Friday, March 18, 2016

Make backups of your browser and email client


The majority off users make use of the browsing history, bookmarks or favorites and the option to remember passwords. On more than one occasion it can be very useful to be able to take with us this information that makes up our user profile.

  To do so we have MailBrowserBackup, a simple free utility that makes a complete backup of your browser or client so that you will be able to take it anywhere to update your favorite browser or email client.

  The main features of MailBrowserBackup are:
- Make backups.
- Support for the majority of browsers: Firefox, Internet Explorer (only saves favorites), Opera (both the browsing and the email profiles), Safari, Google Chrome and Flock.
- Support for the most important email and instant messaging clients: Windows Mail, Windows Live Mail, Windows Live Messenger, Windows Live Messenger Plus!, Outlook 2003/2007, Mozilla Thunderbird, Pidgin, etc.
- Compatible with other programs like FileZilla FTP Client, Windows Calendar or Notepad++.

  If you want a backup of your user profiles, to keep them safe in case your PC has any errors, and that also allows you to port them to any computer.

 Download MailBrowserBackup.
http://mailbrowserbackup.en.malavida.com/

ThunderFix


Thunderfix is a small tool that can fix Mozilla Thunderbird performance. If you have more GB of emails stored in Thunderbird and if you are experiencing slow start time, slow navigation through email folders, you might try Thunderfix. What Thunderfix does is that it detects *.msf files within your Thunderbird profile and removes them. After that, you can run Thunderbird and wait for new MSF files to be generated and you’ll see the improvement. With time MSF files become corrupted and can contain garbage, so this is quick solution for the problem. This way, the program runs smoothly and faster. If you want to read more about this issue and see how this tool works, check out this article. It supports version 2.0, but may work with older versions too. Use it at your own risk.

How to use it

    Close Mozilla Thunderbird.
    Choose your Thunderbird profile you with to fix (if you have only one profile, in most cases that is “default” profile).
    Thunderfix will count MSF files and will display the number below the profile name.
    Click “Fix profile” button.

http://www.parhelia-tools.com/products/thunderfix/thunderfix.aspx

Wednesday, March 9, 2016

What Windows 10 Knows About You


Windows 10 collects astonishing amounts of information about its users, with Windows 7, 8 and 8.1 to follow the trend with newly published Windows Updates. The following information is collected and transmitted to Microsoft:
windows 10 Privacy fix

    Everything you type on the keyboard (effectively, Windows 10 comes with a built-in keylogger)
    Wiretapping: Windows 10 can listen to your microphone and engage your webcam in background without you even knowing (no, this is not a hoax)
    Logins and passwords to Web sites, social networks
    Fragments of email messages, chats and text messages (including those you send and receive via crypto-messengers such as Telegram)
    Your geolocation coordinates (GPS, AGPS or approximate IP-based coordinates)
    Your complete Web browsing history
    Your search queries
    Wi-Fi access points and their passwords
    List of installed applications
    Information about your listening preferences including the names of music tracks you’re listening
    Call logs
    Your calendar entries, events and meetings
    Your address book
    BitLocker escrow keys: if you encrypt your hard drive or eMMC memory with BitLocker, recovery keys are automatically uploaded to Microsoft OneDrive; Microsoft Privacy Policy allows the company disclosing those keys to government agencies by request
    Future Windows 10 updates are rumoured to disable features if the system discovers what it considers to be “incompatible” or “unlicensed” software or hardware components

Privacy Protector for Windows 10

There is no easy way of completely disabling the tracking features of Windows. Even if you disable all the tracking features in the Privacy applet of the new Control Panel, Windows 10 will still keep collecting and transmitting many types of data.

