Members
Stats
  • Total Posts: 30489
  • Total Topics: 9016
  • Online Today: 1480
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)










Recent Posts

Pages: [1] 2 3 ... 10
1
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by mauromonha on 22. May 2017., 17:00:23 »
Great forum...
please send me the password for VSE880P9.zip
2
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by Fireberg on 22. May 2017., 12:57:49 »
I've been using this software for long time...and i think is still the best. I know there are others good too, but I prefer that one!!

Thanx Samker.


And I'm waiting for a password too, Pal. Thanx anyway!!
3
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by Fireberg on 22. May 2017., 12:51:17 »
I've been using this software for long time...and i think is still the best. I know there are others good too, but I prefer that one!!

Thanx Samker.
4
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by InCUREable on 22. May 2017., 08:30:33 »
Hello jheysen!

Thank you very much for the Patch 9! Please could you send me the password?
Thank you in advance! Have a nice and successful day each and every day!
5
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by abelapolo on 21. May 2017., 18:14:31 »
Done!
6
Anti-Virus (Security Suite) / RANSOMWARE
« Last post by abelapolo on 21. May 2017., 17:47:50 »
1986: The first known ransomware, the 1989 AIDS Trojan (also known as «PC Cyborg»), is written by Joseph Popp

2005: In May, extortion ransomware appears

2006: By mid-2006, worms such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive start using more sophisticated RSA encryption schemes, with ever-increasing key-sizes

2011: A ransomware worm imitating the Windows Product Activation notice appears

2013: A ransomware worm based on the Stamp.EK exploit kit surfaces and a Mac OS X-specific ransomware worm arrives on the scene. CryptoLocker rakes in around $5 million in the last four months of the year

2015: Multiple variants on multiple platforms are causing major damage


Encryption Ransomware
It encrypts personal files and folders (documents, spread sheets, pictures, and videos).

The affected files are deleted once they have been encrypted, and users generally encounter a text file with instructions for payment in the same folder as the now-inaccessible files.

You may discover the problem only when you attempt to open one of these files.

Some, but not all types of encryption software show a ‘lock screen’:

Maktub1 Ctblocker2.10 Bitman_040 Bitman_025

Lock Screen Ransomware — WinLocker
It locks the computer’s screen and demands payment.

It presents a full screen image that blocks all other windows.

No personal files are encrypted.

Polyransom2

Master Boot Record (MBR) Ransomware
The Master Boot Record (MBR) is the part of the computer’s hard drive that allows the operating system to boot up.

MBR ransomware changes the computer’s MBR so that the normal boot process is interrupted.

Instead, a ransom demand is displayed on the screen.

Master-Boot.jpg

Ransomware encrypting web servers
It targets webservers and encrypts a number of the files on it.

Known vulnerabilities in the Content Management Systems are often used to deploy ransomware on web services.

Ransomware encrypting web servers

Mobile device ransomware (Android)
Mobile devices (mostly Android) can be infected via “drive-by downloads”.

They can also get infected through fake apps that masquerade as popular services such as Adobe Flash or an anti-virus product.

If attacked, should I pay the ransom?
Paying the ransom is never recommended, mainly because it does not guarantee a solution to the problem. There are also a number of issues that can go wrong accidentally. For example, there could be bugs in the malware that makes the encrypted data unrecoverable even with the right key.

In addition, if the ransom is paid, it proves to the cybercriminals that ransomware is effective. As a result, cybercriminals will continue their activity and look for new ways to exploit systems that result in more infections and more money on their accounts.

How to prevent a ransomware attack?

Back-up! Back-up! Back-up! Have a recovery system in place so a ransomware infection can’t destroy your personal data forever. It’s best to create two back-up copies: one to be stored in the cloud (remember to use a service that makes an automatic backup of your files) and one to store physically (portable hard drive, thumb drive, extra laptop, etc.). Disconnect these from your computer when you are done. Your back up copies will also come in handy should you accidentally delete a critical file or experience a hard drive failure.
Use robust antivirus software to protect your system from ransomware. Do not switch off the ‘heuristic functions’ as these help the solution to catch samples of ransomware that have not yet been formally detected.
Keep all the software on your computer up to date. When your operating system (OS) or applications release a new version, install it. And if the software offers the option of automatic updating, take it.
Trust no one. Literally. Any account can be compromised and malicious links can be sent from the accounts of friends on social media, colleagues or an online gaming partner. Never open attachments in emails from someone you don’t know. Cybercriminals often distribute fake email messages that look very much like email notifications from an online store, a bank, the police, a court or a tax collection agency, luring recipients into clicking on a malicious link and releasing the malware into their system.
Enable the ‘Show file extensions’ option in the Windows settings on your computer. This will make it much easier to spot potentially malicious files. Stay away from file extensions like ‘.exe’, ‘.vbs’ and ‘.scr’. Scammers can use several extensions to disguise a malicious file as a video, photo, or document (like hot-chics.avi.exe or doc.scr).
If you discover a rogue or unknown process on your machine, disconnect it immediately from the internet or other network connections (such as home Wi-Fi) — this will prevent the infection from spreading.

7
Latest Security News & Alerts / Re: WOT - Web of Trust
« Last post by grr on 21. May 2017., 14:19:40 »
Web of Trust browser add-on gone for now after privacy issue

A free web browser extension came at a cost: It leaked users' personal data, according to PCWorld.
The widely used extension, Web of Trust (WoT), uses crowdsourced data to alert users when a site is potentially deploying malware. But a report from Germany-based Norddeutscher Rundfunk (NDR) determined that the company behind the add-on, WOT Services, was selling users' browser histories without anonymizing the data, thus potentially exposing personal information. Additionally, the report said the company was not properly informing users of its data collection procedures.

After the news broke, Mozilla deleted Web of Trust from its Firefox browser marketplace. WOT Services then removed its add-on from the extension libraries of the other major browsers.

While the company claimed it anonymized browser histories it collected and then sold, the NDR reporters, from a small sample, were able to unmask details – including email and phone numbers – on more than 50 users.
WOT Services said it was revamping its add-on, but was unclear when it might reintroduce it.

Users are advised to manually uninstall the extension.

https://www.scmagazine.com/web-of-trust-browser-add-on-gone-for-now-after-privacy-issue/article/571892/
8
Microsoft released security updates for the following versions of Windows:

Windows XP, Windows Vista, Windows 8
Windows Server 2003, 2008, Windows XP Embedded

Download English language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64

Download localized language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
9
Latest Security News & Alerts / WannaCry Ransomware Decryption Tool Released
« Last post by grr on 21. May 2017., 14:12:21 »
If your PC has been infected by WannaCry – the ransomware that wreaked havoc across the world last Friday – you might be lucky to get your locked files back without paying the ransom of $300 to the cyber criminals.

Adrien Guinet, a French security researcher from Quarkslab, has discovered a way to retrieve the secret encryption keys used by the WannaCry ransomware for free, which works on Windows XP, Windows 7, Windows Vista, Windows Server 2003 and 2008 operating systems.

More details below
https://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html
10
New Updates / Re: McAfee VirusScan Enterprise 8.8 - Patch 9
« Last post by SashaS on 21. May 2017., 09:14:39 »
Any chance you (or anyone) would have the VSE 8.8 patch 9 repack (full installer that includes patch 9)...
It is necessary to have an installer that will work on systems port creators update.... Or to reinstall on Creators update, none of the previous installers will work....
Pages: [1] 2 3 ... 10

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising