Showing posts with label We Hate Malware. Show all posts
Showing posts with label We Hate Malware. Show all posts

Friday, 10 July 2020

Russian Government May Be Utilizing Spyware To Gather Information

[dropcaps]I[/dropcaps]nstances of government sponsored malware are fairly rare, however according to security firm FireEye, the Russian government may be guilty.  FireEye cites a group they have dubbed as APT28, whom say they are behind a steady stream of common malware dating back almost 7 years.  The group does not seem to be harvesting data for economic gain (such as stealing credit card numbers, bank accounts, etc), but rather “APT28 focuses on collecting intelligence that would be most useful to a government. Specifically, FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries and security organizations that would likely benefit the Russian government.”

The group already appears to be well known in the cyber security community, however it’s only recently that FireEye has linked the group back towards the Russian government.

Table-for-APT28Government sponsored malware has been in the news more and more, first with APT1 which was based in China.   Even the United States is involved, with the use of Stuxnet which targeted Iranian nuclear facilities.

Although government malware is still rather unusual, this is the second time that Russia has been accused.  Some readers may remember that Russia was in the news a few months ago when German security firm GData accused the nation of being behind the Uroboros malware.

FireEye has no direct evidence that the Russian government is behind the operation, however the circumstantial evidence appears to be strong enough.  For example, the code betrays that the creators speak Russian, and it also appears that the group operates during “business hours” in prime Russian cities such as Moscow and St. Petersberg.  FireEye has put all their evidence into a table with bullet points, as you can see here.



from We Hate Malware https://ift.tt/2ZgLry4

Monday, 6 July 2020

Knowing When Or If to Update Your computer Drivers

Since computer drivers are the software that helps all the other software programs to run, the computer user needs to make sure they are working correctly and current. How do you get computer drivers? Often when you purchase a new printer or other hardware for your computer, the company web site will be listed to go to and install the proper driver. New computers often come loaded with a lot of software including the needed drivers. These will often be generic drivers that perform the basic tasks you will need. If you want a driver that has extras needed for gaming and so on, you may want to find drivers with more features.

If the computer is all set up and running fine, don’t mess with the drivers. The saying “if it isn’t broke, don’t fix it” applies here. Sometimes downloading a different driver can affect the stability and functionality of your computer. If this happens, it takes a lot of effort to get the computer working perfectly again. If one is a computer novice, it may mean hiring a computer expert to fix everything and that costs money. A good practice is to wait until there is a problem before updating the drivers in a computer. Trouble signs can include a printer not working properly with the computer, everything slowing down including computer games, e-mail messages being dropped or internet connection being unstable.

Everyone who uses a computer experiences the messages that pop up about computer updates being available or having been automatically installed. When one presses the install button, programs are updated. When this happens it is important to make sure the affected driver is still in sync with the updated version of the program. This is one time it may be necessary to update a computer driver. Wanting increased speed and new features is another reason to update drivers. Video drivers need to be updated more often than many other drivers to get performance increases for new games.

Three places to look for new drivers to download:

  • The chipset manufacturer’s website. This is the company that designed the program, game, video, or sound chip. They will have the newest drivers with the most features.
  • The hardware manufacturer’s website. This is the company that manufactured your hardware.
  • Windows. Going directly to Windows for generic drivers is good for basic things like printers.
  • The CD that was included with the newly purchased device. This is not the best alternative because they may be outdated before the computer is purchased and hooked up. The exception would be the ethernet drivers which help one to connect to the Internet where one can download all the new drivers online.


from We Hate Malware https://ift.tt/2BGxxfx

Wednesday, 1 July 2020

Keep Your Online Identity Safe

With consumers conducting more and more business online, the opportunities for identity theft are increasing exponentially. Identity thieves target those who are less than vigilant with their online security. To avoid being victimized, security experts recommend taking specific steps to minimize the risk of online identity theft. Here are a few of the most commonly cited identity theft tips.

Use strong passwords and change them often.

Remembering complex passwords is difficult, which leads many consumers to use the same password for all the sites they visit. Hackers know people tend to be lazy with passwords and, when one site is compromised, the passwords stolen will often work for banking and shopping sites. To thwart hackers, security experts strongly recommend users not use the same, or even similar, passwords.

Because remembering multiple complex passwords is almost impossible, password managers are becoming popular. Management software keeps track of all passwords. Users only have to remember one complex password. Password managers also make it easier to routinely change individual site passwords often, further reducing the potential for online identity theft.

Don’t fall for phishing schemes.

The Internet is rife with scammers masquerading as banks and credit card companies. Some are quite sophisticated, with pages mirroring authentic sites. Identity theft avoidance experts point out the credit card issuers and banks do not send messages asking customers to update sensitive information online. When any suspicious message is received, computer experts recommend not even opening the message, as it could contain malicious software. However, it is a good idea to notify the company or bank to let them know the message was received.

Keep security software updated.

Security software and firewalls are the first line of defense for minimizing online threats. Online reviewers frequently test security software and report on the effectiveness of popular security software offerings. Some of the best security software is even free, which makes it easy to download and install the software currently regarded as the best for protecting home computers and other devices. Make sure the software is updated automatically whenever that option is available.

Even the best security may not always be effective.

Because hackers are always looking for new ways to circumvent security software, the potential for online identity theft will always be there. Keep track of all bank accounts and monitor credit card use frequently. Report any issues discovered and take immediate steps to freeze your credit if any problems are noted.



from We Hate Malware https://ift.tt/3ijn2PN

Thursday, 25 June 2020

Are Home Wireless Networks Worth the Effort?

Security issues with computers and networks are in the news constantly. While there are issues users need to address when using networks, the advantages of a home network far outweigh any potential disadvantages. With the advent of the Internet of Things, homeowners will garner even more from their home networks. So, there are several possible responses when anyone asks why set up a home network?

What can be connected to a home network?

While the original intent of home networks was to connect multiple computers to a single Internet source, home networks now serve as a hub connecting countless devices. Home networks still connect multiple computers but, today, networks are routinely used to connect gaming devices, televisions, and even home appliances, allowing all devices to communicate within the home or with remote devices.

