Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
Welcome Guest!
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered. You will need to Register before you can make posts, chat or enter the forum giveaways. Be sure to also visit the Help/FAQ page.

  Emsisoft Anti-Malware Behavior Blocker test
Posted by: baziroll - 07-15-2017 , 12:29 AM - Forum: Video Reviews - No Replies


Published on Jul 11, 2017

Print this item

  Internet Download Manager (IDM) 6.28 Build 16 Released
Posted by: mrtrout - 07-14-2017 , 11:39 PM - Forum: Paid - Replies (2)

http://internetdownloadmanager.com/news.html    Internet Download Manager News

What's new in version 6.28 Build 16

(Released: Jul 14, 2017)

Improved IDM download engine
Fixed problems with video recognition for several types of web sites
Fixed critical bugs: https://www.virustotal.com/en/file/d6d03.../analysis/  SHA256: d6d03844886afec695217560340f09fc91e7b1695d3b6b762cc56af719df1e9c
File name: idman628build16.exe
Detection ratio: 0 / 63
Analysis date: 2017-07-14 18:34:08 UTC ( 2 hours, 40 minutes ago )Copyright© 1999-2017. Tonec, Inc. All rights reserved.
Product Internet Download Manager installer
Original name installer.exe
Internal name installer
File version 6, 28, 16, 1
Description Internet Download Manager installer
Comments Please visit http://www.internetdownloadmanager.com
Signature verification  Signed file, verified signature
Signing date 5:20 PM 7/14/2017
Signers
[+] Tonec Inc.
[+] VeriSign Class 3 Code Signing 2010 CA
[+] VeriSign
Counter signers
[+] Symantec Time Stamping Services Signer - G4
[+] Symantec Time Stamping Services CA - G2
[+] Thawte Timestamping CA  VirusTotal metadata
First submission 2017-07-14 17:27:28 UTC ( 3 hours, 47 minutes ago )
Last submission 2017-07-14 18:34:08 UTC ( 2 hours, 40 minutes ago )
File names installer
idman628build16.exe
idman628build16.exe
installer.exe

Print this item

  360 total security essential 8.8.0.1042 Released
Posted by: mrtrout - 07-14-2017 , 11:33 PM - Forum: Freeware - No Replies

http://www.360totalsecurity.com/en/featu...essential/  Discover the Essence of Security
Free Protection for PC

Free Download
Download full package (Virus database included)
For Windows 10/8.1/8/7/Vista/XP

Version : 8.8.0.1042 What's New    What's new in the latest version ?
 8.8.0.1042 Jul 14, 2017
Added: Internet Protection for WebExtensions in FireFox
Fixed: Bug fixes: https://www.virustotal.com/en/file/ea270.../analysis/  SHA256: ea2704fb2031ad26a2e1cedcd49f9417a62bb76f67aebb09cdc28139398b471e
File name: installer.exe
Detection ratio: 0 / 63
Analysis date: 2017-07-14 06:36:20 UTC ( 14 hours, 37 minutes ago )  Copyright©Qihu 360 Software Co., Ltd. All rights reserved.
Product 360 Total Security (Essential)
Original name Installer.exe
Internal name Installer
File version 8,8,0,1042
Description Installer Module
Signature verification  Signed file, verified signature
Signing date 4:52 AM 7/14/2017
Signers
[+] QIHU 360 SOFTWARE CO. LIMITED
[+] VeriSign Class 3 Code Signing 2010 CA
[+] VeriSign
Counter signers
[+] GlobalSign TSA for MS Authenticode - G2
[+] GlobalSign Timestamping CA - G2
[+] GlobalSign VirusTotal metadata
First submission 2017-07-14 06:36:20 UTC ( 14 hours, 37 minutes ago )
Last submission 2017-07-14 06:36:20 UTC ( 14 hours, 37 minutes ago )
File names EA2704FB2031AD26A2E1CEDCD49F9417A62BB76F67AEBB09CDC28139398B471E.exe
Installer
Installer.exe
installer.exe

Print this item

  Black Bird Image Optimizer PRO
Posted by: tarekma7 - 07-14-2017 , 09:45 PM - Forum: External Giveaways/Freebies - Replies (2)

[Image: BoxMedium.png?6000]

Optimize pictures without quality lossless.


