New Trojan horse for Android

A new Android Mobile Security threat has been discovered that opens a back door for hackers.

Get Mobile Device Management and Security. Now would be good.
Get Mobile Device Management and Security. Now would be good.

Its really not a big deal unless you are OK with letting hackers have control of your phone to:

  • See your list of Contacts.
  • Provide them with your current GPS location.
  • Take photos from your phone anytime the phone is on.
  • Record audio through the microphone anytime the phone is on.
  • Get a List of installed applications.
  • Show a  List of opened webpages.
  • Give them a List of placed calls.

– if you are not comfortable with this sort of activity, we can not strongly enough recommend protecting your Smartphones with LAYERED SECURITY SOFTWARE.

http://www.softwaresecuritysolutions.com/EsetMobileSecurity.html

Or our new partnership with SamsungKNOX. Enterprise class MDM

for BYOD that separates personal from business functions on the same phone. Call us @ 719.431.6140 for details!

Learn more on the threat from “We Live Security” here:

http://www.welivesecurity.com/2014/08/12/krysanec-trojan-android/

Stay Safe out there.

Fix for MalwareBytes not updating

Do your MalwareBytes Updates Fail?

This issue might have few different causes, for this reason this Security TIP sheet is divided into three steps. Apply each step in order and check after each step to see if the problem has been resolved. If so, no further action should be taken and you can skip the rest of the steps.

FIRST STEP

Please, completely uninstall MalwareBytes, Then download it again and re-install it. To do so please follow these steps:

  1. Run mbam-clean.exe to completely uninstall your current installation (please use this file here for a complete removal: http://downloads.malwarebytes.org/file/mbam_clean)
  2. Download the latest version of MalwareBytes here: http://downloads.malwarebytes.org/file/mbam
  3. Install it as an administrator: Right click on the Malwarebytes Anti-Malware icon, and then select “Run as…” (on Windows XP) or “Run as administrator” (on Windows Vista or Windows 7). A dialog box will open. Enter the password (if required).
  4. Re-activate the new version of MalwareBytes with your Product ID and Key using the COPY/PASTE function.

Reboot the PC and see if this solves the issue; if not, please continue to the next step.

SECOND STEP

It is possible that the program has been compromised by some high-tech stealthy malware that prevents MalwareBytes from operating correctly.
For this reason they have developed a free tool called “Anti-Rootkit” that targets malware programs that are trying to block MalwareBytes. Anti-Rootkit also recovers and re installs missing .dll files when possible.
Here is a step by step guide to using the Anti-Rootkit program. Please read it carefully and completely before using this program.

https://www.box.com/shared/static/20v2wl2og7tmg2shx748.pdf

If you need a tool to read the attached document, you can find it and download the Foxit Reader free here:
http://www.foxitsoftware.com/downloads/

Reboot your PC and see if this has fixed your issue, if not please take the next step.

THIRD STEP

It’s possible that you have installed some other security software which is interfering with MalwareBytes. Also anti-tracking software, like “Do not track plus” or even the Mozilla Firefox add-on with the same name, can create this problem.
For this reason, please temporarily disable them all, reboot your PC (very important) and see if MalwareBytes starts to work normally again.
If so that means that one of them is the culprit, and by turning them on one-by-one you will find which one; after you have discover it please setup some exclusions in that program so that it will not interfere with MalwareBytes anymore, thus solving your problem going forward.
Hope this helps somehow  – stay safe out there!

Should I switch from iPhone to Android?

Ever heard of the shiny new object syndrome? Many of you may now be considering switching from iPhone to the Android Platform because of it. While there may be some fancy bells and whistles with this move there are things to consider before making the leap.

Being consumers of technological marvels, we have consistently chosen convenience first, over any other aspect of new technology or service. The question to ask yourself is; how convenient is it for you to make the leap?

Next we choose based on the cool factor which is closely tied to the bells and whistles available. This is commonly referred to as the “Shiny new object” syndrome. The question here is; does the coolness factor (i.e. bells and whistles), justify as a big enough reason to jump in?

Coming in dead last is any inclination of how secure the new technology, service, or platform is.

Talking about computer security is about as exciting as talking about Insurance (big yawn now).

To hear more about this check out the story from CNBC regarding iPhone vs Android HERE

Shameless Plug:
If you have mobile devices you must secure them. This is the leading edge of threats and hackers.

We currently have some Antivirus for Mobile phones but keep an eye out for our new Layered Security Solution for Mobile phones coming to the web site within 1 month. It is cloud based and has all the layers needed to protect mobile phones for businesses.
Stay secure out there – even if it is boring.

Essential Computer Programs for Beginners

The BasicsIn this day and age, we tend to think that nearly everyone we meet is tech savvy and very comfortable using a computer. But the fact of the matter is that there are plenty of folks out there who have recently purchased their first computer or are connecting to the Internet for the first time, making them especially vulnerable to cyber-crime.

