Thursday, May 29, 2014

Secure your passwords with Password Manager

Using a different password for every online site and service is critical to your cyber security.

There's a war raging between hackers and companies, and you're caught in the crossfire. Every time a company gets hacked, you have to change your password. And don't you dare reuse it somewhere else.

Dreaming up a different password for every site and service is the only way to keep your stuff safe online, but it's also a gigantic nuisance. There's one thing you can and should do to help: Get a password manager program. Password managers hide your information behind a master password that only you know.

There is a way to manage all your passwords together i.e., password manager, here are the password manager softwares; 1Password, Dashlane, LastPass and PasswordBox.

LastPass is a good choice for people who use newer technology like fingerprint scanners. For the really paranoid, 1Password offers the most control over where your encrypted vault of passwords gets stored.

For most people, I recommend Dashlane. It's simple, so you'll actually use it. It may even save you clicks.

Nothing is 100% guaranteed, but all four of these managers take the additional security step of never sending your master password over the Internet. They're like a safe-deposit box that a professional keeps without knowing what's inside, or even holding a key to open it.

In an age where more of our personal information lives, password protected, up in the cloud, we need defenses beyond antivirus software. Using a password manager is the next step.

Now keep all your passwords in a password manager and relax.


Monday, May 26, 2014

Blackshades malware spies through your webcam

In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private business. Now, it seems that even with the shades drawn, one must also shutter their webcam. Earlier this week, the FBI initiated a crackdown leading to the arrest of nearly 100 users of a program called Blackshades malware. This program allows hackers to remotely access the computers of their victims, enabling them to steal files, log passwords, and even turn on microphones and webcams unnoticed. This spying software could be purchased online for as little as $40 U.S.D.

Blackshades malware is referred to as a remote access tool (RAT), meaning it allows the hacker to gain full access to your machine as if he were sitting right in front of it. The technology behind this threat is similar to that used by the IT department at your office. When Joe IT Guy needs to access your work computer to install updates, fix an issue with your settings, or remotely control your machine for a variety of other reasons, he can with advanced warning and mutual understanding that he has the right to do so. Perpetrators of Blackshades malware aren’t quite as courteous.

Prior to the FBI crackdown this week, anyone with an Internet connection could purchase the Blackshades software, and they didn’t need to be a skilled hacker to use it, either. As security blogger Brian Krebs put it, “Blackshades was a tool created and marketed principally for buyers who wouldn’t know how to hack their way out of a paper bag.” The ease of use (and ease of purchase) associated with Blackshades malware illustrates the “hacking as a service” phenomenon, where anyone with the financial means necessary can become a cybercriminal. The software even came with tools known as “spreaders” which helped these novice cybercriminals distribute malicious links via social media, in an effort to infect more computers. As with most other malware attacks, Blackshades relies on you visiting an infected website or downloading an infected file in order to install a hacker’s malicious software on your computer.

The prepackaged malware also came with tools to help cybercriminals extract money from their victims, otherwise known as ransomware. Ransomware works by allowing the hacker to lock or encrypt files (sometimes even locking you out of your device completely), and then demand money in exchange for allowing you to regain access.

Blackshades malware is a multidimensional, robust software program with a relatively puny price tag. And just because the FBI has cracked down on its users, doesn’t mean it’s disappeared from the Web completely. In fact, this strain of malware has been around for years.

Here are some steps you can take to protect yourself from virtual peeping toms:
  • Do not click on links from unknown senders
  • Use web protection when surfing online
  • Avoid attachments from unknown senders
  • Download apps, music, and movies from official sources
  • Install comprehensive security on your system

Microsoft ends support for Windows XP and Office 2003

Microsoft is ending support for the Windows XP operating system and Office 2003 product line on April 8, 2014. After this date, these products will no longer receive:
  1. Security patches which help protect PCs from harmful viruses, spyware, and other malicious software
  2. Assisted technical support from Microsoft
  3. Software and content updates

All software products have a lifecycle. End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. As of February 2014, nearly 30 percent of Internet-connected PCs still run Windows XP.

Microsoft will send “End of Support” notifications to users of Windows XP who have elected to receive updates via Windows Update. Users in organizations using Windows Server Update Services (WSUS), System Center Configuration manager, or Windows Intune will not receive the notification.

The Impact
Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows XP or Office 2003.

Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements.


What is the Solution?
Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP andOffice 2003 offer additional details.

There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite.

Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to recieve support temporarily. Users should consult the support pages of their chosen alternative browser for more details.

So Windows XP users must migrate to Windows7 otherwise be careful about viruses and cyber threats.

Saturday, May 24, 2014

Apple iCloud stormed by Dutch Hackers

Apple cloud service "iCloud" is probably one of the secure cloud service owned by the Apple Inc. It the same cloud storage and cloud computing service provided by the Apple Inc. to its users since October 2011 with more than 320 million users across the world. 

Couple of the hackers go by the name AquaXetine and Moroccan hacker with the name Merruktechnolog, have claimed to hack the Apple iCloud system. Hackers have used the Man-in-Middle attack for the hack of the Apple locked devices. 

According to a report from Dutch news organization De Telegraaf, the hackers purchased locked iPhone devices for $50 to $150 each and then bypassed Apple’s iCloud activation lock through a serious security vulnerability Apple has failed to patch with its most recent updates. iCloud service allows users to store and back-up data such as music, photos, applications, documents, bookmarks, reminders, backups, notes, iBooks, and contacts, and provides a platform for Apple's email servers and calendars. 

Security experts says that hackers can do more thing with the vulnerability. Attacker can read the message and also steal the Apple ID credentials from the devices. Hackers have worked for five months to breach the security of Apple iCloud system. Last day Doulci hacker group on their twitter have posted that the group have “processed” more than 5,700 Apple devices in just five minutes using the hack. With the good intention and with ethical subject, hackers have reported the vulnerability to Apple Security team back in March, but Apple team have never responded to their vulnerability report. 

This makes the hackers to disclose the vulnerability publicly. The pair of hackers are offering unlocking services via doulCi.nl website, according to information found on their website. With this doulCi is the world’s first Alternative iCloud Server, and the world’s first iCloud Activation Bypass.


Wednesday, May 21, 2014

Tips from cyber experts to tread safely

They know the risks of the internet better than anyone, but most cyber experts still shop and bank online with care.

"We operate in the 21st century ... I've got to shop online, I've got to pay my bills online," Brigadier General Paul Nakasone, deputy commander of US Army Cyber Command, said at the Reuters Cybersecurity Summit.

"You can't really function without it," agreed Nart Villeneuve, researcher at the cybersecurity firm FireEye.

Some actions can leave you wide open for data abuse, like checking into a hotel and handing over a credit card, he said. "I guess you could pull up with a money clip but I don't know that you can even do that," he said.

The tricks that the smartest cybersecurity minds use for online safety hygiene are basic: Avoid websites that are visibly questionable, don't thoughtlessly click on links or attachments, monitor your account activity regularly and only give away the minimum amount of information.

On passwords, the bulwark of online security, experts also stuck to simple rules: Make them complex and change regularly. Some also said they use more secure login processes when available.

"I tend to be a bit of a two-factor authentication freak," said Eddie Schwartz, cyber chief at Verizon, saying he always takes advantage of any extra security steps offered, like

confirming his login with a code sent to his cellphone.

Another key to safe online shopping and banking is using internet connections that are as secure as possible.

"I never do it on the road. I never do it from my mobile device," said Michael Hayden, former director of the CIA and the National Security Agency.

While most experts avoid using public wireless internet connections, some go further.

"I have a separate computer and router for financial transactions," said Dan Kaufman, director of information innovation at the Defense Advanced Research Projects Agency (DARPA), the arm of the US Defense Department credited with inventing the internet.

Kaufman said he searches for potential online purchases on one computer, them moves to a second computer to make the transaction.

Digital Bond CEO Dale Peterson had a similar strategy: a separate computer, "with its own 20-plus character password," for online banking and payroll purposes.

In a breach revealed in December by US retailer Target Corp, some 40 million credit or debit card records and 70 million other customer records, such as addresses and telephone numbers, were stolen. The perpetrators remain at large.

Several cyber experts said they felt less concerned about the potential to lose credit card data, because of limited liability, but draw the line at online banking and modern conveniences like depositing checks by smartphone.

"I'm paranoid about online banking," said Stuart McClure, CEO of security firm Cylance. "I'm a little bit more comfortable now but I hate to do online banking. I hate it.

