Welcome, Guest
You have to register before you can post on our site.



  Private Internet Access goes Open Source
Posted by: mrtrout - 26 minutes ago - Forum: Security News - No Replies

You are not allowed to view links. Register or Login to view.      Posted on Mar 15, 2018 by Christel Dahlskjaer
Private Internet Access goes Open Source     Today marks the start of an exciting shift over here at Private Internet Access. As long-time supporters of the Free and Open Source Software community, we have started the process of open sourcing our software, and over the next six months we will be releasing the source code for all our client-side applications, as well as libraries and extensions.

We are extremely grateful to the Free and Open Source Software community for creating the foundations of the Internet as we know it. And while we may be late to the party, we are looking forward to furthering our work with a movement that aligns with our own passions, on both a personal and professional level.

We believe that the shift to open source is the right move for a privacy-focused business, and recognise that code transparency is key. We appreciate that our code may not be perfect, and we hope that the wider FOSS community will get involved, provide feedback, feature requests, bug fixes and generally help provide a greater service to the wider privacy movement.

Today, we are opening up the first of many repositories, the chrome extension, that allows users to access our network of proxies from their web browser. The chrome extension also boasts additional privacy and security features such as disabling the microphone and camera, blocking flash and ip discovery through WebRTC, and can also automatically block ads and tracking through PIA MACETM. Please note that the extension will protect traffic from the browser only and will NOT offer any protection when using other applications.

“Let’s continue to fight the good fight. Freedom is an earned right, and we must continue to re-earn it everyday. As the world continues to fight, Private Internet Access will be there. In crypto we trust.” — Andrew Lee, Private Internet Access Founder, and long-term FOSS contributor.

Head over to GitHub, check out the repo and get involved! You can find us in #privateinternetaccess on chat.freenode.net if you have questions, comments or simply want to find out more about what we are up to.

Our longer term goal is to release all our code into the open, and we hope that you will join us on our journey. We have some exciting things planned, and would love to hear from you if you want to get involved … and don’t forget to keep an eye on our blog and/or social media as we will be throwing some exciting launch events further down the line.

It should come as no surprise that we think that open source is awesome, and as long-term consumers of open source we are really happy to now be in a position where we can contribute back.

If you have any questions or comments, please do drop us a line to opensource@privateinternetaccess.com, we look forward to speaking with you and hope that our transparency will ensure that you have some peace of mind.

Chrome is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. The Chromium logo has been used in accordance with CC By 2.5 .

About Christel Dahlskjaer
Christel is the Director of Sponsorships, Events and Community Outreach at Private Internet Access. She is a privacy and digital rights advocate, a firm believer in software freedom and a bit of an all-round activist. She enjoys real ale, decent scotch and good conversation. She does not enjoy internet shutdowns and believes we must #KeepItOn.

Print this item

  How to protect a small business from hackers
Posted by: tarekma7 - 5 hours ago - Forum: Guides, Tips & Tricks - No Replies

[Image: avg_protecting_small_business_from_hacke...68x418.png]

Quote:A step-by-step guide detailing the areas small businesses need to address to protect themselves against cyber threats. “Is your business protected? How can you make sure you’re protecting your business

A step-by-step guide detailing the areas small businesses need to address to protect themselves against cyber threats.

“Is your business protected? How can you make sure you’re protecting your business against cyber threats?”

You hear about hacks on the news. Maybe you know someone whose business has been hacked, contracted viruses, lost data or even been the victim of a ransomware attack. Or maybe it’s happened to your business? If it hasn’t, you’re one of the lucky 48 percent, because 52% of small businesses experienced cybersecurity breaches in the 12 months before September 2017.

Maybe there’s one going on right now? This question may seem sensationalist , but on average it takes a business 120 days to discover a data breach.

Protective steps
So, is your business protected? Is it enough? Do you know what you need? And how can you make sure you’re protecting your business against cyber threats?

FACT: Only 39% of small businesses have formal policies covering cybersecurity.

Read the full article You are not allowed to view links. Register or Login to view.