With Black Bird Image Optimizer PRO you can reduce the size of your photos several times without quality loss! We use a completely new color quantization algorithms which are capable of lossless quality reduce the size of photos! Also, Black Bird Image Optimizer remove doesn’t need to your metadata from images.

And many more features…

Color quantization reduces the number of colors in an image while maintaining its overall visual construction. Depending on the file type, this can dramatically reduce the file size of the image. Black Bird Image Optimizer does trials to find the best colortype for a PNG file. At the beginning of this process, it should transform the RGB area that let it to choose the optimal colortype with more precision.

Terms and Conditions:

  • This is a 1-computer lifetime license, for noncommercial use
  • No free updates; if you update the program, it may become unregistered
  • You get free tech support
  • You must redeem the license key before this offer has ended

Technical Details:
  • Developed by Black Bird Cleaner
  • Version is v1.0.1.6
  • Download size is 1.58 MB
  • Supports Windows XP, Vista, 7, 8/8.1, and 10 (32-bit and 64-bit)

https://sharewareonsale.com/s/free-black...0-discount

Print this item

  AlphaBay Shut Down After Police Raid; Alleged Founder Commits Suicide in Jail
Posted by: LowcyGier - 07-14-2017 , 07:29 PM - Forum: Security News - No Replies

[Image: alexandre-cazes-alphabay-darkweb-marketplace.png]

AlphaBay Market — one of the largest Dark Web marketplaces for drugs, guns, and other illegal goods — that mysteriously went dark earlier this month without any explanation from its admins has reportedly been shut down by the international authorities.

On July 4th, the dark web marketplace suddenly went down without any explanation from its admins, which left its customers who have paid large sums in panic.

Some customers even suspected that the site's admins had pulled an exit scam to steal user funds.

Full Article

Print this item

  How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)
Posted by: LowcyGier - 07-14-2017 , 07:07 PM - Forum: Security News - No Replies

[Image: smartphone-hacking-tool.png]

WikiLeaks has today published the 16th batch of its ongoing Vault 7 leak, this time instead of revealing new malware or hacking tool, the whistleblower organisation has unveiled how CIA operatives stealthy collect and forward stolen data from compromised smartphones.

Previously we have reported about several CIA hacking tools, malware and implants used by the agency to remotely infiltrate and steal data from the targeted systems or smartphones.

However, this time neither Wikileaks nor the leaked CIA manual clearly explains how the agency operatives were using this tool.

But, since we have been covering every CIA leak from the very first day, we have understood a possible scenario and have illustrated how this newly revealed tool was being used.

Full Article

Print this item

  New Ransomware Threatens to Send Your Internet History & Private Pics to All Your Fri
Posted by: LowcyGier - 07-14-2017 , 07:01 PM - Forum: Security News - No Replies

[Image: android-ransomware.png]

After WannaCry and Petya ransomware outbreaks, a scary (but rather creative) new strain of ransomware is spreading via bogus apps on the Google Play Store, this time targeting Android mobile users.

Dubbed LeakerLocker, the Android ransomware does not encrypt files on victim's device, unlike traditional ransomware, rather it secretly collects personal images, messages and browsing history and threatens to share it to their contacts if they don't pay $50 (£38).

Researchers at security firm McAfee spotted the LeakerLocker ransomware in at least two apps — Booster & Cleaner Pro and Wallpapers Blur HD — in the Google Play Store, both of which have thousands of downloads.

To evade detection of malicious functionality, the apps initially don’t contain any malicious payload and typical function like legitimate apps.

