Toshiba laptops often don’t have the model identified anywhere except on the sticker on the bottom, and the lettering on it typically gets worn away in short order. When you need to check for updated drivers, or buy memory, or any other task which requires the model number, you’re left wondering “I think it’s an […]
Month – August 2014
Security journalist Brian Krebs reports that FireEye and Fox-IT have put together a decryption tool for victims of the Cryptolocker trojan. Uploading an encrypted file (choose one with non-sensitive data) will generate the decryption key with which you can recover your files from the encryption ransom-ware. Note that this only works with the original Cryptolocker, […]
InfoSec firm Hold Security reports that Russian gangs are sitting on what is probably the largest cache of pilfered login credentials to date, over a billion unique logins with passwords. How many is that, actually? ALL OF THEM!! Yours included. Probably. Source: Hold Security – YOU HAVE BEEN HACKED
According to G Data Software, a persistent malware hides itself in a registry entry, which cannot be displayed by regedit, and runs as a Powershell script, even on systems where script processing is disabled. This malware does not use any actual files, thus there is nothing for an AV scanner to scan. Fortunately, SysInternals tools […]
Recent Comments