"I used to change my passwords so much that I'd forget them over time. And I never ever put my PIN into anything electronic, only physical devices. And even then, I'm pulling up, looking for skimmers," he said, referring to devices made to secretly swipe card information from ATM machines.

Is total avoidance a solution?

"I am not one who says that the answer is to withdraw from the digital world that we live in. I just don't think that's particularly realistic," said Admiral Mike Rodgers, the new director of the NSA. "Let's deal with the world the way it is."

Saturday, May 17, 2014

A New Phishing method to steal Google account details

Security experts at Bitdefender discovered a new ingenious phishing scheme that is being used by hackers to steal Google Account credentials.

Security experts at Bitdefender have discovered a news phishing scheme adopted by hackers to steal Google Account passwords.

The new phishing attack is hard to catch with traditional heuristic detection, it mainly affects Google Chrome and Mozilla Firefox internet browsers.

The hackers send an email that pretends to be from Google, it warns victim that his account will be locked in the next 24 hours because the associated InBox has reached the maximum capability.

With access to users’ Google accounts, hackers can buy apps on Google Play, hijack Google+ accounts and access confidential Google Drive documents,”“The scam starts with an email allegedly sent by Google, with “Mail Notice” or “New Lockout Notice” as a subject.” reports Catalin Cosoi, chief security strategist at Bitdefender in the official blog post.

To avoid that the Google account will be “locked in 24 hours” the user is invited to go to the “INSTANT INCREASE” link, but the link redirects victims to a bogus Google web log-page. Using this artifice, hackers can steal Google account credentials within the browser.

Cosoi explained that it is very difficult for users to note the attack because the fake Google web log-page goes undetected by Google’s Chrome uniform resource identifiers (URIs). The attackers exploit the way Google Chrome displays “data:” URIs.

Users will display “data:” in the address bar of their browser, which indicates the use of a data Uniform Resource Identifier scheme, the URI scheme allows attackers to include data in-line in web pages as if they were external resources.

“The scheme uses Base64 encoding to represent file contents, in this case supplying the content of the fake web page in an encoded string within the data URI. As Google Chrome doesn’t show the whole string, regular users have a hard time figuring out they are targeted in a phishing attack and may give their data to cyber-criminals.” states the post.

Bitdefender says that the scammers are able to avoid detection, by using a data URI scheme, which includes data in-line web pages as if they are external sources. The content from the fake webpage is encoded in the string with the data URI scheme, the attackers used Base64 coding to represent the file contents.


According Bitdefender the more than a thousand users were deceived by the phishing scheme.

“So far, more than a thousand users clicked on a single shortened URL used in the cyber-campaign. The numbers are without doubt a lot higher, as scammers create more than a single URL when crafting a phishing wave,” added Cosoi.

Phishing is becoming one of the most popular fraudulent activities in the cyber criminal ecosystem, hackers are exploiting new platforms like mobile and social media according the report of principal security firms.

Cyber criminals are trying to make phishing attacks harder to detect optimizing their email targeting, attackers are demonstrating to be able to find new methods of bypassing checks implemented by email providers and security firms.

Usually a targeted attack exploits the “human factor“, phishing offensives rely on social engineering techniques that is why is important to inform users of the tactics adopted by cyber criminals.

Organisations must train their personnel to reduce their human attack surface and avoid to be victims of such attacks.
So, Be careful while using Google accounts.


Thursday, May 15, 2014

JAR file malware a threat on Facebook

Cyber Criminals are back with another way to get there victim via the popular social network Facebook. Recently many of the facebook users have got a message from there trusted friends or from unknown person which includes a ZIP file with the "LOL" text.

If you have also got the same message in your inbox and that also from your trusted friend then you might download without any hesitation. Actually this ZIP file contains a malicious JAR file. The file contains the Trojan horse virus circulating via Facebook messenger.

This Malware campaign was spotted by Malwarebytes in early March. They explain that the Trojan spreads itself through the Facebook’s Messenger service (inbox) by messaging a victim pretending to be one of their friends saying "LOL" with a zip file attached, which appears to be a photo, named "IMG_XXX.zip"

How It Works ?
User gets a Facebook instant message from a friend, which includes the words ‘LOL’ and a file waiting to be downloaded.
The user downloads the file because they can assume it can be trusted. The filename matches the usual filename of a photo: ‘IMG_xxxx’.zip.
Once downloaded, the user unzips the file and clicks on what they assume is an image file, still called IMG_xxxx.jar
The JAR file executes, downloads malware and infects the system.
The infected users Facebook account is compromised and then used to send more malware to the users Facebook friends.

