You are welcome to discuss various security topics with our professional team and other users like you!
Read our Registration Agreement and create your FREE account here!

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - Execute

Pages: [1] 2 3 ... 6
1
Web Browsing Practices / Google Calendar Spam - How to fix it?
« on: August 27, 2019, 03:51:33 pm »
Many users are reporting to have spam in their Google Calendar.
They do not suspect that they themselves have given access to all applications they use with the same account. With that access the ads will come flooding their calendar. To stop this, you have to the option "Automatically add invitations to my calendar" to OFF.

2
Nasoh is the latest threat from the STOP ransomware family after the recent appearance of .cosaroh earlier today.
Nasoh is no different and includes the same ransom note, infection technique and spreads around Egypt, India and some third World countries. To see how to remove this virus and if there is a potential to restore your files, head over to our blog article:

Nasoh File Virus (STOP Ransomware)

Kind Regards,
Execute

3
Malware Removal Questions and Guides / COHAROS VIRUS
« on: August 13, 2019, 11:50:50 am »
COHAROS VIRUS virus is the newest variant from STOP DJVU ransomware.
The cyber criminals behind Coharos keep uploading their malware and infecting more users across the World,
including Nigeria, Vietnam, Indonesia, Turkey, Cambodia and other countries.

It seems that there are little to no changes compared to previous versions, but you can check out and read our article,
for a precise, on-point information right here:

Remove .coharos File Virus

If you are a victim, do not pay the ransom, as soon there might be a file restoration tool.

4
Have you had your browsers redirect you to the search engine of Bing,
while your settings are actually set to another search engine?
If you have seen such suspicious activity,
then you most probably have your computer machine infected with
the Bing Redirect "Virus".

Visit the page above and read the article on how to deal with it.

5
Malware Removal Questions and Guides / How to remove Bopador Virus
« on: July 25, 2019, 06:17:20 pm »
If your files have an extension .bopador and Windows has named every one of them as a "BOPADOR FILE" than your computer system has been compromised and you have the Bopador Virus. The Bopador Virus is part of the STOP ransomware family and as such it is very dangerous. Usually a decryptor comes out for most versions after a week or two, but that isn't a guarantee that your files won't get encrypted again. You have to remove the ransomware cryptovirus with an anti-malware software. Read the article linked here to learn more about this threat and how you could remove it from your computer machine:

Remove Bopador Virus

If you have feedback or any questions, feel free to leave a post here, under this topic.

6
Recently, it was discovered that ANY 8-character password can be cracked in under three hours with the most current hardware.
For Linux users, the time for cracking may be more, but the password is fully crackable.

Every possible combination of Upper, Lower, Number and Symbol characters can be fully cracked on a single device, in around two and a half hours, give or take.

It is strongly recommended to change such passwords and make them longer, switch from meaningful words to random characters.

7
A new ransomware has been detected to spread in the wild.
Some researchers claim that some files could just be renamed instead of encrypted.
However, users' computers are still infected with the virus.
You can read about it in the following article:

.Encrypted5 Files Virus – How to Remove It

8
Anatova ransomware has been analyzed by malware researchers from McAfee Labs. They have pointed out that the Anatova ransomware is disguising itself as games and software, thus tricking users into downloading and executing the virus.

Anatova is distributed through peer-to-peer networking, masqueraded as free downloads for games and applications to lure unsuspecting users into downloading the cryptovirus.

You can read more about it from the Remove Anatova Ransomware

Have you been hit by this cryptovirus? Tell us about it.

9
Internet and Networking Security / Top 10 Security Smartphones for 2019
« on: January 15, 2019, 10:18:15 am »
Given that cyber-security and smartphones are two words used very commonly nowadays, while companies spend billions on making security smartphones, our team has created a comprehensive review and comparison on the 10 best security smartphones that you can see from the following link: https://sensorstechforum.com/most-secure-smartphones-2019/

Tell us what you think, what phone you are using and why in this thread or in the article's comment section.

10
It appears that cracked games hosted on PirateBay and related torrent trackers contain malware executables.
We at SensorsTechForum have received reports from users that have downloaded games such as Overcooked 2 and Battlefield V and had their computer systems infected with the GandCrab v5.0.4 ransomware cryptovirus. Beware of torrent trackers and cracked video games as they may very well yield various malware, especially dangerous viruses like GandCrab.

You can read more information about the GandCrab v5.0.4 threat from the link below:

https://sensorstechforum.com/remove-gandcrab-v5-0-4-cryptovirus-restore-files/


If you have been infected like that or via other ways and other malware - share your story below.

11
Mac Tips and Suggestions / 5 Mac Tips to Prevent Infections
« on: November 29, 2018, 05:00:37 pm »
Avoiding infections on your Mac machine is easy if you follow a few tips:

1.) Enable Automatic Updates for anything that processes untrusted data.

Namely, the Operating System, Anti-malware, browsers and Flash Player.  It's critical that you're getting updates for the products fast and often.