How are networks set up?

There are two ways to design home networks. First, they can be wired together. In the past, that was the only option. All devices were physically linked using a series of cables. However, wiring devices created a variety of issues, especially when devices were some distance apart. Routing wiring is problematic and can be unsightly. Today, most home networks are wireless, relying on radio waves rather than physically attaching each device using cables.

Is it difficult to configure a wireless home network?

As a rule, no. Modern devices were designed to accommodate home wireless networks. While the initial installation may take a little time, linking devices is generally quite simple. Using wireless networks also saves money, as devices like printers are easily shared by multiple devices. DVD players, televisions and gaming equipment can all take advantage of a single modem and wireless router, cutting down on clutter.

Are security issues important?

Of course. However, the equipment comes with detailed instructions to prevent unauthorized access to the network. Open networks, where no password is needed to access the network, are strongly discouraged by security professionals. Simply following the recommendations provided by Internet and equipment providers will normally provide a relatively high level of security for home networks. Because security issues are evolving, it’s always important to stay abreast of potential threats. When prompted to allow providers to send updates, do so.

Home networks are evolving rapidly, especially with newer generation security and environmental systems taking advantage of network capabilities to improve home comfort and safety. If your home does not have a network, consider installing one today.



from We Hate Malware https://ift.tt/31j9BJw

Saturday, 20 June 2020

A Brief Guide For Increasing The Security Of Your Mobile Devices

[dropcaps]I[/dropcaps]n today’s society, mobile phone security is a vital necessity. Consumers now use smart-phones as much or more than computers to transmit confidential information. These actions could; however, in the end expose them to more security risks as cyber crimes are on the rise. The highest percentage of these crimes are associated with online shopping.

What is Mobile Phone Security?

Essentially, mobile phone security encompasses the tactics used to prevent the compromise of private information. The tactics are used to prevent the exploitation of weaknesses found within the smart-phones. The security methods are generated to improve the mobile experience for all users and prevent the theft of their intellectual property and personal information.

The Most Common Threats

Malicious software is often introduced through text messages. These attacks rely on average users who don’t know how this software works. It can manipulate the smart-phone and send messages to the user via their contacts. In most instances, a link is included. When the user clicks the link, the software attacks and could cause a complete denial of service while it acquires all information within the device.

Security Tips to Protect Your Information

Smart-phone users who shop online should always use links that offer a secured socket layer. You’ll recognize them within the address bar. They start with “https:” and show a padlock out to the side in most instances.

Secure Your Phone

Always set up a password for your smart-phone. This prevents anyone from gaining physical access to your information if you lose your phone. Don’t use any names connected to you directly. Don’t use the birth date of your children. Use something random that you could remember that isn’t accessible if a thief acquires your wallet.

Additionally, you should use GPS for your phone. Some contract packages include this feature. However, if your plan doesn’t you could download an app for free.

Smart-phones have replaced the storage of a PC for most consumers. Unfortunately, this could leave their information ripe for the picking. By using effective security tactics for your smart-phone, you prevent a security breach that could cause a significant loss of your confidential information. Read further for more security tips to keep your smart-phones safe.



from We Hate Malware https://ift.tt/3120ooS

Three Basic Steps to Keep Your Computer Data Secure

[dropcaps]A[/dropcaps] large percentage of computer users routinely neglect to protect the information on their computers. That makes them potential targets for malicious software that can quickly gather that data and use it to empty bank accounts and run up charges on credit cards. Recent malware attacks have also held unprotected computers hostage, with hackers demanding ransom before providing a code to unlock the computer. By following some basic steps, computer users can avoid the majority of threats to their computers’ security.

Use Strong Passwords for All Sites

While it’s tempting to use the same password for everything, that’s a dangerous practice. If one site is hacked, the security of all your commonly used programs and sites is threatened. Computer security experts always recommend using strong passwords and never using the same password for multiple sites. Obviously, even moderate computer users can quickly generate many hard-to-remember passwords, so taking advantage of some sort of password management software is a great idea.

A great software tool that can help you to keep track of all your passwords securely is LastPass.  I highly recommend this software.  It has helped me out so much as I can create random passwords now without worrying that I’m going to forget them.

Keep Software Up to Date

Browsers are constantly under attack by hackers, so it is important to install updates as they are provided. It’s also important to install and routinely run software designed to discover and eliminate all types of malware. If you’re the type of person who tends to forget to do so, configure the software to update and run automatically. Doing so will prevent a large percentage of the malware typically circulating from infecting your computer.

Always Back Up Your Data Files

No matter how careful you are, there is still a potential for malware to infect your computer. While system hardware is generally easy to restore, losing valuable data can create significant problems. Set up a regular routine for backing up all files, either to an on-site backup hard drive or to a cloud-based storage system. Again, the process can be automated or manual. The important thing is that steps are taken to back up all files often. If your computer is ever infected, the losses will be minimized.

I suggest Backblaze or MyPCBackup, which I use myself.  I use Backblaze for my video editing PC and MyPCBackup for my business laptop.  They are very cost effective ways of backing up your computer as you can set the software to back up at a set time each day, which is enormously helpful.  Online backup is also helpful in terms of being an “off site” backup in case of a disaster such as a flood or house fire.

The data security best practices are constantly evolving, which means all computer users should take the time to stay abreast of changes affecting their systems. By doing so, the chances of your data being lost or stolen will be significantly reduced. Taking some time to put a few precautions in place now can save a great deal of time and stress later.



from We Hate Malware https://ift.tt/3hJuSC3

Tuesday, 16 June 2020

Understanding the Cloud-Based Backup Service and Solutions

[dropcaps]H[/dropcaps]aving your data and files securely and automatically backed up is one of the most important steps you can take. Putting your documents, music, photos, and other data into the cloud lets you get your files no matter what computer or mobile device you are using. It offers a convenient way to back up your data. Switching to a cloud-based backup is an important decision that requires a clear understanding of how a solution will integrate into your business.

What is Cloud Backup

Cloud backup is a form of service through which cloud computing resources and infrastructure are used on creating, editing and restoring data, services or application backup. This form of backup is also known as online or remote backup, and it is remotely done over the internet.