Print this item

  Zenis Ransomware Encrypts Your Data & Deletes Your Backups
Posted by: tarekma7 - 5 hours ago - Forum: Security News - No Replies

Quote:A new ransomware was discovered this week by MalwareHunterTeam called Zenis Ransomware. While it is currently unknown how Zenis is being distributed, multiple victims have already become infected with this ransomware. What is most disturbing about Zenis is that it not encrypts your files, but also purposely deletes your backups.

When MalwareHunterTeam found the first sample, it was utilizing a custom encryption method when encrypting files. The latest version, and the one we will discuss in this article, utilizes AES encryption to encrypt the files.

At this time there is no way to decrypt Zenis encrypted files, but Michael Gillespie is analyzing the ransomware for weaknesses. Therefore, if you are infected with Zenis, do not pay the ransom. Instead you can receive help or discuss this ransomware in our dedicated Zenis Ransomware help & support topic.

Below is a brief decryption of how the Zenis ransomware encrypts a computer compiled from analysis by MalwareHunterTeam, Michael, and myself.

How Zenis Ransomware encrypts a computer
As previously stated, we do not know how the Zenis Ransomware is currently being distributed. Based on the elusiveness of the ransomware samples and comments from infected people, it could be distributed via hacked Remote Desktop services.

When executed, the current Zenis Ransomware variant will perform two checks to see if it should begin encrypting the comptuer. The first check is to see if the file that executed is named iis_agent32.exe, with this check being case insensitive. The other check is to see if a registry value exists called HKEY_CURRENT_USER\SOFTWARE\ZenisService "Active".

If the registry value exists or the file is not named iis_agent32.exe, it will terminate the process and not encrypt the computer.

Read the full article You are not allowed to view links. Register or Login to view.

Print this item

  Popular text editors hack with elevated Privilage
Posted by: tarekma7 - 6 hours ago - Forum: Security News - No Replies

Quote:Following recent string of attacks that exploit flawed plugins, researchers at SafeBreach examined 6 popular extensible text editors for unix systems.
Most of the modern text editors allow users to extend their functionalities by using third-party plugins, in this way they are enlarging their attack surface.

Third-party plugins could be affected by vulnerabilities that could be exploited by hackers to target our systems.

The situation is particularly severe in case the flaw affects a plugin for popular software such as WordPress or Windows’ extensions for Chrome, Firefox or Photoshop.

Dor Azouri, a researcher at SafeBreach, has analyzed several popular extensible text editors for both Unix and Linux systems discovered that except for pico/nano all of them are affected by a critical privilege escalation flaw.

Full article You are not allowed to view links. Register or Login to view.

Print this item

  FakeBank Android malware
Posted by: tarekma7 - 6 hours ago - Forum: Security News - No Replies

Quote:A new variant of the FakeBank Android malware includes the ability to intercept phone calls victims are making to their banks, and redirecting users to scammers.

FakeBank is a banking trojan that operates by showing fake login screens on top of a legitimate banking app. Historically, this malware has been one of the most creative Android threats on the market.

In the past, the malware whitelisted its process to remain active while the user's phone went into sleep mode; and also used TeamViewer to grant attackers full access to an infected device.

FakeBank can intercept phone calls
Such tactics were both innovative at the time, but this new FakeBank version is something unique on its own. Security experts say the malware still acts like a regular banking trojan, but with a twist.

Whenever the user attempts to call his bank's number, FakeBank intercepts the call and switches the dialed number to one preconfigured in its configuration file, leading users to scammers that collect their banking information.

Similarly, FakeBank operators can call victims from a special number —also included in the malware's configuration file— that the malware will display on the user's phone as coming from his bank. This allows crooks to carry out scams without the victim suspecting any wrongdoing.

Read the full article :

You are not allowed to view links. Register or Login to view.

Print this item

  Upgrade to VPN Unlimited: Infinity Plan
Posted by: tarekma7 - 6 hours ago - Forum: Hot Deals & Discounts - No Replies

You are not allowed to view links. Register or Login to view.

