tag:blogger.com,1999:blog-53793387989189825442024-03-12T19:45:15.367-07:00PC ProtectionA blog created to help you to keep safe online and protect yourself from the thousands of online threats that you could face.PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.comBlogger13125tag:blogger.com,1999:blog-5379338798918982544.post-50745104618266704162010-11-15T04:07:00.001-08:002023-03-12T07:04:28.348-07:00Fake 'Support' Call Centre Calls - A New Scam?Recently a new scam has emerged, involving calls from fake call centres, and pretending to be from Your ISP/Windows/Microsoft. <br />
<br />
The scam uses social engineering to trick users over the phone into believing they are infected, then tries to get them to download fake/rogue software as well as connect to a remote 'support' session and charge them money for the software.<br />
<br />
You can read more information about this scam on the Sophos Security Blog:<br />
<br />
http://nakedsecurity.sophos.com/2010/11/04/sick-of-call-centres/PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com1tag:blogger.com,1999:blog-5379338798918982544.post-79003895781572343242010-09-22T13:30:00.000-07:002010-09-22T13:31:39.846-07:00Twitter - New XSS ExploitA new exploit was discovered in Twitter today allowing for HTML code to be injected into tweets. This allowed the attacker/user to redirect users when the tweet was just <b>hovered</b> over. This seems to have been patched now, however it is a wake-up call for users to always be alert when using any social networking website. You can find out more information and see a demo of this exploit in action in the Sophos YouTube video.<br />
<br />
<br />
<object width="435" height="269"><param name="movie" value="http://www.youtube.com/v/EpG661S9u9A?fs=1&hl=en_GB"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/EpG661S9u9A?fs=1&hl=en_GB" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="435" height="269"></embed></object>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com2tag:blogger.com,1999:blog-5379338798918982544.post-35421868060770951692010-09-15T20:11:00.000-07:002010-09-15T20:14:11.126-07:00Internet Explorer 9 - Beta ReleasedInternet Explorer isn't the most popular browser. It's slow, bloated and riddled with exploits. However, rumours have been spreading about the eagerly awaited Version 9. The beta is now here, and it's available for everyone to download. <br />
<br />
Internet Explorer 9 is supposedly a huge leap forward. Everything has been changed and the interface is much different to that of the previous versions. It's much more user-friendly, much faster and also more secure.<br />
<br />
If you wish to find out more information and actually download and trial the beta then you can do so here: <a href="http://ie.microsoft.com/testdrive/">http://ie.microsoft.com/testdrive/</a><br />
<br />
If you're trying out IE9 do post a comment below and let us know what you think!PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com3tag:blogger.com,1999:blog-5379338798918982544.post-85017319019420216762010-09-14T10:20:00.000-07:002010-09-14T10:20:50.329-07:00Adobe Flash Player - Critical Exploit (13th September 2010)Another exploit in Adobe's Flash Player has been discovered. Adobe published information about this critical exploit yesterday. This affects versions 10.1.82.76 and older for Windows, Linux and Mac operating systems.<br />
<br />
<br />
Adobe stated "<i>This vulnerability (CVE-2010-2884) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against Adobe Flash Player on Windows. Adobe is not aware of any attacks exploiting this vulnerability against Adobe Reader or Acrobat to date.</i>"<br />
<br />
An update should be expected during the week of 27th September and updates for Adobe Reader and Acrobat will be released during the week of October 4th. Remember, stay safe.<br />
<br />
You can view the full article here: <a href="http://www.adobe.com/support/security/advisories/apsa10-03.html">http://www.adobe.com/support/security/advisories/apsa10-03.html </a>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com5tag:blogger.com,1999:blog-5379338798918982544.post-34924890718695821582010-09-11T11:14:00.000-07:002010-09-11T11:14:05.429-07:00Rogue Anti-Virus RemovalWe've all seen and heard about rogue anti-viruses. They lead the user to believe they're protecting their PC when in truth they're actually infecting it. Rogue AV's typically stop you from opening all .exe files with a message saying something along the lines of "FileYouOpened.exe Is Infected!" The rogue anti-virus then says that the only way to remove the "infections" (that don't actually exist) is to purchase their premium software. In truth it is all a big scam. They wait for unsuspecting users to enter in credit card details to "upgrade" when in truth these are just stolen.<br />
<br />
So now you're infected with a rogue anti-virus how do you remove it? You can't open your browser and sometimes anti-virus/maware programs because they're "infected" so how would we go about doing this? Well it's actually not too difficult. Most of the infection can be remove with a simple <a href="http://www.malwarebytes.org/mbam.php">Malwarebytes</a> scan in Safe Mode. <br />
<br />