Attackers are very sophisticated, and can exploit unpatched programs from a few days to a few weeks. Enabling automatic security updates will save you time and effort, while keeping your system safe.  The inconvenience of the occasional functional problem pales in comparison to what you might experience if some malware gets to your machine.

2.) Don't click links on websites or emails

Especially if they point to updates. Also, make sure that you always download installers directly from the App Store or vendor of the corresponding program.

Allow yourself to be skeptical, because it's quite easy to make legitimate-looking notifications. Don't follow links or pop-up notifications as a general rule of thumb.

When having automatic updates enabled and something tells you that you need to update it, it is highly likely that it's fake.  Wherever possible, just download applications from your operating system's App Store.

When you are unsure whether you need an update, open a new window and search for the specific product.  Make sure you're going to the developer's website and not to some random download site.  Download any software directly from the vendor and install it.

3.) Steer clear of suspicious sites

Nothing is free. If you're not paying, you're the product. When it's Facebook, they're selling your information. When it's something else, such as control over your computer.  Nobody is compromising your machine for fun. They're getting paid.

4.) [Optional] Use two-factor authentication, get a password manager, rotate all of your passwords[/size]

On a daily basis we receive news about data breaches, like the recent Amazon Privacy Incident reported before Black Friday, last week. Unique passwords limits the damage done by any individual breach.

So, you need a unique password for each site that you use, and wherever possible, you should also enable two-factor authentication. Two factor authentication is your friend. It will ensure that even if a hacker has your password, they also need control of your phone or secondary authentication hardware/software, in order to do anything with it. You want this enabled.

It's not uncommon for malware to install keystroke loggers to capture valuable information like log-in credentials, so you have to stay safe. Don't use credentials from any machine that you can't trust with 100% confidence.  If your other machines have been compromised or keep getting compromised, limit your use of anything important to the one machine you do trust, until you can work through everything and get it all back to a trustworthy state.

5.) [Optional] Use a browser with Flash Player Built-In

Adobe Flash is heavily used for exploits. Rigorous exploit kits have been packed is JavaScript files and other obfuscation methods, ready to be triggered by a few clicks or site visits. If you have a Flash Player that is not updated, many vulnerabilities exist that could allow hackers to access your machine or insert malware.

Having a Browser with Flash Player as a built-in component will help you in that regard. The Google Chrome browser for instance, includes that component. There's nothing separate to install or maintain, thus you can ignore any pop-ups or messages telling you that you "need to install / update Flash". For example, a Fake Flash Player for Mac notification is going around the Web, for the past month that claims that Flash is "out of date". Do NOT trust any such statements.

Manually typing a site's URL and checking the URL's and its redirects can ensure that you are going directly to the vendor of an application to get legitimate updates (if there are any).



This is an open discussion and if anybody has tips to add, is more than welcome to do so.

Best Regards,
Execute

12
Beware of the newest .STOP Ransomware variants!

They are the following:


You can read more about every variant in each of the specific articles.

These viruses are ransomware types, which try to extort their victims for money. Here is an excerpt from the ransom note of one of them:

Quote
Your databases, files, photos, documents, databases and other important files are encrypted and have the extension: .pumas
The only method of recovering files is to purchase an decrypt software and unique private key.

Be careful and don't pay the ransom sum demanded from the cybercriminals.

In addition you can watch our removal video if you need further help with any of these threats : https://www.youtube.com/watch?v=Bg0m1OfdfRs

13
In this section links for the EternalBlue patch will be provided for all Windows operating systems.
The EternalBlue vulnerability is still being used by attackers in the digital world trying to infect users' PCs with WannaCry, other ransomware and malware. It is crucial that you update your Windows system with this fix if you haven't done so already.

In case you do not remember if you got this update - downloading and running it will tell you if you already have it. If not - install it.
Links are taken from Microsoft.


Before applying the update, know that it will restart your system to apply its changes and that you should not run anything else when you are running the update.

If you need to add anything or ask questions, just leave a comment under this thread.

14
Good news!

A free decryption tool has been officially released today by BitDefender Labs, in collaboration with Europol and Romanian Police.

One week ago, the cybercriminals behind GandCrab released decryption keys for Syrian citizens, only. With those keys and further developments, a versitile decryption tool is a reality. You can find instructions on installing and running the decryptor as well as a download link from the article linked below:

How to Decrypt Files Encrypted by GandCrab Ransomware (Free)

Check it out and reply with your results. Maybe it might not work with absolutely all versions of the Gandcrab ransomware.

Best Regards,
Execute

15
Mac Viruses and How to Remove Them / Mac Cleanup Pro PUP - How to Remove
« on: October 17, 2018, 12:26:31 pm »
Mac Cleanup Pro is rogue application. It is developed by PCVARK which is tied to other applications considered rogue software and PUPs. Also, Mac Cleanup Pro pushes various advertisements inside the products to advertise other ones developed by the same company. Scare tactics are also in play, with messages that appear trying to trick Mac users into installing other PUPs or malicious apps.

If you have Mac Cleanup Pro installed on your Mac then check out the article to know more about it and how you can remove the application and everything related to it:

Remove Mac Cleanup Pro PUP

Pages: [1] 2 3 ... 6