The Backup Services

Many great cloud storage services have free accounts that usually come with few limitations. Some cloud storage services are niche while other specialize on e-signatures, so that your collaborators can sign all those documents that you are storing and sharing via the internet. File-syncing has become an integral part of online backups.

These days, one can sign up for an online cloud storage service such as Dropbox, Box or the Google drive and have all your files made available to you, no matter where you are located or which device you are using. The very best cloud backup solutions play nicely with other apps and services to make the experience of working with your files to be seamless.

Key benefits of Cloud backup services

As companies cope with the growing amount of corporate information that is being generated every day, they face the daunting task since not having their data, they have no business. Cloud backups, recovery and restore options have emerged as secure, cost effective and reliable solutions. The key benefits of cloud-based storage services include:

[list][item icon=”fa-flag” ]Lower total cost of ownership – A cloud backup, recovery and restore services takes the advantage of your existing infrastructure so that you do not need to buy or install expensive equipment.[/item] [item icon=”fa-flag” ]Improved reliability and speed recovery – Cloud based solutions and recovery systems instantly restore data regardless of your location including the individual files. You can work with managed service provider in establishing recovery point objectives.[/item] [item icon=”fa-flag” ]A more secure method of file transfer – The files that are selected for backup are encrypted before they are transmitted and remain encrypted once they reach their destination.[/item] [item icon=”fa-flag” ]Smarter use of IT resources – A cloud storage and recovery solution allows your business or other services to redirect IT resources to more pressing challenges or strategic initiatives within your organization. There is a built-in scalability of this form of backup that makes it easy for businesses to grow.[/item] [item icon=”fa-flag” ]Stronger compliance safeguards – Although companies continue to assume liability for the data security when moving to the cloud, a provider using multiple data centers that are geographically diverse can offer a backup solution with more reliability and redundancy.[/item][/list]

By use of cloud backups, you can access your files from your phone. Regardless of the information contained in your files and folders, you can rest assured that no one can access any of these files without your permission. Software in the background keeps your files continuously updated and automatically backed up. You can set up an account for unlimited storage and have thousands of your files backed up.



from We Hate Malware https://ift.tt/2C30L87

Wednesday, 10 June 2020

Tech that Saves Lives: The New Trend in Car Seat Safety

[dropcaps]E[/dropcaps]very summer, stories surface of caregivers who accidentally leave a little one in the car, often with horrific consequences. Tech companies have stepped in to offer parents life-saving solutions, with the hope that, once again, technology can help where human memory fails. Find out which options provide reliable assistance and which ones fall short.

Intel’s Smart Clip

Usually, child car deaths occur when an infant or toddler is left in the car for more than a few minutes. Often, a change in the family transportation schedule or a communication failure results in a memory lapse, and the child is forgotten in the car. The temperature within the vehicle rises to dangerous levels very quickly during the summer. In the winter, prolonged exposure to the cold also becomes a danger.

To combat the problem, Intel developed the Smart Clip, a small device that attaches to any car seat. It replaces the main clip on the car seat straps and rests over the baby’s chest. Inside the clip is a BlueTooth sensor. If you walk too far from the vehicle and the clip remains buckled, the sensor is triggered. The alert goes to your phone, where the Intel Smart Clip app provides additional information such as your baby’s temperature. Every 20 seconds, users receive alerts until they go back and unbuckle the baby from the car seat.

The clip’s sensor can also tell whether or not the car is moving, and it shows that information right under the temperature readout in the app. Once the caregiver unfastens the Intel Smart Clip, the sensor registers that the baby is safely out of the car seat and deactivates the alert.

First Years True Fit IAlert

TOMY International was an early proponent of technology as a life-saver in instances of hot-car death. In 2013, TOMY’s First Years car seats rolled onto the market. Each seat featured motion sensors, angle sensors, and temperature sensors for a complete readout of the child’s condition and safety. Should the seat’s temperature rise too dramatically, the unit sent an alarm to the caregiver’s phone. In addition, it let parents know if the baby was not buckled in while the car was moving, or if the seat was not properly installed in the vehicle. Although the seats worked well when alerting the primary contact, users complained that secondary contacts rarely received the necessary alerts─ and when they did receive them, they were significantly delayed. Currently the seats are unavailable as the company works to address the technical issues.

Evenflo Advanced Embrace

Another high-tech car seat with an emphasis on safety is the Evenflo Advanced SensorSafe Embrace. Walmart offers these seats, which include a hot-car alert system. Released in 2015, this model is in high demand among families with little ones. It features a special sensor with a tone that sounds loudly if the child is still buckled in when the keys are removed from the ignition. With a reasonable price and a wireless receiver that works with the car’s diagnostic system, the product is currently the only crash-tested car seat with this life-saving technology. With successes from Evenflo and Intel, other manufacturers may soon follow, integrating technology into car seats for infants and toddlers.



from We Hate Malware https://ift.tt/30tg7wY

Friday, 5 June 2020

Going Ergonomic with Your Tech

Most computer users have felt it─ that twinge in your wrists or elbows, or that cramp in your neck and shoulders. It’s the sign that your body has been in an uncomfortable position of strain for too long. Whether you spend hours typing at work or hours at home surfing and gaming, you need ergonomic technology to help your body handle the tasks that you need─ or want─ to accomplish.

Making the Curve

One tester claimed that the Microsoft Sculpt Ergonomic keyboard was his favorite for work, while others swear by the Logitech Wireless Keyboard K350, with its convenient cordless design and 3 years of battery life. In addition to its naturally curved shape, the Logitech K350 boasts 2.4 GHz wireless connectivity. For individuals who type all day at the office, the Microsoft Natural Ergonomic Keyboard 4000 provides a “gull wing” design with a 14-degree spread at the center. The keyboard’s wavy surface and key arrangement allow wrists and hands to stay in a natural, relaxed position. The wrist rest provides additional support.