To help you fix Windows 10 privacy issues, we developed an all-in-one tool. Privacy Protector for Windows 10 allows you to disable select or all tracking services found in Windows 10 and delivered to Windows 8.1, 8 and Windows 7 with updates. Privacy Protector for Windows 10 does the following things to stop Windows 10 tracking:
windows 10 Privacy fix

    Deletes or disables Telemetry
    Clears and disables DiagTrack Log
    Stops, blocks or removes over 37 tracking services, including tracking activities discovered in the following Windows services:
        Cortana background tracking services
        Media Center
        Customer Experience Improvement Program
        Power Efficiency Diagnostics
        Family Safety Monitor
        Office ClickToRun Service Monitor
        Application Experience
        Office Telemetry
        Disk Diagnostic
        Media Center
        Windows Search
    Disables Keylogger, preventing Microsoft from collecting information you type on your keyboard
    Disables Windows Defender.
    Disables Cortana to prevent background collection and transmission of data recorded with your microphone and webcam
    Disables Windows Update, allowing you blocking unwanted updates
    Selectively rolls back certain Windows Updates enabling tracking features (for Windows 10, 8.1, 8, and Windows 7)
    Disables certain Telemetry and tracking modules in Microsoft Office 2016
    Optionally blocks Microsoft Office updates
    Enables users to uninstall OneDrive
    Enables disabling Bing Search
    Enables uninstalling built-in and non-removable Metro and Universal applications, releasing RAM and effectively stopping additional tracking performed by these applications
    Enables the ability to remove all Metro and Universal applications, effectively bringing your Windows 10 installation as close to Windows 7 as at all possible (you’ll have to download the old Calculator app though)
    Allows reinstalling Windows 7-8 Picture Viewer
    Blocks more than 60 Microsoft IP addresses engaged in user activity tracking on host level (by modifying the hosts file)
    Blocks IP addresses from the tracking network by creating Windows Firewall rules
    Automatically creates a Restore Point before making changes to the system
    Most Privacy Fixes can be reverted if required
    Some Privacy Fixes cannot be reversed even via System Recovery

http://www.softorbits.com/windows-10-privacy-protector/thanks.html

Thursday, March 3, 2016

How to identify phishing mail.


Mails with serious content in an official tone, final notices or seemingly technical issues are enough to unsettle most readers.
Often, this is an attempt at cheating you out of your money. How can you catch on to the scammers, where do they give themselves away? The first step is to realize that your personal information is already in the wrong hands. Phishing schemes are designed to confuse and trigger hasty actions.

How do hackers manage to steal your information?

Phishing mails seem twice as credible when they already contain the correct name, address and even your bank information. This information can come from various sources. Maybe one of the companies you recently dealt with was hacked. Entire collections of stolen user profiles are available for sale on the dark web, the part of the Internet that requires specific software and authorization that is frequently used by criminals. Have you ever had a Trojan on your PC? This type of malware collects your every input and can create extensive user profiles. Have you recently participated in an online raffle or similar offers that require you to provide your personal data? Hosters of free services finance their offers through the sale of customer data sets among other things. It pays to think twice before you give away your real name, address and bank information. It's easy to change your email address but your place of residence or your bank account? Not so much.

How to identify phishing mails.

Look for irregularities. Did the sender write to you before? What about spelling and syntax? For example, many scammers use Google Translate to create mails in foreign languages. These mails contain valid words but in weird combinations. As native speakers, your bank, PayPal or whoever supposedly wrote them usually do much better.

That's the essence common to many phishing mails. Unless you're facing bankruptcy or love to collect final notices no respectable company will write to you in this manner. This pressure is built up to make you act rashly, give away your data or make that urgent transfer. But frozen bank accounts and property seizures are always the last resort and don't happen over night. So stay calm, think and contact the companies mentioned through regular channels (phone / email). Don't use the contact address provided in the mail as this may lead you to other criminals that will try to convince you of its validity.
Online banking is often the focus of criminal actions

No bank requires your data, PINs or TANs! Whenever you're prompted to input your user name, password or even transaction codes, something's fishy. The authors of such emails are crafty in finding new reasons for you to "confirm", "verify" or input data for "further processing". Your bank already has all the information otherwise you wouldn't be able to log into your account in the first place. Scammers also like to pretend that your account has been suspended or hacked. Again: Call your bank and sort things out. If a wave of spam mails is under way, your bank will most likely clear this up with you quickly.