Price:   14.99$

Print this item

  Smart DNS Proxy 70% OFF
Posted by: tarekma7 - 7 hours ago - Forum: Hot Deals & Discounts - No Replies

You are not allowed to view links. Register or Login to view.

Print this item

  The Humble Software Bundle: MAGIX Sounds of Music
Posted by: AAU - Yesterday, 01:00 PM - Forum: Hot Deals & Discounts - No Replies

Quote:These beats are alive with the sounds of MAGIX. Professional audio production is within your grasp with our new software bundle! Get SOUND FORGE Pro 11, ACID Pro 7, Samplitude Pro X2 Silver, plus goodies like Soundpool: Deeper Shades of House and MAGIX Video Sound Cleaning Lab.

Pay what you want. Normally, the total cost for the software in this bundle is as much as $1,117. Here at Humble Bundle, you choose the price and increase your contribution to upgrade your bundle! This bundle has a minimum $1 purchase.

You are not allowed to view links. Register or Login to view.

Print this item

  Square Ninja
Posted by: ahmed - Yesterday, 09:23 AM - Forum: Game Giveaway of the Day - No Replies

[Image: ub0XiD1.jpg]

Join the journey and help our hero save the day!

Exclusive offer from Giveaway of the Day and MyPlayCity! No third-party advertising and browser add-ons!

Join the journey and help our hero save the day in the game Square Ninja! Enjoy the breathtaking 2D platformer game with parkour elements. Inspired by old school platformers and some new indie games, it tells the story of a Ninja, who will face lots of obstacles and overcome them. Enemies and traps are waiting for you! Solve brain-training puzzles in the portals and get smarter with the dynamic Square Ninja!

[Image: b2Q5Ogc.jpg]

Giveaway Page:
You are not allowed to view links. Register or Login to view.#

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10; Processor 800 Mhz or better; 512 Mb RAM; DirectX 8.1

Print this item

  Romanian Court Says Man Is Dead Even Though He Appeared in Court To Argue Otherwise
Posted by: mrtrout - Yesterday, 12:26 AM - Forum: Off Topic Chat - Replies (1)

You are not allowed to view links. Register or Login to view.       Romanian Court Says Man Is Dead Even Though He Appeared in Court To Argue Otherwise
16 March 2018    When Constantin Reliu appeared in a Romanian court this week, he thought it would be simple to clear up a mistaken death certificate that his wife obtained after he spent the last decade in Turkey, but that was not the case according to The Guardian.

Reliu asked the court in the town of Barlad to overturn the death certificate since he was simply out of contact with his family for those years but the court told him that he was too late to reverse it and he would have to remain officially deceased.

“I am officially dead, although I’m alive,” Reliu told local media outlets about his Kafka-esque courtroom experience. “I have no income and because I am listed dead, I can’t do anything.”

Reliu may have never known that he was declared dead in his home country if he wasn't apprehended by Turkish authorities earlier this year and then deported back to Bucharest due to expired documents.

Reliu was planning to renew his passport in Romania and then return to Turkey, but upon returning to the Southeastern European country, Reliu was detained by immigration officers who informed him that he was declared dead in 2003.

“The head of the border police in Otopeni [airport] called me to his office, turned on his computer and showed it to me: 'Look, Constantin Reliu [declared] dead by his wife,'” he told local news channel Digi24 on Wednesday.
The 63-year-old left Romania for Turkey in 1992 for a job opportunity but returned to the country in 1999, when he appeared to cut off all contact with his family.

After years of no contact from her estranged husband, Reliu's wife was able to obtain a backdated death certificate for him.

The Romanian daily newspaper Adevarul said that Reliu's wife said that after hearing nothing from her husband since 1999, she assumed he died in an earthquake that struck Turkey.

The paper said that Reliu believes she wanted to obtain the death certificate in order to annul the marriage and remarry someone else.