Splitting the Sections

Another keyboard takes ergonomic comfort even further with a dramatic split design. The Kinesis Freestyle Solo Keyboard, created for Mac computers, comes in two separate sections with a Pivot Tether in the middle, holding them together. You can go one step further and take off the tether if you need different positioning.

Tossing Out Tradition

Is your hand cramping up from using your mouse? Ditch the traditional mouse design altogether and try the Roller Mouse Free from Contour Design. Instead of the typical oval, curvaceous ergonomic mouse, this device takes on the shape of a long, slim bar outfitted with buttons. Instead of gripping or flexing, the Roller Mouse Free interprets rolling and sliding motions from your fingers and navigates the screen accordingly.

Shaking It Up

Another mouse option takes the standard mouse design and turns it on its side. The VerticalMouse 3 Wireless from Evoluent adapts the “handshake” orientation and works well for users with large hands. Its five buttons are programmable, and its battery lasts for up to three months.

Feeling Left Out

Since left-handed users are in the minority, they are often neglected when manufacturers design ergonomic mice; but the Humanscale Switch Mouse remedies that problem. Its triangular base permits a natural, comfortable hold for either left-handed or right-handed users. Instead of a scroll wheel that could put more stress on the wrist and fingers, this mouse incorporates a navigation dish, a disc-like device for easier scrolling. The rounded palm rest and the extender feature make this the perfect solution for users of all types.

Seeing Eye to Eye

One way to prevent aches in your shoulders and neck is to keep your monitor at eye level. If your desk has no higher second level on which to set your monitor, consider a display arm so that you can mount your monitor and adjust its height and angle to best suit your height. With a minimal investment and a few key changes to your work space, you can use your computer comfortably again.



from We Hate Malware https://ift.tt/2A6djen

Monday, 1 June 2020

Diversity In The Tech Workplace

Recently, engineer Isis Anchalee faced sexist comments when she posed for her company’s recruitment ad. In response, she started the “I look like an engineer” campaign, which quickly gained momentum among intelligent women who feel the sting of gender-shaming in their chosen careers. The campaign highlighted the continuing problems of sexism and racism in the science and technology fields. Compared to the number of Caucasian men in tech jobs, the percentages of women and minorities are tiny. Diversity is a growing issue for many companies, as they face criticism for their lack of color-blindness and gender-neutrality during the hiring process.

Breaking the Bias

Apple is leading the way in openly striving for diversity among its employees. In 2015, Apple’s CEO Tim Cook, released the diversity breakdown for the company. During the previous year, Apple hired over 2,200 black American employees, a 50% jump from the number of black hires the year before that. Apple also hired 11,000 women, a 65% increase over its female hires during the previous year.

It’s a massive step forward for the big tech company, but Cook acknowledges that even more change must happen. “We know there is a lot more work to be done,” he said. “Some people will read this page and see our progress. Others will recognize how much farther we have to go. We see both.” He emphasized Apple’s celebration of difference, of uniqueness, and of teamwork.

The Same, But Different

The fact remains that many tech companies have even further to go than Apple when it comes to diversity. It’s not that women aren’t interested in the fields of science, technology, engineering, and mechanics— or STEM, as those fields are commonly abbreviated. From their early years, girls are often prodded in other directions, even by well-intentioned teachers and parents. The women that do go on to complete degrees in STEM fields have a tough time getting hired; and when they are hired, they face bias in the workplace.

Emilio J. Castilla and Stephen Benard conducted a revealing study. They found that companies who tend toward the meritocracy mindset often give smaller bonuses to women and larger ones to men, even in cases where the women and men have equal performance reviews.

Minorities face similar issues. The Computing Research Association reported that its 2010 undergraduate class was composed of just 5.6% Hispanic students and 4.2% black students. Only 13.4% of all the students were women. These low numbers are worrisome for social experts, women, and minority groups.

Goodbye, Research— Hello, Action!

Enough with the studies, already. Everyone knows that a problem exists— so what can companies do to make a significant change? Like Apple, they can make a conscious effort to hire for diversity. If two candidates for a position have equal qualifications, the hiring manager needs to make sure that he does not choose based on a subconscious bias towards the white male.

Since the problems with sexism and racism begin early, tech companies should consider creating incentive and training programs that reach children in elementary school and middle school. By donating resources, time, and expertise, these companies offer girls and minority students the means and opportunity to pursue a STEM career. Who knows? Maybe some of those brilliant boys and girls will be the next Steve Jobs or Mark Zuckerberg— just with a different skin color or gender.



from We Hate Malware https://ift.tt/2U2jyXg

Saturday, 30 May 2020

Geek or Nerd: The Labeling Game

Are you a geek? How about a nerd? These two words have generated significant, often heated debate throughout the years, especially within the past decade or two. Are they really that different? And where did the words originate?

The Original Geek

Believe it or not, the word “geek” used to have a much more negative connotation that it does today. In the early 1900s, a geek was someone who worked in the circus, doing strange or grotesque feats. If a guy made a living from swallowing insects whole, biting off the body parts of live animals, or something equally disgusting, he was a geek.

After a while, the word morphed into an expression meaning someone strange and creepy, someone who lived outside mainstream society. A geek was the guy living on the edge of town, prowling around and peeking in windows at night.

The Arrival of the Nerd

Over the next couple of decades, “geek” transitioned to mean someone odd, yet intelligent. At one time, it was nearly synonymous with “nerd.” “Nerd” cropped up first as a nonsense word in a 1950s Dr. Seuss book called If I Ran the Zoo, and it quickly crept into popular slang usage. Its meaning at first was more akin to “fool” or “square,” but it eventually came to mean someone extremely intelligent, yet very socially awkward. Like the late 90s term “gearhead,” it meant the kind of person who invented things, created tons of computer code, enjoyed high-level math, or did crazy scientific experiments. Or possibly all three.

As recently as the early 2000s, either “nerd” or “geek” was a slur, a word that a bully might hurl at a classmate. People did not enjoy being dubbed “geeks” or “nerds.”