How To Protect yourself?

As in the Malware bytes explanation where they have analyzed the malicious file, they found that its a Trojan Virus, and with the online virus scan, it is giving 27/50 virus detection ratio. If you are getting it from one of your trusted friend, then ask them about the message and file containing with it. If they denies for sending then simply DO NOT DOWNLOAD it.

If you have downloaded the file, then you might have infected with the Trojan horse virus. So if you think you are affected to it, then scan your computer with the trusted and reputed antivirus program.

We recommend our users to keep up-to-date your antivirus program always and use trusted programs. Don't download any file from net without the prior information. Always download the stuff from the trusted sites only.

Monday, May 12, 2014

Best free antivirus software 2014

Anyone who has been following the news about the Heartbleed Bug a vulnerability in OpenSSL that enables hackers to gain access to the memory of web servers understands just how dangerous the web can be. In addition to security flaws like Heartbleed, viruses, spyware and phishing sites make it possible for hackers to expose crucial data. To ensure better protection, every PC owner needs effective, reliable antivirus software. Unfortunately, this can be expensive, especially given the cost of annual updates.
However, there are plenty of free antivirus software solutions on the market, We've picked out nine of the best free internet security tools to deliver great security at no cost.

1. Avast Free Antivirus
The program is simple to install; a straightforward interface makes it easy to use; a quick first scan should identify any potential threats on your PC, and this all has minimal impact on your system performance.
These aren't just subjective opinions, either. Independent testing by AV-Test has found the program to be a good all-rounder, and it was one of AV-Comparative's "Products of 2012."
Avast Free has some useful extras, too. A Software Updater alerts you to program updates you've missed, for instance, while its Browser Cleanup tool provides a simple way to remove unwanted add-ons from your browsers.
Avast recently added a "Grime Fighter," which the company says supports 12 additional languages and offers an advanced console for more user control.

2. Panda Cloud Antivirus Free
Small and simple, Panda Cloud Antivirus is a lightweight tool which provides free real-time antivirus protection, and can be used alongside many other security tools without problems.
It's the free version of a commercial product, and so has a few missing features. The Pro edition helps to protect you at public wifi networks, for instance, while its "USB Vaccine" function reduces the risk of malware infecting a USB drive.
The core antivirus protection remains the same, though. And while that doesn't deliver the top detection rates, independent testing shows it's very capable, with the program winning certification in AV-Test's latest report.

3. ZoneAlarm Free Antivirus + Firewall
We have one or two concerns about ZoneAlarm Free Antivirus + Firewall, notably that its antivirus database is only updated daily (hourly updates are reserved for the commercial version), which leaves you more exposed to the very latest threats,
The program does provide plenty of functionality, though, with a capable, AV-Test-certified antivirus engine, an easy-to-use firewall and some browsing protection.
It does its best to keep things simple. Open the Preferences dialog, say, and you'll find only 10 buttons and settings (and most of those you'll never need to use).
The database update means it wouldn't be our first choice, but if you're a fan of ZoneAlarm, or just want a firewall and antivirus tool from the same company, this could be a good choice.

4. Avira Free Antivirus
Avira Free Antivirus provides two main areas of protection.
A strong antivirus engine (rated highly by independent labs for its file detection rates) constantly monitors your PC, looking for and eliminating threats.
If you choose to install the Avira toolbar then you also get some web tools (an antiphishing tool, ad blocker, social networking protection), although this also replaces your default search engine with an Avira page.
Problems? The interface can seem a little complex, just at first. And the program has more impact on your PC's performance than some other tools. Still, on balance Avira Free Antivirus remains a capable and effective security package.
Avira recently made available the Avira Protection Cloud (APC), which will be used to detect and thwart zero-day attacks, according to the company. The technology will be available to all users of the free software by the end of May.

