Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Recover hidden files by viruses using this Un-Hider program

Since the advent of massive amounts of computers, we have also been dealing with viruses and malicious codes to the extent of diversification. Nowadays, there are already all sorts of malicious codes, capable of carrying out any action to affect the functioning of the system. However, even today there is still something very common, and very annoying which has been ignored by anti-virus and is a virus hiding files.
 Recover hidden files by viruses using this Un-Hider program
Although some viruses of this kind are harmless, the first impression when you run the device and not see your saved files is a disaster. However, you can solve this problem using the Un-Hider program.


Different forms of this virus are different, able to take your files and change their attributes to "hidden", so that when connected, we will not be able to see any file. This virus is really harmless and will not damage files, but it can quickly replicate between computers, so it's best to eliminate it from the root.

There are many ways to solve this problem without using additional software, and Un-Hider is responsible for eliminating malicious software from its roots. To use it, just download and run it, because it is a portable program.
  
After that, you will be asked to select the volume. Then click "Un-Hide", it will only take seconds before the computer application leaves the infection free. You can repeat the process with all your storage partitions on your device.
 
To understand the program see the following video

This extension is important because it blocks websites that can steal your information

When you browse the Internet security will always come in our priority and much more especially in our day where computer attacks are everywhere. In this sense, we need to carefully check the type of sites we visit and even more so when we leave personal information. To increase your protection there is an add-on that can help us in this area, providing security information about the sites before we get into them.

This extension is important because it blocks websites that can steal your information

That's why we offer you today Emsisoft Browser Secutiry, an extension of the Google Chrome browser that is able to protect us from sites that are potentially dangerous to us.

 This extension is important because it blocks websites that can steal your information

 Phishing attacks and password theft are rampant at this time, as hackers are still creating solutions that allow them to be impenetrable in stealing passwords and private data. This is why it is very important to know what websites we visit and where we add personal information, since it is very common to be victims of information theft under these circumstances. In this sense, Emsisoft Browser Security tells us if the sites we intend to visit are safe.

This extension is important because it blocks websites that can steal your information

Emsisoft Browser Secutiry is able to tell us if the sites we plan to open are really safe. This is done by reviewing a strong database. If you match any dangerous site, the extension will immediately notify you, indicating that the site is blocked for security reasons.
Add Link: Emsisoft Browser Security






6 consumer devices used in your home can hacker penetrate

Smartphones, home automation systems and virtual personal assistants can make life easier for all of us, but everything has its price and challenges. The biggest concerns in this area are piracy, yes piracy and hacking are the biggest threat to devices and the new life system based on Internet-related technology devices permanent.

6 consumer devices used in your home can hacker penetrate

Breakthrough now not only threatens computers and smart phones, but a set of technologies and devices that you use in your home can be vulnerable to penetration. In this post we will identify the six consumer devices used in your home can hacker penetrate.


1. Refrigerators

 Refrigerators

 Home refrigerators are simply cooled food and drinks, but smart refrigerators have been developed and incorporated into tablet PCs to allow you to view calendar, play music, watch videos and even make purchases online. Future smart refrigerators can also identify the food and drinks inside, and automatically alert you to the need to buy missing items. These functions can make everyday life a little easier, but you have to be very careful with such devices.

A digital security company discovered that two weeks ago, between 23 December 2013 and 6 January 2014, cybercriminals hacked 100,000 smart home appliances, including refrigerators. They even used the Internet connection of these refrigerators to send malicious messages to others!

2. LEDs


 LEDs

 Hackers can connect to various devices connected to the Internet and this is something known. But smart lights are particularly vulnerable to piracy, as researchers from Israel and Canada discovered last year. Hackers may be able to remotely control these bulbs remotely, such as turning them on or off, and changing the light level.

3. Printers


 Printers

 Just like computers and smart phones, some printers come with Wi-Fi connectivity, which makes them a victim of hackers. After hackers can break through the printer, they can see what is being printed on the device, and the computer with which the printer is connected may be attacked. In February 2017, a hacker wrote automated text to manage more than 160,000 printers connected to the Internet without a firewall. Although he can print threatening messages or steal confidential data from these printers, he only prints the messages shown in the following picture:



4. Games



Some toy companies, which produce smart dolls equipped with sensors that transmit all kinds of data, from sound recordings to all vital indicators of the child. Earlier this year, pirates had access to 800,000 client accounts using such games, which could threaten the confidentiality of sound records stored in their system.

5. GPS device


GPS device

Regardless of whether is an independent device or built-in car, GPS can greatly reduce the time of the person when traveling. But hackers can penetrate the GPS on the phone or in the car to track the owner's location, send a person to a dangerous place or even cause an accident. Using a GPS simulator, hackers can also rig coordinates to change location data.