Matt from Remove-Malware.com has made a post on how to remove AntiVir Solution Pro - one of the main and most recent rogue Anti-Viruses currently spreading. You can read this post here: <a href="http://remove-malware.com/antimalware/anti-malware-howto/removing-antivir-solution-pro-fake-anti-virus/">http://remove-malware.com/antimalware/anti-malware-howto/removing-antivir-solution-pro-fake-anti-virus</a><br />
<br />
(Note the Dr Web Live CD part isn't completely essential, however if you have disc's available then it is recommended.)PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com4tag:blogger.com,1999:blog-5379338798918982544.post-18136044038587646562010-09-09T15:59:00.001-07:002010-09-11T10:40:25.245-07:00Adobe Reader ExploitAdobe Reader recently had an exploit that allowed the download and execution of a remote file upon opening a .pdf in Adobe Reader software. Sophos released a video demonstrating this. If you use Adobe Reader ensure that you update it regularly to remain protected against exploits like these.<br />
<br />
<object height="270" width="435"><param name="movie" value="http://www.youtube.com/v/nPKYubm7yeA?fs=1&hl=en_GB&rel=0"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/nPKYubm7yeA?fs=1&hl=en_GB&rel=0" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="435" height="270"></embed></object>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com5tag:blogger.com,1999:blog-5379338798918982544.post-20689051593669967932010-09-09T15:48:00.000-07:002010-09-09T15:49:25.202-07:00August - 90 Second Security Round UpSeptember is now upon us, however I thought it would be a good idea to round up all the latest news for August.<br />
<br />
Fortunately, Sophos have released a YouTube video showing exactly this.<br />
<br />
<object width="435" height="270"><param name="movie" value="http://www.youtube.com/v/gYyboT3I9ds?fs=1&hl=en_GB"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/gYyboT3I9ds?fs=1&hl=en_GB" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="435" height="270"></embed></object>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com1tag:blogger.com,1999:blog-5379338798918982544.post-24202822640100518752010-09-09T14:04:00.000-07:002010-09-09T15:25:16.812-07:00Windows .lnk Critical VulnerabilityYou may have heard recently about a critical vulnerability effecting <b>all </b>Windows Operating Systems. This was first revealed a few weeks ago and Microsoft have been working hard to patch this exploit.<br />
<br />
<br />
Microsoft have released information about this exploit here: <a href="http://www.microsoft.com/technet/security/advisory/2286198.mspx">http://www.microsoft.com/technet/security/advisory/2286198.mspx </a><br />
<br />
SOPHOS quickly released a video demonstrating how this critical vulnerability works. It illustrates how arbitrary code can be exectuted in a shortcut file causing a rootkit to be installed even if just <b>viewing</b> the infected file. You can view it <a href="http://www.youtube.com/watch?v=1UxN7WJFTVg">here</a>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com3tag:blogger.com,1999:blog-5379338798918982544.post-53294380741563131692010-08-29T07:25:00.000-07:002010-08-29T07:33:51.953-07:00Welcome To All New Readers!We've noticed a large surge in the visitors we're receiving to our blog. We'd like to thank you all for reading and we hope you decide to stay. Remember, we will provide frequent updates with important information, polls, questions and also answers to questions that have been emailing in.<br />
<br />
You can also stay up to date in real-time! Subscribe to our RSS feed to receive updates.<br />
The RSS feed is located here: <a href="http://feeds.feedburner.com/blogspot/LJHtW">http://feeds.feedburner.com/blogspot/LJHtW </a>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com3tag:blogger.com,1999:blog-5379338798918982544.post-1280526358936061622010-08-29T07:22:00.000-07:002010-08-29T07:23:00.275-07:00What Anti-Virus Do You Use?As part of a fairly small investigation, we're asking you what anti-virus do you use? Please, comment below with the main software you use. We will then publish this information into a chart to show the most popular anti-viruses. Please don't include seperate Malware-scanners, and analyzers. Just include the main anti-virus software you use.<br />
<br />
This information will then be used to show what are the most widely used anti-viruses, as well as providing advice to users about the software they're using.PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com6tag:blogger.com,1999:blog-5379338798918982544.post-16705736995303645462010-08-28T05:40:00.000-07:002010-08-28T05:50:49.829-07:00I Think I'm Infected, What Now?Removing an infection can be fairly simple. It depends upon a variety of things though, so the difficulty can vary. This could range from removing some simple adware such as a toolbar, to removing a full system infection being hidden by a rootkit.<br /><br />The first step to removing an infection would be the obvious, run an Anti-Virus scan. If you have a good anti-virus then the chances are it will remove most of the infection. This however is not enough to declare a system all clean. A number of other tools can be used to aid in the removal of malware and I will list some here.