5. Bitdefender Antivirus Free Edition
Bitdefender's antivirus engine is one of the best around, and a favourite of the independent testing labs, so getting a free version sounds very appealing indeed.
The program is ultra-compact, downloading and installing in less than a minute on our test PC (although it does demand removal of any incompatible products first). A very basic interface then provides effective on-demand and automatic scanning, real-time antivirus and antiphishing protection.
There are very few manual controls here: no settings, no options, no scan types, no scheduling, nothing at all, perhaps an issue if you like to fine tune your security. But if you prefer simplicity then Bitdefender Antivirus Free Edition is an excellent choice.

6. AVG Free Antivirus
AVG Free Antivirus is a solid package with a good range of features: an antivirus engine, email scanner, identity theft protection, and LinkScanner Surf-Shield to keep you safe online.
At first glance this makes the program seem more complex, as there are lots of tiles, buttons and menu entries. Smart interface design means you can carry out most common actions in a click or two, though, so you'll soon feel at home.
AVG Free Antivirus gets mixed reviews on its effectiveness: AV-Comparatives rate it as average, AV-Test say it's better than some commercial suites. Our view: it's a capable, feature-packed tool, and one of the stronger free antivirus packages.
To boost its offering, AVG recently released the AVG Zen tool, which the company claims is designed to help provide added protection across desktops and mobile devices.
Why isn't Microsoft Security Essentials in the list? It's small, simple, and won't slow your system down - but it's also just not reliable enough to justify inclusion in our best free antivirus software round-up.
When Security Essentials was last included in an AV Comparatives File Detection test, the program managed a file detection rate of 94.9%, placing it 13th out of 15. AV-Test's opinion was even lower. In its analysis of 2012 products for Home Users, Microsoft Security Essentials delivered the lowest "average protection score" of all, putting it bottom in a list of 20.

7. Emsisoft Emergency Kit
No antivirus program comes with a guaranteed 100% detection rate, and malware might occasionally slip through your defences. You should always have a second tool available, then, just in case - and Emsisoft Emergency Kit (EEK) is a great choice.
The program runs without requiring installation, reducing the chance of any conflicts with your existing antivirus package.
Its straightforward system scanner uses a dual-scan-engine, rated highly by Virus Bulletin (and which did actually achieve a 100% detection rate in a recent AV-Comparatives test).
And experienced users will appreciate tools like HiJackFree and BlitzBlank, which can help you manually detect and clean up malware.

8. FortiNet FortiClient
While they're best known in the corporate world of network security appliances, FortiNet also produce a capable antivirus tool, FortiClient, which is free for home users.
The program can be installed in two modes. The standard option provides a good range of tools: an antivirus engine, simple parental controls, an application firewall, vulnerability scanning and more. But you can also run FortiClient without its real-time protection, perfect if you need to run it alongside an existing antivirus tool without conflicts.
Our tests suggest it's not the best antivirus engine around, but is still worth having. AV-Test and AV-Comparatives confirm that it's a good mid-range contender, and FortiClient could be particularly helpful if you want a second-line tool to run alongside an existing antivirus engine.

9. 360 Internet Security 2013
Qihoo is a Chinese software company which has had enormous success in its home market (it claims 450 million users), but now it's branching out with its first international release, 360 Internet Security 2013.
Despite its name, this isn't a full internet security suite - there's no spam filter, firewall or parental controls - but installing the program does get you no less than three antivirus engines: BitDefender, its own QVM II, and Cloud 360.
These delivered accurate results for us, and the independent testing labs have also reported positive results for Qihoo products in the past year (AV Comparatives has certified it as "Windows 8 approved", for instance).
360 Internet Security does a reasonable job of blocking access to malicious websites, too, and on balance it's an effective entry to the free antivirus world.

Thursday, May 8, 2014

Manage all your passwords with one password

Using a different password for every online site and service is critical to your cyber security.

There's a war raging between hackers and companies, and you're caught in the crossfire. Every time a company gets hacked, you have to change your password. And don't you dare reuse it somewhere else.

Dreaming up a different password for every site and service is the only way to keep your stuff safe online, but it's also a gigantic nuisance. There's one thing you can and should do to help: Get a password manager program. Password managers hide your information behind a master password that only you know.

There is a way to manage all your passwords together i.e., password manager, here are the password manager softwares; 1Password, Dashlane, LastPass and PasswordBox.

LastPass is a good choice for people who use newer technology like fingerprint scanners. For the really paranoid, 1Password offers the most control over where your encrypted vault of passwords gets stored.