Don't open attachments and don't click on any links if you're uncertain about their contents! Even good antivirus software cannot provide 100% protection against all Trojans and other malware. Very popular: Links hidden in a PDF document (e.g. to display the status of your package delivery) that will lead to a download link for a Trojan so the original attachment is clean but the link target is not. Bad!

It's unlikely that you're the first to receive this mail. Numerous sites deal with this topic and provide up to date examples. If you find weird phrases simply copy them into Google Search. In all likelihood, you will quickly discover fellow users with the same problem so the issue gets resolved soon.

Scammers are currently using a new scheme on Facebook. Using fake profiles that resemble those of your friends, users will ask you for your cellphone number. Instead of a message, you will receive an SMS with a code. While you're still trying to make sense of this, your "friend" will then ask you for that code. If successful, you will be charged for the message by common payment providers such as PayPal, Buy with Mobile or their offspring Zong on your next cellphone bill. Solution: Adjust your privacy settings so that only your friends can view your list of Facebook contacts.

Does the mail contain links? Simply hover your mouse over them, don't click. Most email applications will already display the link target this way. Make sure it's the right company and pay attention to every detail as scammers tend to use addresses that are very similar to the originals.

If you're willing to dig a little deeper into the technical details, you may also want to analyze the email header. Because what is usually simply displayed as a name in our email applications contains a lot more information than that! Visit iptrackeronline for further details.

Still uncertain? Visit the company site the mail supposedly refers to (before you open any attachments or click on any links in the mail!) and log in as usual. Whether it's your bank, Amazon or PayPal, if the mail is legitimate, you will find similar messages or notifications in your user account. If there aren't any feel free to delete the mail.

You see, the best security system still sits between your ears! Be vigilant and stay calm when you receive mails you can't immediately make heads or tails of. Run a full virus scan. Most Trojans will be detected and eliminated by your antivirus program. Modern online banking methods, alert users and good antivirus applications are making it harder for these phishing attacks to work yet the yearly damages caused are estimated to be in the billions.

Sven Krumrey
https://blog.ashampoo.com/en/2016-03-01/the-devil-is-in-the-details-how-to-identify-phishing-mails?utm_source=ashampoo&utm_medium=automail&utm_content=the-devil-is-in-the-details-how-to-identify-phishing-mails&utm_campaign=blog

Sunday, February 28, 2016

The biggest security threats of 2016 are…


Cyber attacks continue to be on the rise, and according to TWCN Tech News, these are the biggest cyber security threats of 2016:

    Mobile attacks
    Online extortion
    Password recovery scams
    Digital attacks causing physical damage
    Internet of Things (IoT) leading to cyber attacks

Mobile attacks have been on the rise recently due to our increased use and reliance on mobile devices.  By using certain applications to store your personal information, you may be setting yourself up for a mobile attack. It is best to keep your personal data off your mobile devices entirely, but if you choose to keep payment information on your mobile devices, make sure you are not putting all of the data in one place.  By doing so, if your device is hacked the scammers have a one-stop-shop to all of your information.

Online extortion, also known as ransomware has become increasingly popular.  In the last few weeks there have been stories of ransomware attacks at hospitals and school districts in USA.  Unfortunately, the ransomware left servers completely useless without any way to obtain the lost data without the encryption key.  For these two examples, both paid the ransomware to obtain the keys so they could get back into their files.  It is understandable, in these two cases, they needed to get their information back; however, by paying the hackers, their behavior is being rewarded and the likelihood of continued attacks increases.

Password recovery scams are related to phishing scams.  Once the hackers gain access to your email account they can recover your password and compromise your account.

Digital attacks are not only an invasive way to obtain your personal data, but could also lead to physical damage to your devices.  The act of backing up your data is critical in all of these attacks, but is particularly important when your device is rendered useless.

IoT, or things that have WiFi or Bluetooth capabilities, are potential cyber attack targets.  Many of these things, (eg: smart TVs, refrigerators, cars, etc.) don’t have a direct security software program to protect them from attacks, meaning the protection from a data breach is limited.

