Quantcast

Archive: Oct 2013

Remove Qone8.com (Start.qone8.com) Hijacker / Browser Redirect

Qone8.com obtrusively meddles with one’s online surfing by hijacking the web browser on the affected computer. Ultimately, this activity leads to your default homepage getting modified (to start.qone8.com) and your web search provider changed in a forcible fashion (to search.qone8.com). Moreover, no matter...

SUPERAntiSpyware Licenses Giveaway for Halloween!

Not only is Halloween a scary and mystical holiday, it’s all about lots of fun and gifts, too! Following the tradition, we at Privacy PC are happy to announce a major giveaway of security software licenses to our readers, courtesy of SUPERAntiSpyware. Winner of the Privacy PC Bronze Award in the...

Web Application Hacking – SSL / TLS Infrastructure and Attacks

This article highlights the issues raised at the Florida State University lecture for “Offensive Security” regarding SSL and TLS protocols, namely their background, infrastructure, flaws and known crypto attacks. The outline for today’s talk is we’re going to go over SSL and TLS and cover its...

CyberGhost 5 VPN review

Free Whether you are a free or paid user, CyberGhost VPN provides online anonymity and privacy while featuring ease of use and intuitiveness. Usability:  Features:  Efficiency:  Support:  Overall:  Download Whereas browsing online anonymously used to be perceived as the...

CryptoLocker Virus: “Your Personal Files Are Encrypted!”. How-To-Remove Guide

September 2013 turned out fruitful and lucrative for one of the cybercrime syndicates out there, but really alarming for private users and organizations on the other side of the IT security battlefield. The reason is the launch of a vicious computer infection known as CryptoLocker which in terms of severity...

Bruce Schneier on The Matthew Filipowicz Show 2: Obstacles to Restoring Trust for the NSA

As a follow-up on the interview, Bruce Schneier explains his perspective of ways for the NSA to regain citizens’ trust and the economic aspects of the matter. – I’m talking to Bruce Schneier, a security technologist, encryption specialist and author. Let’s talk about the political side of what...

Guide to remove New Zealand Police virus

The New Zealand Police virus, also known as “Nga Pirihimana o Aotearoa” or New Zealand E-crime Lab ransomware, is targeting users physically located in New Zealand and does it in a fairly vicious way. This malicious code causes the affected operating system to display a scary-looking lock screen...

Bruce Schneier on The Matthew Filipowicz Show: NSA Working with Tech Companies to Insert Weaknesses into Code

This entry reflects a down-to-earth discussion with security guru Bruce Schneier about how the NSA endangers regular PC users while spying on alleged adversaries. – Alright, joining me now here on the Matthew Filipowicz show is Bruce Schneier. Bruce is a security technologist and encryption...

The US Department of Justice MoneyPak Virus Removal Tutorial

The reputable name of the United States Department of Justice has been disgracefully exploited in cybercrime schemes since late May 2013. Scammers ventured to launch a campaign involving ransomware distribution, stating that it’s being done on behalf of the above-mentioned federal executive department....

Bruce Schneier on the NSA’s Surveillance 5: Possible Backlash of Ubiquitous Spying

The Occupy Radio host and Bruce Schneier now dwell on the probable outcomes of the NSA’s spying activities and try to depict the future state of affairs. – Ok, now that exists on a domestic scale and it exists on an international scale: we want to have power over a government. I’m curious: is our...

Bruce Schneier on the NSA’s Surveillance 4: The Social Value of Privacy

The radio talk show host and security expert Bruce Schneier now discuss the amount and methods of data collection by the NSA and how it affects citizen privacy. – I’m speaking with authoritative security expert Bruce Schneier about the data collecting agency, the NSA. We’re talking about fear, real...

Royal Canadian Mounted Police Ransomware Virus Analysis and Removal

A big trend of today’s cybercrime is distributing ransomware locking victims’ computers allegedly on behalf of local law enforcement agencies. One of such infections pretends to come from the Royal Canadian Mounted Police, a reputable Canadian national police service. While the name of this institution...

Bruce Schneier on the NSA’s Surveillance 3: Misperceptions of Terrorism

The collocutors are now shifting the focus over to issues of defining terrorism and the role of corporate profit and political power in today’s NSA activities. – The fix is bringing all out into the open? – Yes. Like with any other program, we have to know if what they’re doing is legal, if...

Bruce Schneier on the NSA’s Surveillance 2: Eavesdropping on Everything

Bruce Schneier and the Occupy Radio host now discuss cost efficiency of the NSA’s programs and broad data mining as well as the political aspects of the matter. – We have been able to voice an opinion on the breadth of the spying that is happening against us? – The breadth, the depth, the...

Bruce Schneier: NSA is Wasteful and Dangerous

During a podcast on Occupy Radio, the host and a renowned security expert Bruce Schneier get to discuss the NSA practices in terms of treating citizen privacy and other related issues. – Bruce Schneier is an internationally recognized expert on cryptography and data security. He was dubbed a...

Australian Federal Police (AFP) Ukash Virus – Description and Removal Advice

Victim geolocation being today’s big trend in the cybercrime world, the ransomware version attacking Australian users came out in summer 2013. Similarly to its U.S.-based (the FBI Moneypak virus) and British counterparts (PCeU, Metropolitan British Police infections), the Australian Federal Police (AFP)...

CuteCats.exe and the Arab Spring 3: Surveillance Malware in Libya and Bahrain

Morgan Marquis-Boire finishes his Black Hat presentation with analysis of governmental cyber operations held during protests in a number of other Arab states. Syria isn’t the only country in this region that has experienced these types of operations though. After the success of the revolution in Tunisia,...

CuteCats.exe and the Arab Spring 2: Social Engineering and Remote Access Toolkits

Google’s Morgan Marquis-Boire is focusing on governmental use of topical social engineering, surveillance malware and remote access toolkits in Arab countries. While we’ve seen a steady stream of Facebook phishing attacks, we’ve also seen attacks focusing on Skype and YouTube. Many of you may have...

CuteCats.exe and the Arab Spring: Governments vs Dissidents

Morgan Marquis-Boire, Security Engineer at Google Incident Response Team, analyzes the digital aspect of activism and anti-dissident activities during the Arab Spring. Hello and welcome to CuteCats.exe and the Arab Spring. My name is Morgan Marquis-Boire and I work on the Google Incident Response Team....

Guide to Remove Metropolitan British Police Ransomware Virus

The Metropolitan British Police virus is one of the series of sophisticated geographically localized ransomware threats (FBI MoneyPak, PCeU malware) affecting computers at a steadily increasing rate for months now. The large-scale campaign behind this infection involves a complex infrastructure of web...