If you’re new to computing and want to get the most out of your machine while simultaneously reducing your chances of falling prey to all the hackers and thieves out there, then you’ll first need to purchase, download, and install some basic programs or applications. Here are the essentials that every beginner should have:

  • A web browser, such as Firefox, Chrome, Safari, or Internet Explorer, for surfing the Internet.
  • Avira Internet Security or a similar program that protects your computer from potential attacks when your machine is online.
  • Good antivirus software to identify, quarantine, and eradicate viruses, Trojans, and malware from your computer. This applies to Apple aficionados too, so check out the antivirus for Mac options we have at SoftwareSecuritySolutions.com to keep your MacBook running like new.
  • A password manager to help you keep track of all the different usernames and passwords you set up for your online accounts.
  • A media player for watching videos and listening to music.
  • Document creation software for letters, reports, spreadsheets, and presentations.
  • Personal communication applications (e.g. Skype or AIM) for video chatting or instant messaging with others.
  • Digital media management software for organizing and sharing personal photos and videos.

Remember, this list is meant only as a basic guide for new computer or Internet users and  can easily be modified according to your own needs, preferences, and tastes.

In the meantime, start downloading and installing the above essentials today!

A New Threat on the Rise: Cybercrime

The New Global ThreatAlthough it’s difficult to put a precise number on the cost of cybercrime, most experts agree that illegal activities such as phishing, fraud, and denial of service attacks cause hundreds of billions of dollars’ worth of loss and damages every year. And it’s not only large, multinational corporations that must worry about being targeted. Cybercriminals are just as likely to go after private individuals as big businesses.

In fact, the profile of a typical victim might surprise you. While you probably expect cybercriminals to prey mostly on senior citizens or technology newbies who are unaware of a good Layered Security resource, published statistics suggest otherwise.

  • 79% of cybercrime victims are categorized as “high level Internet users” (those who are online more than 24 hours per week)
  • 75% of adults aged 18-31 report being victims of cybercrime
  • 72% of adult males have been the victim of cybercrime
  • 65% of adult females have been the victim of cybercrime
  • 64% of worldwide cybercrime occurs in so-called “developed markets”, which includes countries such as the U.S., Great Britain, Australia, Japan, Canada, France, Germany, Italy, and Denmark

As you can see, merely being young and technologically savvy doesn’t make you completely immune to cybercrime. You still must take precautions like installing a good antivirus program and not clicking on links in unsolicited emails.

To get started with the kind of protection you need, visit SoftwareSecuritySolutions.com, where we specialize in computer security made easy. We offer a variety of antivirus and security programs for desktops, laptops, and mobile devices so you can always find the perfect solution at a great price.

My Entire Life is in My Smartphone

Protect Your Data on Your SmartphoneIf you’re like most smartphone users, you pretty much keep your entire life in your device. While this makes daily tasks such as emailing, texting, banking, and sharing photos a lot easier, it also puts you in an extremely vulnerable position should your phone be lost, stolen, or compromised by malware. That’s why security software for mobile security is an absolute must for anyone who stores copious amounts of personal or business data on an iPhone, Android, Blackberry, or similar unit.

With a good iOS or Android security program in place, you can rest a little easier knowing you have a way to protect and recover all the sensitive information stored in your phone. For example, a product such as ESET mobile security not only guards against viruses, spam, and hacking attempts, but also gives you the ability to remote lock or remote wipe your phone should the need arise. That way even if a criminal gets ahold of your device, he won’t be able to access your data.

Although installing mobile security is a critical first step in protecting your smartphone, it’s not the only thing you can do. Here are some additional steps to consider if your device is lost or stolen:

  • Call your own phone and ask for its return. If the device was simply lost and picked up by a good Samaritan, you’ll get it back
  • Activate the tracking application to help pinpoint your smartphone’s current location.
  • If you have ESET security software for mobile security installed, engage the remote lock and reset your password.
  • File a police report and let them know about any tracking data you have.
  • Notify your carrier of the incident so they can temporarily suspend service to your account.
  • If you’re convinced the phone has been stolen and chances of recovery are slim, activate the remote wipe feature.

While a lost or stolen smartphone can wreak havoc on your life, you can limit the potential damage by proactively installing ESET Android security today. Visit SoftwareSecuritySolutions.com right now to get started.

My Computer Says Spyware Detected!

Spyware WarningOkay, so you’ve purchased and installed the latest Avira antivirus software on your computer and you’ve run your first scan. The results show that spyware has been detected on your computer. Now what do you do?

First of all, remain calm. It’s estimated that a whopping 80-90% of computers have some form of spyware on them, so chances are your problem is something the top antivirus programs already know about. That means the issue can usually be resolved by taking one or more of the following actions.

  • Try uninstalling the suspicious program through your Control Panel. This works more often than you might expect.
  • Let your Avira antivirus software dispose of the problem by quarantining or deleting the offending file.
  • Use a dedicated spyware removal tool, such as the Microsoft Malicious Software Removal Tool, to eradicate the problem.
  • If nothing else works, access your drive via a BartPe Bootable CD so you can manually delete the spyware.