Expanding Definitions

Today, although “nerd” is still somewhat negative, the term “geek” has a more positive connotation. In fact, many people wear the “geek” label with pride and refer to themselves as “geeks.” What’s the difference? Now, the term designates someone with a strong interest in something, who also possesses abundant knowledge about that topic. It refers to fascination on a level that approaches obsession. There are computer geeks who are experts with tech, Star Wars geeks who know countless random bits of trivia, and a million other types of geek.

Culture and the Geek

While the term can apply to a broad variety of interests, there is a definite “geek culture.” Since it is constantly morphing and shifting, it is difficult to define. Let’s just say that it may involve the Lord of the Rings, A Hitchhiker’s Guide to the Galaxy, Star Wars, ComicCon, Dr. Who, Marvel comics, huge gaming rigs, a love of ancient cultures, and an ambition to see technology advance. Think the “Big Bang Theory,” and you have a fairly accurate picture of modern geek culture.

So are you an intelligent, invested “nerd” or a social, savvy geek? Maybe you feel like you’re a little bit of both. Maybe you should create a brand-new label. Or perhaps it’s time to move beyond the labels altogether.



from We Hate Malware https://ift.tt/2zL6Ntl

Monday, 25 May 2020

Virtual Reality Headsets Take You Out of This World – Literally

It’s been a dream of many developers for a very long time. Futurists, visionaries, software developers, and gamers alike have been interested, invested, and excited about this prospect for a very long time. It is virtual reality. Finally, the dream has come true. These new virtual reality headsets can transform your brain, your life, your view, your perspective, and your life experiences. For example, you can actually now skydive through the oculus rift virtual reality headsets, without leaving your bedroom, and without needing a parachute. You can actually feel the real feeling of the experience itself – while not having to actually do it.

This is magical, make believe, while at the same time being unbelievable, but true. The new virtual reality headset is now available from Oculus Rift, Play Station, HTC Vive, and Google Cardboard. This is an all purpose device that can help you experience things beyond your reality, and also help you to create new realities at the same time. Facebook actually purchased the Oculus Rift for 2 billion dollars.

The new virtual reality headset has many thoughtful touches along with an elegantly geeky look. For some reason though, this geeky look is the new cool with a soft carrying case, and a cyber hacker’s console. The virtual reality headsets are usually manufactured and sent out in black. In having tried out the Oculus Rift for the first time, I can sincerely say that it is truly a cool experience.

That being said, it does have some touches you need to do in order to use it best. It’s important to angle the screen so that it is glaring directly into your eyes. This makes the clarity and the viewer quality much better to give you the best experience. It takes a while before you can get used to your VR headset, but once you’ve got it, you’ve got it, and you can then angle it at that just right position for all future use and gaming.

In my experience, gaming just got better. It’s like having an interesting addition to the game in order to make the experience that much more interesting and engaged with the computer screen. When you’re in flying game for example, you can see the whole cockpit all around you, from front to back. It feels like you are actually racing or flying. These simulations make the virtual reality headset indispensable for total experience and engagement gaming.

Overall, this is a very interesting product that will provide hours of online fun on your favourite video games and simulations. It’s a great way to get together with your friends for a good time and it’s just plain interesting to see how it’s going to change the world, the way we interact, and the way we experience life. My first choices to use the headset for include snowmobiling, diving, flying on a private jet, and horse racing! All things that I haven’t had the chance to do and that are a little more difficult to do when you have a family and a full time job with little time, money, and space for adventure! Adventure is now in the VR.



from We Hate Malware https://ift.tt/2ywFlim

Wednesday, 20 May 2020

The Best Free Cleanup Software for Mac OS X

There aren’t loads of programs out there that warrant users to fork out money for to enjoy their features. A good chunk are premium, but the point is you can get around pretty well with free apps.

When it comes to Mac OS X cleanup, two programs particularly stand out: CleanMyMac and Dr. Cleaner. While one comes at a fee, the other is free. But do you really need to spend that money while in actual sense you can get the features that you can really deem useful for free?

Here’s what we think!

  1. All Disk Scan

As the name suggests, this app performs a full scan of the whole disk. Looking at this from a software technician’s perspective, utility software shouldn’t have any issues scanning all disk parts. However, doing so goes contrary to Apple’s security concept for system-level files, where chances of garbage buildup are slim. File cleanup at this level may even lead to a system crash if casually removed.

Dr. Cleaner is an app that comes for free in the Mac App Store, and this makes it a perfect tool that falls in line with the Apple concept: it scans all areas users or third-party programs may reach, but it won’t compromise your system’s stability.

  1. Large File Scanning

Typically, users tend to ignore things they have downloaded – movies or large software installation packages, for example. These large files usually take up almost, or more than half of the disk disposable space.

Scanning for these files will mostly come at a cost – as is the case with CleanMyMac. In exchange for its users support, however, Dr. Cleaner offers this appreciated function for free.

  1. System Cleaning

According to CleanMyMac, system log files, user cache files and application language packs all fall under ‘System’. Looking at the latest version of Dr. Cleaner, cleanup of system and user cache files is supported. Not so for application language packs because of safety concerns.

Dr. Cleaner reckons that should the language pack be removed, program errors may occur for certain software. Not only that, there is no point in removing a single language pack which but translates to a very small fraction of disk space,

  1. Garbage Cleanup

This performs the function of cleaning up trash files. It’s still a bone of contention whether or not this is one of the features CleanMyMac charges you for, but it comes for free with Dr. Cleaner.

  1. iPhoto Cleanup

Residual cache files that boost the photo-browsing experience for the user is a benefit iPhoto users can gain when they synch their phone camera with the computer terminal. On the flipside, it also burden the disk by consuming more space.

You can view this space issue as a double-edged sword, because on the other hand, browsing is speeded up. This is true for frequent iPhoto users but can be superfluous for the occasional user.

CleanMyMac offers this feature as a value-added service, but Dr. Cleaner merges it with iTunes cache-cleaning due to its simplicity which doesn’t warrant separating out independently.

  1. Eraser

The whole point of an eraser is to make a file vanish completely without any possibility of recovery. For the ordinary user, this is unnecessary and there is no going back once you hit that button. As such, you can say it only comes in handy when putting up your Mac for sale where you don’t want your deleted files to be recoverable.

