very harmful. This type of malware can be conveyed through text messages.
3. Trojan – This is a very dangerous malware because this type of virus can erase your data. It can deactivate applications on your phone and it will malfunction and paralyze your smartphone.
4. Spyware  - This type of malware is really bad because it can access your personal data, use it and spread it out without you knowing it. The hacker can get sensitive information from your smartphone.
5. Ghost Push – This malware takes control of your phone’s system resources. It makes it unresponsive and it will drain your battery in a fast way. There will be unnecessary apps that will come on  and appear suddenly . Advertisements can appear at any time in full display or on your status bar.
6. Cabir – This malware infects smartphones that are running on Symbian OS. When infected, the smartphone will come out with a message ‘Caribe’and it will be displayed on your phone the moment your phone is turned on.
7. Duts – This malware will infect all your EXE. files that are bigger than 4096 bytes in your current directory.
8. Skulls – It’s a Trojan horse type of code that attacks Symbian OS. The moment you download this type  of malware , the Skull photo will appear replacing your icons. It will render all phone apps useless.
9. Commwarrior - This malware spreads through Bluetooth and it affects Symbian OS. Once this malware is launched , it will hunt down Bluetooth devices and the infected files are sent through a random name to various devices.
10. Gingermaster – It is a type of malware that creates a service that steals information from your android Smartphone and sends it to a remote website with an HTTP POST request. The information taken includes user identifier, SIM Card number, telephone number, IMEI number, IMSI number, screen resolution and local time.
11. DroidKungFu  - This malware  works in two ways. First, it takes advantage of a backdoor in the Android phone’s software to load a backdoor on a device, allowing hackers to steal sensitive information on the device. Secondly, the handset could turn into a .bot. This will permit the device to be used to perform actions without the user’s permission.
11. IKee  -  This is a type of malware ( worm  ) that targets  the Apple iPhone OS.  IKee can only infect an iPhone if:  1. The device has been jailbroken – hacked by the user to install software that has not been approved by Apple 2. An unapproved Security Shell  ( SSH ) application, which allows remote access to the device has been installed 3. The default SSH password for the ‘root’ user has not been changed from the factory default (  ’alpine’ ). Users who have not jailbroken their iPhones, do have an SSH application installed or have changed the default SSH password are not affected.  When this type of malware is active, it will change the background wallpaper dwhen the iPhone is locked .  The image of 1980’s pop star Rick Astley will appear. You’ll just see the message “ IKee is never going to give you up”.
12. Gunpoder - This malware was the first known virus that infected google playstore.
13. Shedun- It’s an adware serving as a malware. It can install malicious third party apps on your mobile devices remotely even if the users do not want to use it.
14. HummingBird -  This malware has infected over 10 million Android operating systems. User details are sold and adverbs are tapped on without the user’s knowledge. This way illegal advertising revenue is generated.

   My personal advice for smartphone users  is to be careful when downloading apps. Be sure you are downloading apps from a credible source. Do not just keep on clicking and clicking. Do not open emails , if you do not know the source where it came from. Always be on the alert , Do not just befriend anybody on Social Media. Install a credible mobile anti-malware security.  It is better to stay protected than unprotected. This is just my advice.






What Is KeRanger and How It Affected Mac Computers In March, 2016

  KeRanger is a ransomware trojan horse malware that targets OS Systems of Mac Computers and it has affected at least 7,000 Mac Computers in March 2016.. The KeRanger works like most ransomware . It does by encrypting files on to your Mac Computers and demanding payment of 1 bitcoin ( $400 ).  It uses bitcoin which is a crypto-currency because it is untraceable. When you pay the ransom, you will receive an encryption key to redeem your files. I really don’t know if this is true. They may or may not do so. KeRanger is installed to your Mac Computer by a tainted Transmission installer. It makes use of a legitimate Mac app developer certificate. This will permit the installation of the ransomware and will go past the OS X’s gatekeeper technology. The gatekeeper technology stops the malware installation  on your Mac. It wasn’t so in this case. The moment the KeRanger is installed, it starts it’s communication with a remote server and then it sleeps for three days. The moment it wakes up, it will receive the encryption key from the remote server and it starts to encrypt files on your infected Mac. Once the encryption is done with, most of your user files cannot be used. What Apple has done is to rescind the Mac app developer certificate that was used by the app. By doing this it has allowed gatekeeper to recognize KeRanger and stop it’s installations. Transmission has taken away Transmission 2.90 from their website and has come up with a clean version.