Full Article

Print this item

  Researcher Claims Samsung's Tizen OS is Poorly Programmed; Contains 27,000 Bugs!
Posted by: LowcyGier - 07-14-2017 , 06:55 PM - Forum: Security News - No Replies

[Image: samsung-tizen-operating-system-security-hacking.png]

A researcher has claimed that Samsung's Tizen operating system that runs on millions of Samsung products is so poorly programmed that it could contain nearly 27,000 programming errors, which could also lead to thousands of vulnerabilities.

Tizen is a Linux-based open-source operating system backed by Intel and Samsung Electronics, which has been in development since early 2012 and designed for smartphones, tablets, smart TVs, smart watches, cameras and PCs.


According to Andrey Karpov — founder of Russia-based company Program Verification Systems that made PVS-Studio, a static code analyzer tool that helps programmers to find and fix bugs in their source codes — his team has discovered hundreds of errors in Tizen project using PVS-Studio.

Samsung's Tizen operating system, written in C/C++ programming language, currently has 72.5 million lines of source code, out of which Karpov's team has analysed some randomly chosen modules i.e. 3.3% of the entire Project and found nearly 900 errors.

Full Article

Print this item

  Bitdefender Total Security 2018 Giveaway.
Posted by: scot - 07-14-2017 , 06:12 PM - Forum: External Giveaways/Contests - Replies (3)

Bitdefender Total Security 2018 Giveaway.

Number of licenses for this giveaway: 5
Giveaway starts on: 13.07.2017.
Giveaway ends on: 13.08.2017.

Giveaway Page: https://malwaretips.com/threads/bitdefen...018.73477/

Print this item

  ADGUARD 3 Day Unlimited Giveaway.
Posted by: scot - 07-14-2017 , 06:06 PM - Forum: External Giveaways/Contests - Replies (4)

ADGUARD 3 Day Unlimited Giveaway

You can win a license for: 1 year Adguard license for 1 PC/Mac + 1 Android Device
Number of licenses for this giveaway: 3 Day Unlimited
Giveaway starts on: Late July 16,2017
Giveaway ends on: July 19,2017


Giveaway page :  https://malwaretips.com/threads/adguard-...way.73538/

Print this item

  Android users beware! LeakerLocker ransomware threatens to share your images, message
Posted by: LowcyGier - 07-14-2017 , 05:57 PM - Forum: Security News - No Replies

  • The software is being spread through bogus apps on the Google Play store
  • Booster & Cleaner Pro and Wallpapers Blur HD were both found to be infected
  • The malware claims to have backed up sensitive information to the cloud
  • It threatens to forward this data to a user's contacts unless a ransom is paid
  • Security firm McAfee doubts these claims and advises against paying out
Android users are being warned to be on the lookout for a new type of ransomware that threatens to leak their private data to anyone in their contact book.

Dubbed LeakerLocker, the malicious software is being spread through bogus apps on the Google Play store.

Once installed, the malware claims to have made a backup of personal images, messages, browsing history and other sensitive information.

It then threatens to forward these details to all of the user's family, friends and colleagues stored on the device, unless a ransom of $50 (£38) is paid.

Full Article

Print this item

  FREE 1 YEAR VPN ACCOUNT GIVEAWAY
Posted by: noma.jo21 - 07-14-2017 , 05:17 PM - Forum: External Giveaways/Contests - No Replies

[Image: TLVRIiD.png]

http://www.husham.com/giveaway-bear-dish-network/

Print this item

  Amazing VPN giveaway – Win VPN for 1 year
Posted by: noma.jo21 - 07-14-2017 , 05:14 PM - Forum: External Giveaways/Contests - Replies (2)

How to participate in Amazing VPN giveaway?
It is very simple.
1. “Like” our Giveaway picture.
2. “Tag” your friend to get the second Ninja Power VPN package for him too.
3.  And await for end of giveaway – we will choose randomly 3 set of names.


Our giveaway will held till end of July 31.