<br /><br /><a href="http://www.malwarebytes.org">Malwarebytes Anti-Malware</a> - This is an absolutely excellent tool. Malwarebytes is completely free (although a paid version exists) and removes all different types of infections. Malwarebytes is known for it's superior detection and removal and is used worldwide by malware removal specialists. If you believe you're infected then downloading and running a Malwarebytes scan is a must.<br /><br /><a href="http://www.eset.com/online-scanner">ESET Online Scanner</a> - Another great tool. This is from the company 'ESET' who are known for their amazing anti-virus NOD32. This scanner has advanced heuristics and will detect and remove even the most stubborn infections. This tool should always be on the list of aiding to remove infections.<br /><br /><a href="http://free.antivirus.com/hijackthis/">Hijack This</a> - Hijack this is a must have tool for computer professionals. It is easy to use, however please note it should only be used under the advice of professionals. You could damage your system by misuse of this program as it is a very powerful tool.<br /><br />I hope this will help you if you're infected. Remember, if you're unsure, <span style="font-weight: bold;">ask</span>. There are hundreds of thousands of computer forums where you can seek help with the removal of viruses and malware. As a last resort you could contact a professional virus removal company or have a computer shop remove it for you, however remember you will have to pay for this.<br /><br />Useful Resources:<br /><br /><a href="http://remove-malware.com/">http://remove-malware.com/</a>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com4tag:blogger.com,1999:blog-5379338798918982544.post-23346950078090649682010-05-27T07:11:00.000-07:002010-05-27T08:05:17.182-07:00Anti-Virus Software - Explained<p><strong>What Is It?</strong><br /><br />Anti-Virus software, as mentioned in my previous post, is the single-most important piece of software on your computer after your operating system. Every computer is at risk from threats with thousands of new threats being created every single day. An anti-virus in short, analyses the coding in software and programs and then cross-references it with the database to see if it is a known threat. This is a very effective way of keeping you protected.<br /><br /><strong>Why Do I Need It?</strong><br /><br />Because of the large amount of threats online it is important you protect yourself from them. This is where Anti-Virus software comes in. It is important you have this software on every computer you own. It helps to keep you protected from the thousands of theats online and can mean the difference between having your personal information stolen and used by criminals or not.<br /><br />With all this talk about Anti-Viruses and all different companies offering different software you may be wondering, What is the best Anti-Virus? Well the answer to that question is that there is no 'best anti-virus'. It all comes down to personal opinion and depending on who you ask you will recieve different answers. There are however anti-viruses that are much better than others, and offer better protection.<br /><br />Some examples of very effective anti-viruses are:<br /><br />- <a href="http://www.eset.com/">ESET NOD32/Smart Security<br /></a>- <a href="http://www.kaspersky.com/">Kaspersky</a><br />- <a href="http://www.avira.com/">Avira</a><br />- <a href="http://www.avast.com/">Avast!</a><br /><br />Anti-Virus programs may be free, or you may have to pay for them. However, do not be put off by having to pay for them, or the full versions. Generally speaking, paid-for anti-viruses tend to be far more effective, have better detection ratios, lower false positive alerts and overall they are generally better.<br /><br />Examples of Anti-Viruses to avoid:<br /><br />- <s>Norton</s><br />- <s>McAfee</s><br />- <s>AVG</s><br /><br />You may already be using one of the above anti-viruses and feel they are fine. However they all have major flaws.<br /><br />Norton - Very heavy on system resources, Uses large amounts of CPU and RAM.<br />McAfee - Again, heavy on system resources and detection ratio is fairly low.<br />AVG - Detection ratio very low, and detects many false positives.<br /><br /><strong>Developments In Anti-Virus Software</strong><br /><br />As the number, sophistication and type of threats change so does the software that protects you from them. Recent developments in software mean that the latest threats will be detected even if they're not on the database. This was first developed by ESET with their award-winning peice of software, NOD32. It uses an advanced heuristics engine to help detect the most advanced threats and block them. This state-of-the-art method means that the most recent and undetected threats can be detected.<br /><br />Other developments in this area include Firewalls and Anti-Malware/Spyware built in protection to ensure you are as safe as can be. All of this in conjunction with real-time protection will enable you to browse the web and use your computer whilst in the comfort of knowing that you are protected.