  1. Cleaner’s Smart Detective

This is a handy feature from Dr. Cleaner that automatically detects and totally cleans junk files that remain after uninstalling. All you have to do is drag them to Trash.

Let’s conclude by saying that with regard to disk cleanup, you should have an insight into the more frequently used functions. So, before you spend about $39 on a cleanup product, first try out a free one that fulfills about 80% of the functions.



from We Hate Malware https://ift.tt/2Xk8MNb

Friday, 15 May 2020

5 PC Upgrades That You Can Afford

Sure, your desktop PC is great, but you’re itching for an upgrade. The trouble is, you don’t have a huge budget to swap out all the hardware to the most cutting-edge stuff. How can you make your dollar stretch further and get the improved performance that you want? You’re about to find out.

More Memory

And more, and more. As much as you can fit into your current hardware. Go ahead and max it out—you can do that without maxing out your budget, since memory is fairly cheap. Load up on memory and you’ll see an instant boost in performance. When you select the memory, be sure to pick the fastest kind that your system can take. You may even be able to do a little over-clocking.

A High-Powered Video Card

Whether you’re a gamer or a media enthusiast, you’ll notice the difference immediately when you upgrade your video card. For a few hundred bucks, score a graphics card with drastically improved resolution capability, frame rates, and overall quality. Just make sure that your current CPU can keep up with the new guy in the system.

A New Computer Case

Okay, so this may not directly improve the speed and power of your machine, but it can definitely make your rig more user-friendly. Whatever bugs you about your current case, fix it with a new one. Go with a new case that can handle USB 3.0 or higher, or one that you can open up more easily for hardware swaps. Maybe you just want something that looks cooler, with more clear panels through which you can see the whirling, glowing fans and all the fantastic components. Whether you need more bays, slots, and connectors or better looks, getting a new case can quiet the upgrade urge— for now.

A Bigger Hard Drive

More space for your stuff? Yes please. Treat yourself to a massive hard drive upgrade— we’re talking a terabyte or two of space, room enough for all your games, your favorite programs, your media, your photos, and your documents— plus the kitchen sink.

A Faster Hard Drive

If you like to keep a sleek, streamlined machine, and you don’t need or want a virtual cavern of storage space, skip the 2TB hard drive and go with a solid state drive instead. These speedy drives keep dropping in price, so you should be able to snag a sizeable one for a couple hundred dollars. If you want fast speeds plus extra space, consider having two drives in your system— a solid state drive as your primary drive, hosting your operating system, and a standard secondary hard drive for extra storage.

The next time you start craving a system overhaul that’s not in your budget, indulge yourself with a smaller upgrade that gives you a serious performance boost. When you spend your cash wisely, you can make a difference in your cyber life without breaking the bank.



from We Hate Malware https://ift.tt/2y5K6zc

Sunday, 10 May 2020

Choosing the Best Web Hosting Plan

With your website already set, you’re now wondering how and where you can find a web hosting plan that will be able to accommodate all your needs. Getting it right for the first time is crucial if you look at the bigger picture; changing your hosting provider will cost you in terms of time and downtime which may lead to loss of both existing and probable customers.

Ask yourself

There are a few issues you need to grapple with when it comes to web hosting:

  • Is your website meant for personal or business use?
  • What kind of customer service and technical support are you looking for?
  • As the business grows, will the provider be able to accommodate all your needs in terms of privacy and security?
  • Does the provider include domain name registration and e-commerce support? What kind of user interface, website tools, and control panel does the provider offer?

Many website owners tend to overlook some of these important issues which become a pain later on as the site grows.

Simplify your Work

Regardless of the provider you decide to go with, following are some of the things you should be looking out for:

Excellent Support

Confirm if the provider is available around the clock. Are they able to answer your queries thoroughly and swiftly? How easy is it to get in touch with them? Give it a few days trial to see if they can be able to address all your needs quickly and effectively.

Your Website must be Available

Aim for not less than 99.9% uptime. Even 98% is not good enough. If the provider can’t guarantee this level of uptime, you’re better off looking for one who can.

User Interface

Not everyone is endowed with programming skills. As such, go for a hosting service with a friendly control panel. Watch a demo, if available, and get a good feel of it.

Domain Name

Before starting the search for a web hosting package, it’s good that you know your needs. When it comes to purchasing a domain name, most companies aren’t of any help really. Some will charge you a small fee for registration, some will give it to you for free. Settle for a web hosting company that matches your needs.

Is it what they say it is, really?

Bandwidth

Never fall for companies that promise you ‘unlimited’ bandwidth. No one will bear the traffic cost for you, and some people have learned this the hard way after being slapped with ridiculous monthly fees having exhausted the ‘unlimited’ data transfer. Never make the mistake of overlooking this important point, you might end up coughing heavily in terms of cost.

Disk Space

‘Unlimited disk space’ claims are just another ploy similar to ‘unlimited bandwidth’. Most sites will take up less than 5MB of web space, and a company enticing you with 500MB knows all too well that you’ll never exhaust this within the given time. Here’s a rough estimate for you.

SSL (Secure Server), MySQL, Shopping Cart

Always check to see if these facilities are available before you tie yourself down. They will be offered as a higher priced package, or included as additional costs. For those looking to gather credit card information on their site, SSL is definitely a must.

Email, Auto-responders, POP3, Mail Forwarding

Having a personalized email address on your own domain will come in handy at some point; something like sales@yourdomain.com and so on. Look for an email software that can help you achieve this.

Price

Always remember that cheap is expensive in the long run. And going for the most expensive web hosting provider doesn’t mean you’ll get the best service either. Strike a balance. Choose a provider that is capable of providing more than you need, and their charges are favorable to you.

Today, there are many web hosting service providers, even teens working from their bedroom. In this industry though, the high cost you’re capable of meeting doesn’t have you guaranteed superior service. To avoid bias by listing some providers here, it would probably be a wise idea to check out what the community is saying on the hosting forums; there are plenty of them.

Most often, you’ll probably settle for a trade-off between cost, features you’re willing to live with, and reliability.