[Image: pTVY6a1.png]

https://www.hideipvpn.com/giveaways/amaz...pn-1-year/

Print this item

  10 VPN + Smart DNS packages for free for 3 months
Posted by: noma.jo21 - 07-14-2017 , 05:09 PM - Forum: External Giveaways/Contests - Replies (1)

https://www.facebook.com/cactusvpn/photo...6173165081

Print this item

  Spyware used on investigators probing missing students in Mexico
Posted by: LowcyGier - 07-14-2017 , 05:04 PM - Forum: Security News - No Replies

[Image: ?w=620&h=413&crop=1&hash=50ACB9E0B9EF531...F7581222CD]

Relatives hold posters with images of some of the 43 missing students of Ayotzinapa College Raul Isidro Burgos as they take part in a march to mark National Teachers' Day in Mexico City.

An international investigation into the disappearance of 43 students in Mexico was targeted with spying software sold to governments to fight criminals and terrorists, according to a report published on Monday.

The spying attempt was the latest example of civilians who have been targeted by the software known as Pegasus, which Israeli company NSO Group only sells to governments, according to the report by Citizen Lab, a group of researchers based at the University of Toronto's Munk School of Global Affairs.

Mexican President Enrique Pena Nieto has asked the attorney general's office to investigate previous charges that the government spied on private citizens, saying he wanted to get to the bottom of the accusations that he called "false."

Citizen Lab said it had found a trace of the Pegasus software in a phone belonging to a group of experts backed by the Inter-American Commission on Human Rights (IACHR) who had travelled to Mexico to investigate the disappearance of the 43 students.

The attempt to infect the phone occurred in early March 2016, following criticism by the IACHR-backed group that the Mexican government had interfered with its investigation, Citizen Lab said.

Full Article

Print this item

  Foreign hackers probe European critical infrastructure networks: sources
Posted by: LowcyGier - 07-14-2017 , 05:00 PM - Forum: Security News - No Replies

[Image: ?w=620&h=413&crop=1&hash=45DCF35728ABE48...EC2BAD39D2]

One former senior British security official said it was an "article of faith" that Russian government hackers were seeking to penetrate UK critical infrastructure though the official said he could not cite public case studies.

Cyberattackers are regularly trying to attack data networks connected to critical national infrastructure systems around Europe, according to current and former European government sources with knowledge of the issue.

The sources acknowledged that European infrastructure data networks face regular attacks similar to those which the Washington Post newspaper said on Sunday had been launched by Russian government hackers against business systems of US nuclear power and other companies involved in energy production.

One former senior British security official said it was an "article of faith" that Russian government hackers were seeking to penetrate UK critical infrastructure though the official said he could not cite public case studies.

A European security source acknowledged that UK authorities were aware of the latest reports about infrastructure hacking attempts and that British authorities were in regular contact with other governments over the attacks.

UK authorities declined to comment on the extent of any such attempted or successful attacks in Britain or elsewhere in Europe or to discuss what possible security measures governments and infrastructure operators might be taking.

The Washington Post said recent attempted Russian hacking attacks on infrastructure related systems in the United States appeared to be an effort to "assess" such networks.

Full Article

Print this item

  Apple sets up China datacentre to meet new cybersecurity rules
Posted by: LowcyGier - 07-14-2017 , 04:56 PM - Forum: Security News - No Replies

[Image: ?w=620&h=413&crop=1&hash=7443FF35C773150...987DF6A5BA]

Apple said it was setting up the facility in the southern province of Guizhou with data management firm Guizhou-Cloud Big Data Industry Co Ltd.

Apple Inc said it is setting up its first datacentre in China, in partnership with a local internet services company, to comply with tougher cybersecurity laws introduced last month.

The US technology company said it will build the centre in the southern province of Guizhou with data management firm Guizhou-Cloud Big Data Industry Co Ltd (GCBD).

An Apple spokesman in Shanghai told Reuters the centre is part of a planned US$1bil (RM4.29bil) investment into the province.

"The addition of this datacentre will allow us to improve the speed and reliability of our products and services while also complying with newly passed regulations," Apple said in a statement to Reuters.

