Sept 26th, 2017 Update: Yesterday this appeared on Bleeping Computer: Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware https://www.bleepingcomputer.com/news/security/avast-publishes-full-list-of-companies-affected-by-ccleaner-second-stage-malware/ Bleeping also put out a nice article from the 22nd, containing a nice summary if you’re just catching up on the news (because of course more has emerged since our last update, and we shouldn’t […]
Ho, Ho, Ho! d7 Premium is now FREE, get yours NOW before we come to our senses! www.foolishit.com/getd7 < – – – – TELL YOUR FRIENDS! Merry Christmas to EVERYONE! Also, just in case you already have d7 Premium and didn’t know about our upgrade offer, we started promoting earlier this year that […]
For clarification on our previous post regarding the red X button: The article was about the red X because that’s what most people know, but it also applies to closing an application in any standard method not involving any actual force-terminate means. This includes the red X in the top right of the ‘window’ or form, […]
This pic describes exactly why I recommend people NEVER use the form’s X button in the event of suspected adware, spyware, MALWARE, or any other random POP-UP… DO NOT DO IT. EDIT TO CLARIFY: This article is about the red X in the top right of the ‘window’ or form, but also includes other methods such as the ALT+F4 […]
Lenovo rootkit binaries persisting via BIOS/Windows Platform Binary Table (WPBT) will make your systems vulnerable to any 3rd parties capable of intercepting your web traffic! Affected models with “patch” linked below – but I would investigate before using. I’ll be looking more into this soon. https://support.lenovo.com/us/en/product_security/lse_bios_notebook https://support.lenovo.com/us/en/product_security/lse_bios_desktop More Info: WPBT info (Microsoft, PDF download) Other Sources: […]
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline […]
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every […]
Where is Ransomware? Ransomware can be found everywhere. We thought that the well known file-encrypting ransomware, as known as CryptoLocker, was over and done with after law enforcement knocked out its infrastructure last year, but CryptoLocker , as well as other variations of malware, are back. Ransomware is a form of malware that will prevent […]
ShadowExplorer (www.shadowexplorer.com) is an awesome application which I’ve used as a PC Technician many times in the past. It is used to provide a graphical ‘front-end’ interface for a rather complicated command line utility called VSSADMIN.EXE (an internal Windows component) which handles “Volume Shadow Copies” of files made by Windows. These are sort of ‘backups’ in a […]
Join us for live tech chat, product questions, support, and technical training right here!
Both Foolish IT customers and non-customers alike are welcome to discuss anything Foolish!
Resolved: Recent download failures from website links and buttons We have now corrected recent download failure issues from our...
d7II to d7x update error corrected, please accept my personal apology for any disruption in usage! Please accept that I deeply regret any inconveniences you and...