Happy looking!



from We Hate Malware https://ift.tt/3fEfF40

Tuesday, 5 May 2020

Cloud Computing: One Size does not Fit All

Whether you’re sending a teen or a college student off or heading back to school yourself, you need a reliable, portable laptop to take along. You’ll need it for taking notes, for checking class schedules, for turning in homework virtually, and for networking with everyone back home. Keep these 7 tips in mind as you shop for the ideal back-to-school laptop.

  1. Portability

It’s a no-brainer, really. You may long for that massive, heavy gaming laptop, but you don’t want to lug it around campus. Choose a laptop that is built for portability─ lightweight and compact.

  1. Storage Options

Not only do you need space for your homework documents, class spreadsheets, and other school-related data, but you will want some room for personal photos and videos. Pick a laptop that has plenty of hard drive space, as well as room for expansion if you need it. Be aware that some laptops, like the Chromebook, contain no hard drive. You have to have constant internet access to use these models.

  1. A Good Name

Avoid choosing the cheapest option simply because of the price tag. Stick with well-known, respected brands like Dell, Lenovo, Acer, HP, and Apple. These and a few other manufacturers are known for turning out high-quality, reliability laptops, geared for students and business users.

  1. The Cool Factor

You’re going back to high school or college, so the cool factor is definitely a plus. Apple has the corner on cool with many users, but you’ll find other good-looking machines that blend style with serviceability. And remember, you can always purchase an awesome laptop sleeve or a fashionable laptop bag to boost your style points.

  1. Keyboard Ergonomics

Chances are, you’ll be doing a lot of typing. Taking notes in class, creating reports, communicating with friends and teachers─ that’s a lot of hours for your fingers to log on the keyboard. Before you buy a particular model of laptop, test it out to ensure that your hands feel comfortable and your wrists are adequately supported. You can purchase additional accessories like wrist rests and an ergonomic mouse if necessary.

  1. Battery Life

You may be tempted to buy a used laptop and save money. However, be sure to ask about the battery for the laptop. When you’re in class typing up the notes for an upcoming exam, the last thing you want to worry about is your laptop’s dwindling battery power. Make sure that you purchase a laptop with a long-running battery, preferably with several hours of use per charge. The MacBook, Macbook Air, Dell Inspiron 3000, Lenovo Yoga, and HP Spectre lines all rank highly for battery life.

As you consider all these important qualities, remember to take into account all the hardware-related factors as well─ RAM, processor quality, graphics card potential, and screen size. If you’re unsure what you need, test out some friends’ laptops to get a feel for the available options. Take a tech-savvy friend with you on your hunt for the ideal back-to-school laptop for your lifestyle.



from We Hate Malware https://ift.tt/2A3y4ai

Friday, 1 May 2020

Tips To Keep Your Data Safe

Daily use of computers has expanded exponentially in the last few years, and more and more people are using their computers and smartphones to do a ton of their daily day to day tasks, shopping, communication, and entertainment.  All the data being passed through your computer and over the internet leaves more and more opportunities for that data to get scooped up, stolen, or lost.  In order to protect yourself and your data there are a few tips that you can easily employ in your day to day habits.

Back Up Your Data

This is actually my first tip because it can really save your butt if anything goes wrong.  If your computer falls victim to a virus or malware (or even a dreaded ransomware) then you can easily just reset your computer and start from scratch.  You won’t have to worry about losing your valuable data, photos, documents, and videos.  These will all be safe.  I highly recommend a two pronged data backup strategy.  A local backup on a removable hard disk and a cloud based backup.  This will give you a local backup for fast access as well as an off site backup in case of an event where your hard drive breaks or gets destroyed or stolen along with your computer.  Internet speeds have improved so much and cloud based backup plans are unlimited and very cheap (you can get a great plan from Backblaze for $5).  It’s almost a liability NOT to have one.  And in my own personal experience, Backblaze saved my butt when my hard drive failed.

Employ Antivirus And Antimalware software

Having an antivirus software program on your computer is an absolute must.  If you don’t have that as a bare minimum, you’re really asking for it.  I recommend Norton 360 as a lightweight, active protection system.  In addition you might want to use an antimalware software program in order to get rid of programs that can subtly slip by Norton because they are acting like legitimate programs.  This includes adware and spyware.  I had a run-in with the Conduit adware and Spyhunter 4 cleared it right up.

Avoid Internet Bad Neighborhoods

Although even high-profile and secure websites can still fall victim to hacking, most of the time viruses and malware are most prolific in internet bad neighborhoods.  These include adult sites, gambling sites, hacking sites, free software and download sites, and torrent sites.  It seems that any time you venture over to sites like these you get a virus or some weird infection on your computer.  Avoid sites like this altogether, and if you simply must go to them you might want to just get a cheap netbook dedicated to that stuff.

Update Your Software

When you get a notification that a software program has an update available, always do it as soon as you can.  Most of the time these software updates are for patching security holes.  This is especially true when the update is for your internet browser, Adobe Flash, or any program that you use that connects to the internet.  Enabling automatic updates is a great way to not mess this up.

Stay Up To Date

Reading security blogs for the latest in terms of internet and data security is a great way to educate yourself.  If you know what to watch out for you’ll have an easier time avoiding things like email phishing scams and other tricks.  Once you learn more and more about the patterns that make these things evident you’ll be much better able to identify such things in the future.

Do you have any tips for our readers?  Leave a comment below!

 



from We Hate Malware https://ift.tt/35mxTlW

Wednesday, 15 April 2020

The Skimmer Scam: How to Stay Safe

You lean back in your office chair during your lunch break, sipping your second (or third) cup of coffee, and decide to check your credit card account balance, just to keep on top of things. You log in to your account and stare at the numbers. Something isn’t right. There must be some mistake, you think. Your balance is significantly lower than it should be.

You check your wallet. None of your cards are missing. How could someone have stolen your money without access to your physical credit card? With technology, of course ─ in this case, a credit card skimmer.

Know the Facts

A skimmer is a diabolically ingenious little device that looks like a real card slot, the kind that you stick your card into when you’re paying for gas or withdrawing money from an ATM. The skimmer fits over the real card slot, and when you insert your card, it collects all the information. Skimmers range from cheap-looking pieces of tech to high-end mimics of genuine card slots.