Print this item

  Antivirus is just snake oil and harms your security!
Posted by: tarekma7 - Yesterday, 12:09 AM - Forum: Security News - No Replies

[Image: antivirus-is-all-snake-oil-and-harms-you...y-blog.png]

Quote:Snake oil: noun; informal.
A substance with no real medicinal value sold as a remedy for all diseases. 

The term comes from the 19th-century American practice of selling cure-all elixirs in traveling medicine shows. Snake oil salesmen would falsely claim that the potions would cure any ailments. Now-a-days it refers to fake products.

We have seen the above statement in various blog posts over the years. Many writers have claimed that antivirus software causes more harm than good, and that users should stay away from it to avoid risking their computer’s security.

This article aims to provide some insider information from the antivirus industry. While there is indeed a grain of truth in what gets thrown around against us antivirus software makers, there’s also some key information that is missing from these well-meaning security articles.

It’s the missing bits that often define the conclusions. I encourage you to learn more about the situation and then decide for yourself whether antivirus software is snake oil or an essential part of every computer system.

Full article here:

You are not allowed to view links. Register or Login to view.

Print this item

  Sophisticated malware attacks through routers
Posted by: tarekma7 - 03-16-2018 , 08:57 PM - Forum: Security News - No Replies

Quote:Security researchers at Kaspersky Lab have discovered what's likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves. One, Canhadr, runs low-level kernel code that effectively gives the intruder free rein, including deep access to storage and memory; the other, GollumApp, focuses on the user level and includes code to coordinate efforts, manage the file system and keep the malware alive.

Kaspersky describes these two elements as "masterpieces," and for good reason. For one, it's no mean feat to run hostile kernel code without crashes. Slingshot also stores its malware files in an encrypted virtual file system, encrypts every text string in its modules, calls services directly (to avoid tripping security software checks) and even shuts components down when forensic tools are active. If there's a common method of detecting malware or identifying its behavior, Slingshot likely has a defense against it. It's no wonder that the code has been active since at least 2012 -- no one knew it was there.

The malware can effectively steal whatever it wants, including keyboard strokes, network traffic, passwords and screenshots. It's not certain how Slingshot gets into a system besides taking advantage of the router management software, but Kaspersky pointed to "several" instances

The combination of this sophistication with the spying focus led Kaspersky to believe that it's likely the creation of a state agency -- it rivals the Regin malware GCHQ used to spy on Belgian carrier Belgacom. And while text clues hint that English speakers might be responsible, the culprit isn't clear. Just shy of 100 individuals, government outfits and institutions fell prey to Slingshot in countries including Afghanistan, Iraq, Jordan, Kenya, Libya and Turkey. It could be one of the Five Eyes countries (Australia, Canada, New Zealand, the UK and the US) keeping watch on nations with significant terrorism issues, but that's far from certain.

Slingshot should be fixed as of recent MikroTik router firmware updates. The concern, as you might guess, is that other router makers might be affected. If they are, there's a possibility that Slingshot has a far wider reach and is still taking sensitive data.

You are not allowed to view links. Register or Login to view.

Print this item

  How to Allow Windows 10 to Create System Restore Points More Frequently
Posted by: tarekma7 - 03-16-2018 , 08:31 PM - Forum: Guides, Tips & Tricks - No Replies

Quote:In Windows 10, it’s better to be safe than sorry, and this is exactly why you need to create system restore points as frequently as possible.

The latest Patch Tuesday rollout is living proof that it takes just a single update to completely ruin the Windows experience, as the number of botched updates this month increased substantially. Failed installs, ghost network adapters, and broken document support are all the results of botched updates shipped this month to Windows systems.

Creating backups isn’t rocket science, especially because Windows 10 itself comes with such functionality integrated. By default, Windows can automatically create system restore points, which allow you to return to a previous configuration easily.

Restore points can be automatically generated whenever you install a new app or update or make system modifications, but only if a pre-defined time setting has expired. In other words, a restore point can be automatically created only if no other restore point has already been created within the configured time.

By default, Windows uses 24 hours for automatic system restore point generation, so installed apps and updates can’t create a new restore point unless more than 24 hours have passed since the previous backup.