<br /><br /><strong>Conclusion</strong><br /><br />In conclusion, it is important that you always use anti-virus software to help keep you protected. You should always ensure your anti-virus is up to date to keep you protected from the latest threats. You should also try to make sure you use an effective piece of software. Any anti-virus is better than none, but understand that some are far superior to others.<br /><br />Another thing to understand is that although anti-viruses offer excellent protection, sometimes threats may still get through. The best way to stay protected is to use anti-virus software in conjuction of other methods of protection. Things such as Specific Anti-Malware programs such as <a href="http://malwarebytes.org/">Malwarebytes Anti-Malware</a> will help detect more adware,spyware and malware based threats. Another piece of software that is very useful is <a href="http://free.antivirus.com/hijackthis/">Hijack This</a>, An analyser that will look at processes, services and registry keys to diagnose infections.<br /><br />The final thing to stay protected is common sense. By simply downloading from trusted sources, scanning files before opening, and deleting unknown emails you can drastically reduce the chances of you become infected.</p>PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com0tag:blogger.com,1999:blog-5379338798918982544.post-67447226763297237232010-05-27T06:34:00.000-07:002010-05-27T08:02:33.854-07:00Computer Protection - An IntroductionComputers have been in use for a long time now, and nearly every home in the Western World owns one. With computers being so popular and so many people owning them they have become the target for malicious attacks, threats and also criminal activity.<br /><br /><br /><br />Originally the main theats around were simple viruses that had one job, to delete files and corrupt information. The large increase in computer ownership and internet access has caused these threats to change and these days most threats are much more sinister. They're designed to steal sensitive information from you. Examples of these threats now are:<br /><br /><ul><br /><li>Viruses</li><br /><li>Trojans (Including Backdoors, Bots)</li><br /><li>Phishers/Stealers</li><br /><li>Keyloggers</li><br /><li>Worms</li><br /><li>Malware<br /></li><li>Spyware</li></ul><br /><br /><br />There are a number of things you can do to protect yourself from these threats. The main one, which most people already know about, is to protect yourself with an Anti-Virus. Anti-Viruses help to protect your machine by detecting malicious code in files and on websites. By simply using an Anti-Virus can protect yourself and your computer from harm. Anti-Virus programs are the single-most important piece of software on your computer, aside from your operating system. You should <strong>always </strong>have this protection on your computer as with todays threats you could be infected within 30 minutes of browsing the internet if unprotected. You should always use a Firewall in conjuction with an Anti-Virus. A Firewall monitors and filters all inbound and outbound connections from your computer. This can prevent trojans from communicating with the outside world, or hackers from gaining access. Other programs to use in conjuction with Anti-Viruses are logfile analysers and specific anti-malware programs.<br /><br /><br /><br />The other main method to protect yourself is just simply, common sense. Viruses and other threats are mainly contracted through downloading files and attachments from emails. When downloading software always be cautious of where you're downloading it from. If possible you should always download software from the official manufaturers website, so you know it will be safe.<br /><br />Worms are an example of threats that spread though email. Due to the nature of worms they can auto-spread, meaning that they do not require an infected file to be received or downloaded. You should always be cautions when looking at unknown emails. Worms and Phishing attacks are the two most common threats that occur with emails. Worms will usually spread by getting you to download an attachment. You may receive an email along these lines: "<em>Congratulations, you've won a prize! Click here to collect it" </em>or maybe this "<em>Your Computer Is Infected! Click Here to download security software!"</em>. These are both examples of emails used to spread viruses/trojans and worms. You may receive an email with a far more malicious intention, Thee are known as Phishing emails. They're designed to steal login details, usually for bank or paypal accounts. Attackers will spoof emails pretending to be from your bank and then link you to "<strong>your" </strong>banks website, which is infact a clone of this website. You may not notice any difference but there is a simple script that logs every username and password entered on the page. This could then be used by an attacker.<br /><br />All of these threats are very harmful and you should make sure you protect yourself correctly. By simply following the above steps you could stop your bank details from being stolen, your identity from being stolen, or other personal information.PC-Pro-Protectionhttp://www.blogger.com/profile/17721860137432501950noreply@blogger.com0