Some skimmers work in conjunction with tiny cameras, which record PIN numbers while the skimmer captures key data with a magnetic reader. While the alert consumer can sometimes spot these devices, many of today’s distracted, busy users never suspect them at all, until it’s too late.

Crunch the Numbers

According to the United States Secret Service, ATM fraud losses come to around $350,000 or more each day of the year, and card skimming is responsible for over 80% of that total. Thieves that use skimmers usually install them at self-service, point-of-purchase machines like gas station pumps or ATMs. Lots of people come through these areas, so the criminals can blend in easily as they install and reclaim their device.

Dare to Compare

Your best defense against this kind of theft is vigilance. Whenever you use an ATM or gas pump card slot, take a look around first. Note what the other gas pump card slots look like. Do they differ from yours? If so, your pump or the one next to you may have a skimmer attached.

At ATMs, the bank sometimes posts a photo of the card slot to show you what it should look like. If it looks different, there may be a skimmer present. However, keep in mind that thieves could always post their own photo over the original to throw you off.

Spot the Skimmer

Note the color of the rest of the machine. If the card slot and the area immediately surrounding it don’t seem to match in hue, weather wear, or style, you may be looking at a skimmer. Even if you just have an odd feeling about the setup, trust your gut feeling. Find another ATM or an alternative gas station. You might just save yourself the hassle and stress of ATM fraud on your account.

Give Them Some Credit

When you pay for gas, use your credit card instead of your debit card. For a credit card, you only have to enter your ZIP code, whereas with a debit card you have to type in your PIN. A hidden camera could collect that keypad information easily.

Watch your credit card and bank accounts carefully, checking them every day. Your vigilance enables you to alert your financial institution if any fraud does occur. The faster you notify them of a problem, the sooner they can investigate and return your money to you.



from We Hate Malware https://ift.tt/34GfvnV

Monday, 6 April 2020

Windows Zero Day Bug Goes Up For Sale

A zero day bug in several versions of the Windows operating system has been found by a hacker and put up for sale on a popular cybercrime forum.  Zero day bugs are those that are previously unknown – new bugs that are unknown even the the developers of the software itself.  These vulnerabilities have become more and more popular these days as bug bounty programs increase in price.

These types of vulnerabilities have been in the news lately because of their growing role in foreign and domestic government conflicts.  Most recently the FBI purchased a zero day vulnerability to access the iPhone of the San Bernardino terrorist.  It was the only alternative to forcing Apple in court to open up a backdoor – a conflict that had many in the security community up in arms.  But Apple didn’t need to create the backdoor – someone else did.  And it’s considered a zero day bug because of the unknown nature — it’s out there, but only the person (or persons) who found it and the FBI are privy to the details.  Apple still, apparently, doesn’t know how they did it.

These zero day bugs carry a large bounty.  And thus the different roles of hackers were born: white, grey, and black.  Those that just give up the bug for the sake of education and public interest are known as white hat hackers.  They ply their trade as a hobby, knights in shining armor of the security community.  They like to find the bugs first before the bad guys.  They give up their secrets for free (or sometimes reward) to the companies that publish the software.

Grey hat hackers are those that find vulnerabilities and sell them to governments.  It’s unknown whether or not the government will use those vulnerabilities for good or ill, hence they “grey” nature of their deeds.

Black hat hackers use their knowledge to inflict damage on others and software itself.  They are the vandals and bandits of the cyber community.  The recent zero day Windows bug was found by a Black Hat hacker and was put up for sale on the cyber crime forum exploit[dot]in.  As reported by Krebs On Security, it appears that rather than get a larger sum of money from Microsoft for the bug bounty, the hacker was willing to take a smaller financial sum in exchange for the reputation points that selling such a vulnerability on the forum would bring.

It’s an interesting conflict of interests, and a study in human nature.  But one thing is for certain – zero day flaws are fast becoming a very profitable commodity and there is big business in cyber warfare.  As more and more of our daily lives and business are conducted online and through computers, the greater in value these security holes will become–whether for good use or ill.

What do you think should happen?  Should the government begin to subsidize bug bounty programs?  Should companies step it up and offer even greater sums of money to try to turn grey or black hat hackers towards the white side?



from We Hate Malware https://ift.tt/3aQS0KP

Wednesday, 1 April 2020

Cryptowall RansomWare Protection

Ransomware is one of the worst things that can happen to a computer.  One of the most destructive forms of malware, ransomware will lock a computer’s files in exchange for a payment.  The even worse thing is that many times these files are then unrecoverable because ransomware encrypts the files – meaning that unless you have the key, you’re pretty much up a creek without a paddle.

The best thing that you can do is to protect yourself as best as you can.  That means installing adequate antivirus software, antimalware software, and special software tools that can protect against certain ransomware programs.

One such program is Cryptowall Vaccine, a program from Bitdefenders that can stop any encryption of your files, even if you do become infected with the ransomware.  It’s a genius program, and one that we highly recommend anyone install on their computer.  It’s free, and you won’t even notice it.

According to BitDefender, machines are taken hostage through methods that don’t really require any sort of user interaction at all.  That means exploits in your browser could allow the installation of the ransomware from a hacked or infected website.  The website could be any site that you visit on a daily basis – and it doesn’t necessarily have to be a “bad” website such as an adult or gambling site.  Any site is subject to being hacked and turned into an infection point of contact.

The only thing you can really do with Cryptowall is to prevent it – there’s really no other way around it (unless you want to pay the ransom).  So we highly recommend this free program, especially if you run a business or have unreplacable files.

Another great way to protect against these ransomware attacks is offsite backup to the cloud using software such as Backblaze or Crashplan.  These programs can help you to automatically back up data to the cloud so you won’t be out of luck if anything happens to your PC.  This is another thing we HIGHLY recommend doing if you haven’t done so already.  Just last week I myself suffered a hard disk failure and had I not backed up with Backblaze I would have lost data that was absolutely unable to be replaced.

 



from We Hate Malware https://ift.tt/2R4QZab