For most people, I recommend Dashlane. It's simple, so you'll actually use it. It may even save you clicks.

Nothing is 100% guaranteed, but all four of these managers take the additional security step of never sending your master password over the Internet. They're like a safe-deposit box that a professional keeps without knowing what's inside, or even holding a key to open it.

In an age where more of our personal information lives, password protected, up in the cloud, we need defenses beyond antivirus software. Using a password manager is the next step.

Now keep all your passwords in a password manager and relax.


Wednesday, May 7, 2014

Cyber Attacks and Data Breaches in April

The large revelation of the Heartbleed vulnerability this month caused chaos across the globe. While organizations were ensuring that they weren’t vulnerable, cyber criminals were busy stealing valuable information and defacing websites.

The list below contains a collection of some of the largest breaches, as well as some of the most bizarre.


Data Breaches via Cyber Attack
Malware on Kaiser Permanente server since 2011 impacts 5,100 members
Security breach at AOL. Users told to change passwords
Iowa State server breach exposes SSNs of nearly 30,000
Hackers may have accessed details of 500,000 considering cosmetic surgery
German space centre endures cyber attack
French hard-drive maker LaCie cops to YEAR LONG card data leak
Medical staffers fall for phishing emails, data on 8,300 compromised
Chicago doctor’s email account accessed, held info on 1,200 patients
Deltek suffers cyber attack
Breach impacts thousands in Bibb County that applied for gov’t jobs
Unauthorized access gained to about 800 JSTOR accounts


Data Breaches via Physical Attack
Second burglary breach within a month for Coordinated Health
Tufts Health Plan data stolen, 8,830 members impacted
Fate of unencrypted drive unknown, PHI of 5,500 in Virginia at risk
Three laptops stolen from New York podiatry office, 6,475 at risk
Data on 55,000 VFW members impacted by attacker seeking military intel
More than 1,400 medical records compromised in Texas breach
GovWin IQ hacked, payment card data of 25,000 Deltek customers at risk
Drives containing info on 2,500 stolen from Michigan health department
Theft of computers from Texas non-profit risks data on nearly 3,000
Germany suffers biggest ever data breach in its history


DDOS
Games Maker Blizzard Suffers From European DDoS Attack
UK webhost 123-Reg in DDOS attack


Other Attacks, Breaches & Mistakes
Jailbroken iPhones at risk from new malware
Japan airport staff dash to replace passcodes after security cock-up
Google kills fake anti-virus app that hit No. 1 on Play charts
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Viber mobile messenger app leaves user data unencrypted
Triathlon camera drone falls out of the sky, owner claims it was hacked
Microsoft Xbox pwned by 5-year-old security researcher


Monday, May 5, 2014

Clean Windows Registry and Speed up your PC

The Windows registry is not exposed, are protected at all times for maximum speed and performance. In addition to topics such as hardware, memory problems, incompatibility of device drivers and problems that can not be removed from the registry, but most of them do I have to deal with themes of Windows registry problems with the Windows registry. You have to be repaired, or as soon as possible to keep your computer updated and corrected effectively.

You can find many problems in the registry now and have to run again. All modern operating systems Windows, the registry database or registry stores all the configuration settings for the respective components in the computer system.

If you have a program to install add value to the registry and configuration settings in the installed application. But if the program is not fully the location and other information are furnished partially saved or corrupt manner, that many problems and issues register later purchased.

Another important reason is that when you remove programs from your computer, some of the residue remains in the Windows registry, and delete them gradually collect debris and create more unwanted records in the database. These elements generate a lot of problems such as slow computer later, blue screen error and many such cases in your system.

Another important factor is computer viruses and other malicious programs. The virus can cause great damage to the Windows registry. He has the potential, and that it was designed to the registry is damaged before you do anything else. The virus changes the basic registry entries so that the safety of things can not detect or catch it, and they can do, what role is actually exercised.

These three things or issues that are important for Windows, sometimes corrupt registry, and then the system creates more questions. For the latter reason, for example, virus removal, you are a good and effective virus protection to all malicious entries must be deleted from your system and registry, anti-virus software is usually not intended to restore the damaged Registry. Since a reliable registry cleaning software is not required.