Once your computer is clean, you can then focus on how to prevent future infections. The best way is to exercise caution when downloading and installing “free” programs from the Internet and to avoid opening email attachments from unknown senders. And of course using a good firewall and antivirus program from Software Security Solutions will provide you with several layers of protection against spyware and other common nuisances.

Getting a “spyware detected” message from your computer is never a pleasant experience. But fortunately, ridding your machine of the troublesome files is a relatively straightforward process that you can handle on your own with the right removal tools.

What is Antivirus Software?

Avira Premium If you’re new to computing and the internet, then you might be confused by some frequently used terms that pop up again and again in advice articles. For instance, the experts say you need antivirus software like Avira Premium to keep your computer safe as you surf the World Wide Web. But what exactly is antivirus software and what does it do? Let’s find out.

What is it?

Antivirus software is a computer program that runs on your machine to help prevent, identify, quarantine, and eradicate a wide range of viruses, worms, trojans, spyware, adware, and other malicious threats.

What does it do?

Different types of antivirus software provide different functions and levels of performance. For example, if you use free software, you’ll only get the most basic functionality, such as the ability to scan your hard drives or specific files and to remove detected problems. If you pay for Avira Premium or similar programs, the functionality and protection capabilities increase dramatically and you’ll have greater control over what you want the program to do (and when).

What doesn’t it do?

An antivirus program does not give you the same comprehensive protection as something like Avira Internet Security, which offers a firewall, safe browsing mode, anti-spam and anti-phishing features, data backup, parental controls, and more. If you need this kind of advanced performance, you have to look beyond basic antivirus software.

Now that you have a clearer idea of what antivirus software can and cannot do, you should be able to select a product that fits your protection needs. Visit SoftwareSecuritySolutions.com today to learn more about Antivirus Suites and Internet Security, and all the other affordable computer security solutions we offer.

Tips on Keeping Your Data Secure

keep data secureReading about all the different things hackers and identity thieves can do with stolen data is both scary and stressful. You naturally begin to worry about the security of your own confidential information and wonder how you would be able to recover your data and restore your good name should you become a victim.

But instead of waiting around and hoping cybercriminals don’t target your machine or mobile device, a better, more proactive approach to computer security is needed. Here are some tips on how to successfully keep your data secure.

  • Go find Avira Antivirus software at SoftwareSecuritySolutions.com right now and install it immediately. An antivirus program is a must-have these days, as it allows you to prevent, detect, and eliminate all manner of threats ranging from viruses to worms to malware.
  • For the ultimate in protection, invest in a product like ESET Endpoint Security, which combines antivirus software with a bidirectional firewall to safeguard your network from potential attacks.
  • Use different passwords for your important email, financial, and shopping accounts, and make sure they contain a mix of upper- and lowercase letters, symbols, and numbers.
  • Never use the “save password” function on your internet browser. Even if you have the most complex password in the world, anyone can easily access your accounts if this function is enabled.
  • Download and install operating system updates as soon as they become available to prevent hackers from being able to exploit known security holes in Windows and iOS.
  • Never open an email attachment from an unknown or untrusted sender.

In addition to the above, we recommend that you make regular backups of your data to an external or removable drive just in case you experience a security breach.

For more information about how to find Avira antivirus, or download ESET Endpoint Security and purchase other products designed to keep your data safer, visit SoftwareSecuritySolutions.com now.

Confessions of a Hacker

Officially HackedIf Hollywood is to be believed, computer hackers spend all of their time and energy trying to breach the security networks of government agencies, international corporations, and major financial institutions while completely ignoring the little guy. But as we’ve mentioned before, this glamorized image is a far cry from what goes on every hour of every day.

The truth is that most hackers will confess they’re perfectly content to target average individuals just like you. After all, your computer protection and network security aren’t even in the same ballpark as places like Citibank or Amazon, which leads to a higher probability of success.

Hackers also know that many folks still believe Apple’s iOS is invulnerable. These people don’t even bother using antivirus for Mac, let alone a stronger security suite, so targeting Macbooks, iPhones, and iPads has become a very lucrative option.

Other hacker confessions include the following:

  • Up to 20% of all passwords can be cracked simply by entering one of the 10 most frequently used passwords (as published annually by various computer security firms)
  • A significantly higher percentage of passwords can be cracked with the help of free password cracker/brute force attack programs that are widely available online
  • Hackers love when targets don’t delete their Internet browsing histories, cookies, or cache because this makes it easy to uncover usernames and login IDs for e-commerce and banking sites
  • A hacker’s biggest headache is a target that uses different login IDs and passwords for every site and disables his or her Internet browser from storing cookies and passwords

Now that you know a little bit about a typical hacker’s mindset, you should be in a better position to thwart future attacks. In addition to rectifying the above behaviors, make sure you install the best ESET NOD32 antivirus software, firewalls, and security suites available at SoftwareSecuritySolutions.com to help keep your data under wraps.

Cyber Security Simplified