So what can you do to keep your information safe?  We encourage you to back-up your data.  You also need to be sure that your back-ups are current, and are encryption free.  You should also be sure not to use the same password for different accounts.  It is also encouraged that you change your password every 30-60 days.  These passwords should have various authentication components, such as using capital and lowercase letters, numbers, and other features such as #, $, % etc.

You should also be sure to keep your device software up-to-date.  Many times, if there are security holes, they will be patched during updates.  If you are neglecting these updates you could be leaving yourself open for attack.  Lastly, be sure to use security software for all applicable devices.

Kayla Thrailkill
http://techtalk.pcpitstop.com/2016/02/22/52637/?top5cyberthreats=

Monday, August 17, 2015

Internet fraud that targets seniors


The following list describes the most common scams that target seniors in the contemporary digital landscape, and how to avoid them.

1. Social Security Scam

Tens of thousands of seniors in the US have fallen victim to this new social security scam. Scammers create legitimate online accounts with the social security website and redirect payments to their own personal accounts. With over 59 million Americans receiving social security benefits in 2014, this scam targets many individuals’ primary source of income.

Never share your social security details with anyone, ever.

2. Funeral Invitation

As we reach more mature phases of life, we anticipate more loved ones and acquaintances passing away. Internet con artists take advantage of this sad fact of life and send out fake funeral invitations to lure in older individuals. When the victim sees the email, they click a link or open an attachment to learn the name of their deceased friend/acquaintance. Then malware attacks their computer and steals sensitive information that can be sold to cyber criminals or used immediately to steal money.

It is cruel, but scammers don’t care about your feelings. Be careful when opening any attachments.

3. Work at Home Scams

Everyone is looking to make an extra buck here and there, and seniors are no exception. Often older members of a household may want to contribute more to family finances, but this noble mission can end poorly for those who respond to fake advertisements. If it seems too good to be true, requires specialized training, or asks for “training” money, it is most likely run by a scammer looking to get access to an unsuspecting victim’s bank account (or even some free labor).
Working from home is very attractive not only to seniors, but also stay-at-home moms and individuals with limited mobility and resources.

4. Lottery/sweepstakes Scams

Since older internet users may be less experienced than their younger counterparts, they may easily fall for a sweepstakes scam, often in the form on an email informing them they have won some kind of prize (usually money). The email will ask for funds to release the prize money or sensitive personal information to allegedly pay taxes or bank fees.

If it sounds too good to be true, it probably is.

5. Fake Online Pharmacies

Seniors have more ailments, and as result, potentially high medical bills depending on the country they reside in. Other times they struggle with mobility and transportation. Either of these issues makes using an online pharmacy a tempting option. However this need makes the elderly  vulnerable to fraudulent online vendors. This can be confusing for many people, not just seniors, because legitimate online pharmacies do actually exist. But according to the NABP (National Association of Boards of Pharmacy) 96% of online pharmacies operate outside of existing legal structures, and “fuel prescription drug abuse and misuse.”

There is a thin line between cheap and fraudulent.

6. Sweetheart Scam

Many older individuals suffer from loneliness. In England alone, over 61% of all people over the age of 75 live alone. It’s natural for older internet users to turn to dating sites and social media to alleviate this loneliness.

Unfortunately, this also increases their risk of falling for a “sweetheart” scam. These cyber criminals lure in their victims with a prospect of love, usually through many back and forth messages. These fake “sweethearts” ultimately exploit the victim’s pocketbook, asking for funds to come and visit or to buy basic necessities. People have reported being scammed up to hundreds of thousands of dollars.
Love makes us happy, but it can also make us blind for fraud.

Love makes us happy, but it can also make us blind when it comes to fraud.

7. Grandparent Scam

This is an old trick that preceded the internet: an alleged “grandchild” calls from a noisy location, telling the grandparent in question that they are in trouble and need money immediately. Nowadays, this can also come in email form.