This is a restriction that gives you more control over your backups because you can always go back one day, but at the same time, also prevents restore point from eating up all your storage.

[Image: z7gzNNL.jpg]

While there are no dedicated options to configure the system restore point creation frequency, you can actually adjust this time from the registry settings. This means you can create automatic restore points as often as you want by changing the default settings.

To do this, the first thing you should take care of is creating a manual backup because the method involves changing Windows Registry settings, and doing this could affect system stability and performance in case something goes wrong. Manual restore points aren’t affected by the time limitation mentioned above.

Launch the Windows Registry by typing regedit in the Start menu and hit Enter. An administrator account is required, so if you’re logged in with a standard account, you won’t be able to make any changes.

Once you’re in the Registry Editor, go the following path (note that you don’t have to browse each folder manually, as the Fall Creators Update comes with its own address bar and you can just paste the whole path there):

[Image: VCt6lZu.jpg]

Look for an entry called SystemRestorePointCreationFrequency and double-click it to change its value. As I said, the default time is 24 hours, but in the Registry Editor, Windows uses minutes as units. This means the default configuration should be 1440, and you can change it to pretty much any time you want.

Also, if you don’t want such a restriction to exist on your system, you can configure the SystemRestorePointCreationFrequency to value 0, which means that restore points would be automatically created whenever it’s required.

BONUS TIP: If the path mentioned above does not exist, it means System Restore is not enabled on your computer. You first need to enable System Restore to be able to change the settings. Also, if the SystemRestorePointCreationFrequency is missing from the path mentioned above, you can manually create it.

To do this, right-click the right-side of the Registry Editor and go to New > DWORD (32-bit) Value and name the new entry SystemRestorePointCreationFrequency. Double-click it to change the value by typing down the number of minutes and you’re good to go.

Although the changes should be made once you close the Registry Editor, you’re recommended to reboot your system because System Restore might already be running when you adjust the default time. Log in again with your administrator account and the new configured time should already be in effect.

You are not allowed to view links. Register or Login to view.

Print this item

  Geographical Region With the Most Ransomware Encounters in 2017 Was Asia
Posted by: tarekma7 - 03-16-2018 , 08:26 PM - Forum: Security News - No Replies

[Image: vn9UGlT.png]

Quote:In the land of IT security, there is no better source for malware statistics than Microsoft, the company that has an antivirus engine running on almost all recent Windows operating systems.

Every six months, Microsoft releases the Security Intelligence Report (SIR), a comprehensive dossier full of juicy insights regarding malware and cybercrime operations.

Released today, the Microsoft SIR 23 report contains a section dedicated to ransomware —2017's most lucrative cybercrime operation.

Asia most hit by ransomware:

According to Microsoft, based on analytics the company recorded between February and December 2017, Asia was the geographical region that recorded the greatest number of ransomware encounters last year.

Myanmar and Bangladesh were the two most hit countries, accounting for 0.48% and 0.36% of all encounter rates, while third place went to Venezuela, with 0.33%.

Locations with the lowest ransomware encounter rates included Japan, Finland, and the US, all of which had an average monthly ransomware encounter rate of 0.03%.

Android screenlocker was 2017's most active ransomware:

But even if 2017 will be remembered as the year of the three ransomware outbreaks —WannaCry, NotPetya, and Bad Rabbit— according to Microsoft, the year's most encountered ransomware family was a relatively unknown strain named LockScreen.

This isn't an encryption-based ransomware, but a mere screenlocker that displays your typical "you've been watching porn" message and asks you to send an SMS to a premium phone number to receive an unlock code for your computer's screen.

According to Microsoft, LockScreen was first seen infecting Android devices, then it slowly started infecting Windows systems.

"This can happen if, for example, Android users sync their phones or download Android applications in Windows and do side loading of the applications that are not sanctioned (for example, not sourced from the official Google Play store)," Microsoft said. "The Southeast Asia region tends to have a higher adoption rate of Android, which would explain the greater number of encounters in that region."

Besides LockScreen, the rest of the top five belonged to WannaCry, Cerber, a generic Enestedel detection, and the now-defunct Spora family.