6. Cars


jeep car

In 2015, two security researchers were able to penetrate and control the Jeep, while Charlie Miller and Chris Falasik managed to control the radio, windshield wipers and air conditioning in the car. Furthermore, the researchers also managed to change the car's speed, brake and track movement with the GPS.













 



Android: a security vulnerability allows to spy on you since 2013

Android: a security vulnerability allows to spy on you since 2013

Android is the victim of a serious security breach. With this breach, an attacker can easily install malware on your smartphone to collect your personal data, including your browsing history. All versions of Android, from Kit Kat (released in 2013), are affected.

Android security vulnerability allows spy since 2013     
 "A flaw allows attackers to access sensitive information from all Android devices, including web browser history, messages and banking application data," said Sergey Toshin, cybersecurity researcher at Positive Technologies. Only users of a web browser that uses the Chromium rendering engine, such as Chrome or Samsung Internet, are affected.
 

A serious security vulnerability has been identified on Android: Google deploys a patch


According to the researcher, the flaw is in the WebView component, which is preinstalled on your smartphone. It is basically used for displaying web pages in Android apps. By exploiting this vulnerability, an attacker can easily hide malware or malicious applications in your device. "The WebView component is used in most Android applications, making these attacks extremely dangerous," says the expert.
 Once this is done, the hacker will be able to siphon "information from WebView from other applications", which includes the history of your web browser or your login credentials online, Facebook or Twitter for example. According to Sergey Toshin, there is no evidence that the flaw was used by a pirate to launch an attack.

Fortunately, Google has fixed the flaw with the release of Chrome 72 last January. "Since Android 7.0, WebView is implemented via Google Chrome and, therefore, updating the browser is enough to correct the problem," says the researcher. We invite you to update your browser without further hearing. For users of an earlier version of Android Nougat, update WebView without delay by going to the Google Play Store.














How to Remove Hidden and Preinstalled Applications in Windows 10


Windows 10 provides the default installation for many preinstalled applications, which in most cases are not used. We have previously talked about how to remove these applications from your device, however, some applications can not be removed because they are hidden.
Remove Hidden and Preinstalled Applications in Windows 10
Fortunately, although it does not appear in the above way, there is still a way to completely remove it from Windows. Here's how to remove previously installed Windows 10 applications that are hidden on your computer.


Since you take something to come with the system, it is always best to make a backup and restore point before performing the next operation. In addition, if you do not know the purpose of the program and are afraid to uninstall it, it is best avoided.

How to Remove Hidden Applications from Windows

As mentioned earlier, these types of applications can not be removed directly with Windows, and it is necessary to use an external tool.

Go to this link and click "Download" for "O & O AppBuster";
 
After the download, enter the folder where the file is located and run as administrator;
 
 At the top of the app, click View and leave the Hidden Apps option selected;
 
Select the apps you want to uninstall and click Remove;
 
 In the window that appears, you can choose to delete the app only for you or all Windows users. Click OK and wait for the process to complete.
 
 In addition to removing hidden applications from Windows 10, you can also uninstall other bloatwares from it. To do this, in addition to displaying the "hidden" option items, allow AppBuster O & O to also display "normal applications."


How to protect from the new ransom virus "the bad rabbit" that hit the European countries

After the ramps of the ransom virus "I want to cry" corruption in the earth, and the virus was able to cause an electronic attack is unprecedented in the world in 2017, broke into the computers of dozens of countries and institutions and major international companies and the information and documents in them, and demanded the pirates of the victims to pay ransom for Decryption.

 ransom virus "the bad rabbit"

After a major security update from Microsoft and a host of other systems, virus attacks have been halted, but it seems that it has not yet ended. A similar virus, known as the "bad rabbit", has been identified this time and has been widely known in a number of European countries, namely Russia, Ukraine, The number is high.

The virus has so far succeeded in attacking the Odessa airport and the Ukrainian Ministry of Transport. Metro Kiev and a group of Russian press institutions as well as in Turkey and Bulgaria at different levels.

How does the virus spread?


According to several security reports, the new virus is spreading in an imaginary update of the flash program, and the virus comes with tools that help it move horizontally within the network, which may explain why it spread very quickly across many organizations, companies and countries in a short time. To servers and computers running on the same network via "SMB".




When the computer is infected with the virus, it first encrypts the files on the user's computer and replaces the MBR (Master Boot Record). When it does its job properly, it restarts the user's computer and shows you the malicious message that prompts you to go to the hacker's site. Push 0.05 configuration to retrieve your files.

 

How to protect yourself?


First, if you have a flash program on your computer, do not update it except from the official Adobe website, and if you see any message asking you to update the program do not do so.

Second, prevent the following extension from your device:
  c: \ windows \ infpub.dat
c: \ Windows \ cscc.dat.

Thirdly, stop WMI services to prevent malicious software from spreading in your network.