How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every […]
Don’t forget, we’re back today @ 2pm ET! www.foolishit.com/live Today we’re going to have yesterday’s planned special guest who couldn’t make it — perhaps — and I’ll discuss the ideas I’ve been brewing (a direct result of yesterday’s content packed mini-show!) Question for the Techs out there (from show #6): Do you have any special tips or tricks at […]
Here’s an interesting email I just received by Chief-01 from deviantart.com: “My friend’s company got hit by Cryptolocker and they bought the key, but their computers got moved around before they paid and not all the files got decrypted because the registry paths to the files were no longer valid. I wrote a python script […]
http://www.youtube.com/watch?v=VchceUk2jks Tune in and check out the entire show, it’s a good one. If you’re just interested in me saying “umm” a lot then tune to the 59:00 minute mark. 🙂
CryptoPrevent v2.5 has just been released with a few changes, including a new layer of protection against malicious software. How often have you seen executable trojan droppers for malware disguised as a document? If you have any experience in the field, the answer should be FREQUENTLY. This particular tactic of malware relies on the fact […]
v2.0 v2.0.1 of my Cryptolocker prevention utility has been released with new whitelisting capabilities and command line parameters for scripting! UDPATE: v2.0 had a bug in the whitelisting component which didn’t work on some systems, it is fixed in v2.0.1 and is tested on all platforms. http://www.foolishit.com/cryptoprevent-malware-prevention/ New functionality: Automatically whitelist all EXEs currently located in %appdata% […]
With all this mess about Cryptolocker going around, a lot of folks are looking to immunize themselves from this nasty bit of malware which will encrypt user files and hold them for ransom. Removal of the malware is easy with d7, but there is no known method to decrypt the files except by paying the […]
Join us for live tech chat, product questions, support, and technical training right here!
Both Foolish IT customers and non-customers alike are welcome to discuss anything Foolish!
We’re having a 30% off SALE on ALL PRODUCTS!! [EXPIRED] flash sale! Get 30% off ALL Foolish IT products by using the coupon...