Criminals even going so far as to accurately assume the identity of the victim’s grandchild or family member and claim the matter is incredibly urgent. Desperate to help their beloved, this stops internet users from thinking twice about sending money.

Don’t let scammers tug at your heartstrings. Always call your loved ones before sending them money.


8. Investment Scams

The only person getting rich is a successful scammer.

While investments made online have become increasingly popular, so has scamming people with get-rich-quick and Ponzi schemes. These can take the form of professional looking ads, websites, and videos that detail how other individuals

have made their fortune this way. Other times it will come in the form of an email from a trusted source, like a family member or friend. Unbeknownst to them, their email account has been have hacked and a scam artist is utilizing it to

lure unsuspecting victims into paying large sums of money they will never see again.

9. Fake Check Scam


There are lots of trusted platforms that enable you to securely send and receive money for your goods. The internet can be a great place to sell that old couch or elliptical machine, but you should be wary of the offers you receive. When an unsuspecting victim puts something up for sale on the internet, they may be impatient to rid themselves of the listed item and make some quick cash. Unfortunately this is when scammers strike, offering the lister a cashier’s check that’s often made out for more than the agreed upon price. The victim will pay the scammer the difference only to find out later that the check is a fraud. Seniors are more likely to fall for this scam because they trust older forms of payments like checks over secure forms of internet-based payments.


10. Charity Scams

Looking into the eyes of a poor child makes it hard to say no or think straight…

Charity scams are old news in the realm of telemarketing, but are their increasing presence online is a cause for concern. Seniors should be wary of any emails that ask them to contribute to a charity, even if the associated website and materials appear legitimate and well designed. Most federal governments have lists of registered charities, and the representative in question should be able to provide a registration number or ID that can be cross-referenced with the appropriate national registry.

Protecting yourself from Internet scams

Reading about all these scams may have you thinking that you should just turn off your computer for good! But protecting you and your loved ones from over hundreds of internet scams is just a matter of taking a number of simple

precautions:

    * Set up financial accounts online with a trusted family member
    * Create complicated, un-memorizable passwords for all of your accounts
    * Install trustworthy anti-malware
    * Always learn the whereabouts of your family when you suspect their identity has been stolen
    * Be wary of “officials” contacting you stating they are from a financial institution or the government
    * Never open an attachment from an unidentified source
    * Be suspicious of emails, ads, and websites that offer you money in exchange for personal information or an upfront payment
    * Learn what precautions to take when dating online

Scams can bring lots of stress to your entire family, but they don’t have too. A combination of adopting the habits listed above and communicating regularly about your safety concerns can significantly reduce your exposure to internet fraud.

Just remember, a healthy dose of suspicion goes a long way. Not everyone is trying to take advantage of your trust online, but few things are worth the risk.


found at Emsisoft Blog.  [  http://blog.emsisoft.com/2015/07/06/top-10-senior-citizen-scams-that-affect-the-whole-family/ ].

Saturday, August 15, 2015

Is Your Windows 10 Activated


Windows 10 has been out for a little over a week now, and a good portion of Windows users have already utilized their free Windows 10 upgrade. As soon as you upgrade your system, Microsoft automatically activates your Windows 10 copy in the background, assuming that you’ve upgraded from genuine Windows 7 or 8 versions.

Since the Windows system doesn’t display any “Successfully Activated” type of messages, there will be a bit of confusion whether the installed or upgraded version of Windows is activated or not. The confusion is particularly true if you’ve reinstalled Windows 10.

So, if you ever need to, here is how you can check to see if your Windows 10 system is activated or not.

Check Activation Status through System Window

One of the easiest ways to check the Windows 10 activation status is to look at the System applet window. To do that simply press the keyboard shortcut “Win + X” and select the “System” option. Alternatively, you can also search for “System” in the Start menu.

Once the System window has been opened, scroll down and you will find the wording “Windows is activated” under the Windows Activation section if your system is activated.

This window even displays the option to change the product key if you ever need it, like when you are upgrading from one edition to the other.

By Vamsi Krishna for MakeTechEasier