   How to avoid new ransomware that use crypto-currency to extort money from you:

1. No computer is exempt from malware – Brush off the thinking that your Mac is safe from any malware. It is also vulnerable to such attacks. Remember that you are dealing with hackers who are experts. These cyber criminals who extort money are the worst of them all.
2. Start to backup your files – Don’t be a couch potato, If your files are important,you should back them up. You can do this by using an external hard drive. Keep on backing up your files. Backing up your files will give you peace of mind.
3.  Be careful – Don’t just install software from sites that you are not sure of or from any third party.  Ransomware can come through your email. Always download from sites that that you know.  If you have a Mac download your software from the apple store
4. Always be protected – Get a well known anti malware or anti-virus solution for your own protection. Remember that these criminals are also upgrading their malware. This is the reason why you need a very good anti-malware security protection.
5. Don’t give these criminals money- Doing this will just give them more momentum to do what they are doing. Ransomware attacks have been steadily increasing because people are paying these crooks money.
   Ransomware is evil because it attacks anyone and these cyber criminals do not care who they victimize. It could be big businesses or even a simple ordinary person. Big Businesses have very important data and it is the data that ransomware targets. This is why your computers whether they are Macs or other branded names need to be protected. This is just my opinion, but I think everyone who keeps important data should be reminded. Ransomware is the worst cyber threat now.

Tuesday, May 2, 2017

What Laptops Are Suitable For Seniors

   It is very important for the elderly to be comfortable when using their laptops. The chair that they are using must be comfortable. The table must be well positioned and must be the right size. Finding the right chair and table will make things convenient for the elderly.  Elderly people will use their laptops commonly for facebook, getting in touch with their family by using such apps as skype, email purposes. If they are savvy enough, they can use it for banking purposes or even for their business.  

1. Some may use their laptops for their business and others may use it for their crafts and even for  watching movies and other entertainment purposes.

2. They may need other components such as a mouse, larger keys. Large printed keyboard stickers can be bought and they may need utility managers. If they are going to use their laptops for business purposes, they may need a laptop that has very good processing power. Seniors may have to note down the things that they need for a laptop.

3. Seniors may need software that they will use. Most laptops come with preloaded software.  This includes browsers. If you want a Chrome browser you may need to download it. There are other software that you might need like adobe photoshop or illustrator. Other software can be downloaded in case you need it. Get a very good anti-malware or antivirus software for your laptop’s protection.

4. Get a laptop that will suit your needs and your budget. There are inexpensive and expensive laptops out there that are good for the elderly. Buy a laptop that you need and there are a lot of laptops out there in the market that are on bargain. You may need a laptop that has good sound quality, The Screen resolution should e at least a FHD screen resolution ( 1920x1080 ) or even much more. I would recommend a Solid State Drive than a Hard Disk Drive because the SSD does not have magnets. HDD have magnets and it can wipe out your data. A laptop that is light in weight will be good for the elderly. Laptops that are 15 inches and 17 inches in size will be good for the elderly.

There are some laptops that will suit the needs of Seniors:


There are some laptops that will suit the needs of Seniors:

1. Acer Aspire E 15 - It comes with a 15.6 inch screen with FHD display and this is just right for 
 ideal viewing. The Acer Aspire E 15has a backlit keyboard with 256 GB SSD, an Inteli5 processor 
 with 8GB of RAM. The price is $600.
2. Asus F555LA-AB31 – It comes with a FHD ( 1920x1080 ). This is good because your eyes will    
 not get strained. It has great sounds and it is 15.6 inches wide.  It has the latest Windows 10 
 Operating System, 4GB of RAM, 500GB of hard drive and an Intel i3 processor.
3.  HP 15-aY011nr – This laptop has a sound enhancer and this is good for Seniors who are hard of   hearing. The screen display is 15.6 inches and this is very good because it will not strain your   eyes. It comes with an i5 processor, 1TB hard drive storage and 8GB of RAM. The price for this  laptop is $500.
4. Toshiba Satellite Fusion 15 L55W-CC5153 – This laptop comes with a Full High Definition  
( 1920x1080 )  and it has a touchscreen monitor that is 15.6 inches. The sounds on this laptop is 
 really great. It’s a convertible 2-in-1 laptop. It has a 256GB hard drive, 8GB of RAM and 
 Inte i7 processor. This laptop performs really well  and it cost only $700.
  
   There are a lot of other laptops out there in the market that will work well with Seniors. It’s all up to you to decide. This article only serves as a guide.



What You Should Know Before Making Your Own Podcast

   Wikipedia defines podcast as an episodic series of digital audio files which a user can download and listen to. It is often available fo...