You are not allowed to view links. Register or Login to view.

Print this item

  Per Adobe: How to Pay Less and Avoid the CC Price Increase
Posted by: tarekma7 - 03-16-2018 , 08:13 PM - Forum: Software Discussion - No Replies

[Image: switch-to-prepaid-creative-cloud-plan.png]

Quote:Which plans are affected?

The All Apps and Single-App Creative Cloud plans only (either annual or month-to-month), for Individuals and for Teams.

The prices for the CC Photography plan and the Student/Teacher Editions are NOT changing. Adobe Acrobat DC plans will also see no pricing adjustment.

Why is the price increasing?
Adobe first announced the price change last October. The company has invested and brought a lot to Creative Cloud since 2012 – including thousands of new features added to the core CC tools, plus new apps such as Adobe XD, Dimension, Character Animator, Spark with Premium Features, and an all-new Lightroom CC. It turns out that when you work out the math, a 5-6% price increase over six years is not even keeping up with overall rate of inflation since that time.

Read the full review here:

You are not allowed to view links. Register or Login to view.

Print this item

  Android Oreo is finally available for the Galaxy S8 and S8 Plus in the US
Posted by: tarekma7 - 03-16-2018 , 08:07 PM - Forum: Phones & Tablets News - Replies (1)

[Image: OViDSmF.jpg]

Quote:Android 8.0 Oreo is rolling out in a stable build to Verizon Galaxy S8 and S8 Plus units.
The update introduces the regular Oreo features, as well as Samsung Experience 9.0.
This update has been a long time coming, since the Oreo beta started in November and ended in January.

After what felt like a millennium and a half, Android Oreo is finally available for US models of the Samsung Galaxy S8 and S8 Plus. Unfortunately, Verizon appears to be the only carrier rolling it out for the time being.

The update also introduces Samsung Experience 9.0, which comes as standard on the Galaxy S9 and S9 Plus. Samsung Experience 9.0 includes a revamped keyboard, the new Color Lens option to change the color of the screen for a better reading experience, the new Finder option to search for applications and files, and more.

Meanwhile, Oreo brings Picture-in-Picture (PiP), app notification dots, background limits, Autofill, and more.

Verizon said the update arrives as build G950USQU2CRB9 for the Galaxy S8 and G955USQU2CRB9 for the Galaxy S8 Plus. The update to Oreo keeps the security patch level at February 1, a slight letdown given the March security patch’s availability.

Try not to fret if you do not get the update right away. This is likely a slower update rollout that will likely take a week or so to complete.

You are not allowed to view links. Register or Login to view.

Print this item

  Firefox 59.0.1
Posted by: tarekma7 - 03-16-2018 , 08:04 PM - Forum: Freeware - Replies (1)

[Image: 6PFAGTI.png]

Version 59.0.1, first offered to Release channel users on March 16, 2018

Release Notes:

You are not allowed to view links. Register or Login to view.


You are not allowed to view links. Register or Login to view.

Print this item

  Total Uninstall 6.22.1
Posted by: tarekma7 - 03-16-2018 , 07:16 PM - Forum: Paid - No Replies

Version 6.22.1 (2018-03-16)

  • Windows Apps module: Fix empty apps list for some users.

  • Installed programs module: New registry locations analyzed.

  • Monitored programs module: Added some new shared locations to be protected. Options needs a reset to default.

Full changelog:  

You are not allowed to view links. Register or Login to view.


You are not allowed to view links. Register or Login to view.

Print this item

  Cyberghost VPN 2.75 Euro per Month
Posted by: tarekma7 - 03-16-2018 , 02:56 PM - Forum: Hot Deals & Discounts - No Replies

You are not allowed to view links. Register or Login to view.

Print this item

  Revo Uninstaller Pro Portable 12.95$
Posted by: tarekma7 - 03-16-2018 , 02:50 PM - Forum: Hot Deals & Discounts - No Replies

You are not allowed to view links. Register or Login to view.

Print this item