Friday, April 29, 2011
Saturday, January 22, 2011
Twitter hit with Goo.gl faked antivirus worm
By Ed Oswald | Published January 21, 2011, 3:37 PM
A new virus is spreading around Twitter using the Google 'goo.gl' URL shortening service, posing as anti-virus software. Affected users may see tweets with links in their timelines ending with "m28sx.html," says Graham Cruley of security firm Sophos.
Clicking on the link will take the user a page that claims the computer is infected, and attempts to trick him or her into installing the malware-infected software as well as to pay for disinfection. Once downloaded, the virus then posts a tweet under the users account with the link in an attempt to infect his or her followers.
It is not immediately clear how the malware is gaining access to Twitter's API to make these posts. Typically a user must authorize any external applications to gain access to post tweets. Cruley said he isn't sure either.
"The natural suspicion would be that their usernames and passwords have been stolen," he wrote in a blog post. "It certainly would be a sensible precaution for users who have found their Twitter accounts unexpectedly posting goo.gl links to change their passwords immediately."
Twitter has acknowledged the issue. "We're working to remove the malware links and reset passwords on compromised accounts," Twitter's security chief Del Harvey said in a tweet on Thursday night.
Sophos is calling the virus 'Troj/FakeAV-CMG.' The company's software has been protecting its customers since January 12, Cruley said. Kaspersky is also offering protection in its own software as well.
This isn't the first time Google's URL shortener Goo.gl was the source of malicious activity. Last month, a worm made its way across Twitter posting links to a fake French furniture site. Clicking on the link would take the user to a site that would then execute code and help to propagate the worm.
Sunday, October 24, 2010
Many people are paranoid about their computer getting infected with malware, and rightly so. But today there are many measures you can take to combat the onslaught of malicious software plaguing the World Wide Web. Some effective controls include:
- Use the latest anti-malware software and keep it updated daily. New viruses are always being released, and diligent anti-malware programmers are always working on software updates to prevent these new bugs from infecting your system. Don’t forget to check for updates daily! Of course, most programs today can be setup to run these checks and perform updates automatically.
- Install security patches and updates on all your software on all computers and laptops, not just on virus protection and Windows on your main PC.
- Use a firewall. Many people assume they have a firewall and likely do, but it may not be configured correctly. Ask your repair technician to make sure you have this essential feature working properly for your protection.
- Stay ahead of the bad guys by carefully monitoring your email. Many people aren’t aware that a lot of worms and Trojan horses infect your computer by using legitimate email contact names. So even if you think you know who sent it, avoid opening email attachments you receive unexpectedly or under any suspicious circumstances. And treat IM just as carefully.
- Keep it simple. Plain-text email is safest, as even your email client can put you in danger of infection.
Avoid distributed and P2P filesharing. Although it may be free and fun, there’s no such thing as safe anonymous filesharing. Avoid it no matter what. Common sites include Bit Torrent, Limewire, Kazaa, Gnutella, and Morpheus.
Thursday, October 7, 2010
• Despite investing in the best anti-virus software, you can still be infected. Unfortunately, even the most reputable and up-to-date virus protection programs are unable to catch every little bug that’s created by malicious coders.
• Once you’ve been infected, be wary of trusting computer repair to anyone other than the experts. Computer virus removal is complex and requires in-depth knowledge of computer systems and how they operate; be wary of trusting repairs to a program or online service, even if it’s guaranteed. You may end up with even worse problems.
• Malware should be removed when it’s in a dormant state. There are many ways to go about accessing an infected drive safely; your computer repair technician is trained in these methods.
• A registry backup should always be performed. This will protect your system in case any settings are accidentally deleted or changed.
• Malware needs to load in order to do damage. Once they have safe access to the infected drive and a registry backup has been performed, your technician will begin by checking the common startup points for signs of infection.
Malware is smart. Not only are there more and more malicious viruses being released every day, modern versions have built-in measures to prevent discovery and removal. These can include blocking access to your Task Manager or Folder Options menu. Once all viruses have been removed by an expert, make sure your system settings are restored so you regain normal access and control.
• Rely on experts for up-to-date prevention measures. Once your system is repaired, the last thing you want is déjà-vu. Don’t let your computer repair technician slip away without advising you on the latest browser security measures, system patches, anti-malware software, and safety tips to prevent future infections.
Tuesday, August 17, 2010
For Sale @ CWP Tech Solutions $22.00 RETAIL
Have you ever considered what makes an anti-malware Application effective? Malwarebytes has created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your Computer is always at risk of becoming infected with viruses, worms, trojans, rootkits, dialers, spyware, and malware that are constantly evolving and becoming harder to find and remove. Only the most sophisticated anti-malware techniques can find and remove these malicious programs from your computer.
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. The product has compiled a number of new technologies that are designed to quickly find, destroy, and prevent malware. Malwarebytes' Anti-Malware can find and remove malware that even the most well known Anti-Virus and anti-malware applications fail to find. Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start. The Real-time protection module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, Malwarebytes has implemented a threats center which will allow you to keep up to date with the latest malware threats.
•Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
•Light speed quick scanning.
•Ability to perform full scans for all drives.
•Malwarebytes' Anti-Malware protection module. (requires registration)
•Database updates released daily.
•Quarantine to hold threats and restore them at your convenience.
•Ignore list for both the Scanner and Protection Module.
•Settings to enhance your Malwarebytes' Anti-Malware performance.
•A small list of extra utilities to help remove malware manually.
•Works together with other anti-malware utilities.
•Command line support for quick scanning.
•Context menu integration to scan files on demand.
Saturday, July 17, 2010
Tuesday, June 15, 2010
Is your computer locking up? Are you getting a weird error message that you can't figure out? Are you having trouble even starting your computer? No matter what kind of problem you're having, big or small, you've come to the right place in your search to find the solution!
It doesn't matter if you're a seasoned computer professional, a fix-it novice, or somewhere in between - these resources will help you get your computer back up and running in no time.
Common Error Messages
Anyone who regularly uses a computer knows all about error messages. Those of you who are also Windows users probably see more than your fair share of them. As a computer service professional, I see more error messages than anyone should in a lifetime!
Listed below are some of the more common error messages that my readers and clients see on their computers.
- 404: Not Found
- Hal.dll is Missing or Corrupt
- NTLDR is Missing
- 500: Internal Server Error
- Unknown Hard Error C:\Winnt\System32\Ntdll.dll
- D3dx9_41.dll Not Found
- 403: Forbidden
- LAME_ENC.DLL Was Not Found
- STOP: 0x0000007B (Blue Screen)
- Xlive.dll Was Not Found
- ...see an Alphabetical List of Error Messages
Repairing & Reinstalling Windows
Microsoft knows that problems happen - which is why it provided tools like Safe Mode, Startup Repair, and Recovery Console. You can see complete walkthroughs below.
Sometimes, however, the only solution to some Windows problems involves a complete reinstallation of the operating system.
Below are step-by-step guides to each kind of installation, complete with images and detailed instructions. These resources make a traditionally complicated procedure easy enough for anyone to take on!