"These regulations require cloud services be operated by Chinese companies so we're partnering with GCBD to offer iCloud," it said, referring to its online data storage service.

Apple is the first foreign firm to announce amendments to its data storage for China following the implementation of a new cybersecurity law on June 1 that requires foreign firms to store data within the country.

Overseas business groups said the law's strict data surveillance and storage requirements are overly vague, burdening the firms with excessive compliance risks and threatening proprietary data.

Full Article

Print this item

  Australia to compel technology firms to provide access to encrypted missives
Posted by: LowcyGier - 07-14-2017 , 04:53 PM - Forum: Security News - No Replies

[Image: ?w=620&h=413&crop=1&hash=A5AA96418F8870A...6E7C61F434]

Australia, a staunch US ally, is on heightened alert for attacks by home-grown radicals since 2014.

Australia on Friday proposed new laws to compel companies such as US social media giant Facebook and device manufacturer Apple to provide security agencies access to encrypted messages.

The measures will be the first in an expected wave of global legislation as pressure mounts on technology companies to provide such access after several terror suspects used encrypted applications ahead of attacks.

Australia, a staunch US ally, is on heightened alert for attacks by home-grown radicals since 2014 and authorities have said they have thwarted several plots, although Prime Minister Malcolm Turnbull said law enforcement needed more help.

"We need to ensure the Internet is not used as a dark place for bad people to hide their criminal activities from the law," Turnbull told reporters in Sydney.

"The reality is, however, that these encrypted messaging applications and voice applications are being used obviously by all of us, but they're also being used by people who seek to do us harm."

Australia's proposal will require device manufacturers and technology companies to help its law enforcement agencies intercept and read messages sent by suspects.

The proposal, to be introduced when parliament resumes in August, could be adopted within months, lawmakers have said.

Full Article

Print this item

  German military aviation command launches cyber threat initiative
Posted by: LowcyGier - 07-14-2017 , 04:44 PM - Forum: Security News - No Replies

[Image: ?w=620&h=413&crop=1&hash=096EE8C4A541CE6...7D95EAF573]

A 2015 file photo showing an Airbus A400M military aircraft taking off from the Bundeswehr airbase in northern Germany. Concerns about cyber attacks on aircraft and in the broader aviation sector have grown sharply in recent years.

The German military's aviation safety chief has launched a new initiative against cyber threats, citing research that he said shows hackers can commandeer military airplanes with the help of equipment that costs about €€€€€5,000 (RM24,551).

A defence ministry spokesman told Reuters that development of new "aviation cyber expertise" would cover everything from raising consciousness about cyber threats to technical research projects and equipping aircraft with protective systems.

State Secretary Katrin Suder had backed the idea, which Major General Ansgar Rieks, head of the German Military Aviation Authority, proposed in a letter in June, the spokesman said.

Rieks said last week that he was unnerved by a demonstration by the government-funded German Aerospace Center (DLR) in Bavaria showing hackers could take control of an aircraft with inexpensive equipment.

"That frightens me. I wrote to the state secretary about it and said doing nothing would amount to gross negligence," he said at a talk at a conference in Bueckeburg, Germany. He said the issue was also a vital concern for civil aviation.

He said military officials needed to focus not just on potential problems with computer software, but should also work to "ensure that airplanes cannot be taken over from the ground, or possibly by a passenger in the air".

Full Article

Print this item

  100+ NEW iOS 11 Beta 3 Features & Changes!
Posted by: baziroll - 07-14-2017 , 12:50 PM - Forum: Phones & Tablets News - No Replies


Published on Jul 10, 2017
iOS 11 Beta 3 Released, Over 100 NEW Features & Changes! Huge Update With Lots of Awesome Features Added. Full Breakdown.

Install iOS 11 Here: https://youtu.be/84bJH5FY2cs
Top 11 iOS 11 Features: https://youtu.be/ylzJ5bmNc8M

Print this item