All the many thousands of corrupt registry keys as empty, directories, file path, the class ID, interface, font, links and many other similar and undesirable elements necessary for safe and effective registry repair tool that really convinced that it takes to be removed from the registry without the system and other programs on your computer.

Use Necessary Software to Keep System Clean
There are many tools available on-line registry cleaner, but not all of them are very efficiently and reliably. Most of them just happened to be the best is, but they do not work, and they are ineffective. In this case, choose the best thing you can do is download a trial version of the software in a while and watch the results of the software will decide whether further action: to buy or use.

Get the free CCleaner (www.piriform.com/ccleaner) which is available for both Windows and MAC. It makes short work of cleaning up your system's temporary files. MAC users can also use OnyX (www.titanium.free.fr) which offers advanced cleaning options.

SpeedUpMyPC (www.uniblue.com/software/speedupmypc) is the updated and successful program, designed to clean and repair all the unwanted stuff from your computer in an efficient manner.

Defraggler (www.piriform.com/defraggler) is a great tool that offers the option to defrag the entire hard drive or just specific folder. It displays a drive map that shows how the space of your hard drive is utilized.

TuneUp Utilities (www.tune-up.com) as you install more programs, you might notice that your PC takes longer to boot up. This happens because many applications and services automatically initialize during the boot process. Tune Up Utilities can analyses your PC's boot up time and removes unnecessary startup programs. It even lets you individually select the programs you want to remove from startup. MAC users can do the same by going to System Preferences > Accounts > Login Items and removing applications that you do not want to open automatically when you log in.

Friday, May 2, 2014

Facebook hackers fooled into hacking their own accounts

A video post making the rounds on Facebook shows how to hack the highly popular social media website in order to gain access to accounts and other features – but really it is a scam that only results in users hacking their own accounts.

Last week, researchers with Symantec discovered the scam impacting users in India, according to a Wednesday blog post, which explains that the operators are using a variation of a trick known as self cross-site scripting, or self-XSS, that dates back to 2011.

It is a fairly simple strategy.

The video post links to code stored on Google Drive and states that, by pasting the code into the browser console window, the Facebook hack will be successful within a couple of hours, Satnam Narang, a researcher with Symantec Security Response, wrote in the blog.

What actually ends up happening is that the victim's Facebook account begins following and "liking" posts by the scammers, according to the blog, which adds that accounts also tag their friends in a comment on the original video post, in order to spread the scam.

“The code impacts any Facebook user around the world,” Narang told SCMagazine.com in a Thursday email correspondence, noting users in the U.S. may have been affected. “It just so happens that this particular campaign was launched in India. The code is geo-location agnostic.”

The code, which contains hints that the authors may have been Turkish, is fairly lengthy and complex, Narang said, but he explained that what it essentially does is utilize commands and requests made to Facebook in order to perform the specific actions, such as subscribing to a profile.

“This particular scam is specific to Facebook and cannot be used on other social media websites and services,” Narang said. “The goal here, for these scammers, is to inflate the 'likes' and follower counts for their company and brand pages and their own profiles on Facebook."

Narang added that Facebook disabled consoles in some browsers and gives users a choice to turn it back on.

Facebook launches anonymous login

Yesterday on F8 Conference, Facebook have made number of announcements. On those one is introducing Facebook Anonymous login feature. According to this feature, Facebook users will be able to log in to third party apps anonymously using their Facebook login. This will help users to log into there account without sharing their personal information.

CEO Mark Zuckerberg, explain the Anonymous Login tool as, many users did not feel comfortable sharing their details with an app that allowed Facebook login, without trying the app first. By selecting the “Log In Anonymously” option, users will now be able to log in to apps and services and ascertain whether the app is worth using and if it can be trusted with their details. If users are afraid that logging into a certain app will result in their friends being spammed with requests, then they can opt for the anonymous login. Doing so will ensure that the app developers do not get to see your identity or details and will only be able to do so once you choose to sign in to the app in a regular manner.

Another announcement that highlights Facebook’s attempts at improving user privacy also dealt with app logins. The social network will now allow users to see and control all data that an app requires when you’re logging in. The new login screen will allow users to uncheck any part of their data they don’t want the app to receive before actually logging in. The granularity of this means that users can (as an example) choose to let an app see their likes and email address but not their friends list and birthday. Users will also get a newly designed app control panel that gives them a better view of the apps they use and control their permissions.