Welcome. Here you find latest freeware and legal software as well as latest info about IT Technology.
Showing posts with label security. Show all posts
Showing posts with label security. Show all posts
Android Security

Keeping Internet service providers (ISPs) at bay, Google appears to be planning to add "DNS over TLS" support to Android. The new development will encrypt your domain name server (DNS) requests to massively protect your Web history and make the experience more secure and safe, without the use of any third-party virtual private network (VPN) or proxy.

Highlights of Android new 'DNS over TLS' supports:


  • The addition of "DNS over TLS" support on Android will limit the use case
  • Commits on Android Open Source Project have suggested the new development
  • Android 8.1 could be the first version to get new support

Google on Monday reported that its Chrome program for Windows was being updated, coordinating its Chrome Cleanup device to expel destructive programming. The new device does not supplant any broadly useful antivirus, and rather, utilizes a discovery motor created by IT security organization ESET for Chrome's sandbox, with the point of conveying a more secure perusing knowledge. The inherent device, which is currently taking off to Chrome for Windows, won't be accessible on Chrome for macOS or Linux.

Highlights

  • Chrome Cleanup tool was previously standalone for Windows
  • It is now integrated into the Chrome browser
  • The update is now rolling out to Windows users
HACKERS can target almost ANY smart device around the world thanks to a vulnerability in WPA2 Wi-Fi security. Here's everything you should know about this threat.

By DION DASSANAYAKE
PUBLISHED: 09:20, Tue, Oct 17, 2017 | UPDATED: 09:20, Tue, Oct 17, 2017


Apple iOS, Windows, Android and any smart device that uses Wi-Fi are all at risk of an attack, cybersecurity experts have warned today.

The newly discovered KRACK exploit affects the WPA2 security protocol, a standard for Wi-Fi security used on almost every Wi-Fi router.

In theory it allows a hacker within range of a Wi-Fi network to read passwords, credit card numbers and photos sent over the internet.  

Other sensitive information that can be obtained thanks to this exploit is chat app messages and e-mails.
The leaked code, which includes files related to Microsoft’s USB, Wi-FI drivers, storage as well as Windows 10 Mobile Adaption Kit and Creators Update builds were posted on to Beta Archive’s FTT. 

Microsoft has confirmed to The Verge that a portion of Windows 10 source code was leaked online. “Our review confirms that these files are actually a portion of the source code from the Shared Source Initiative and is used by OEMs and partners,” a Microsoft spokesperson told site in an email. 

The wcrypt (Wanna Cry/Wana Decrypt0r) ransomware  virus is very danger and able to lock your personal and important file easily.

 Protect yourself easily and free now without downloading antivirus.

Ransomware Virus
They are spreading out continuously. We are kindly to advise you to install the latest Windows Security Patches in time to prevent system infections.

What exactly is a ransomware?

It is a kind of malware (malicious software) which is able to block and encrypt the contents of personal computers, requiring a payment of about $300 for unlocking them.

The WannaCry ransomware cyber-attack has hit more than 200,000 computers in 150 countries since Friday, Europol says. Governments, hospitals, and major companies have all found themselves battling the malware, which demands money in return for unfreezing computers.



Please follow these steps to safe yourself from this virus:

Security Patches from official Microsoft website:
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

For older systems (Windows XP, Windows Server 2003 R2)
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

Also, according to the reports of antivirus companies, wcrypt penetrates computers through Server Message Block ports. It is suggested to close the ports 135, 139 and 445 through which the virus penetrates.

Step to close the ports 135. 139 and 445:

Open the console, run cmd.exe (Run as Administrator, {Right click on Window Logo, and choose CMD Run as Administrator}), then, execute the following 3 commands in turns. (after each command there should be status OK).

cmd run as admin


  1. netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=135 name="Block_TCP-135"
  2. netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=139 name="Block_TCP-139"
  3. netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=445 name="Block_TCP-445"
iSpy Camera - Worlds leading motion detection, recording and alerting software


iSpy uses your USB webcams, IP cams, capture cards, desktops and microphones to detect and record movement or sound and provides security, surveillance, monitoring and alerting services. Media is recorded directly to H264 mp4 files or AVI files. iSpy can stream live and recorded video over the local network, over the web using the ispyconnect portal and to mobile devices and
Powered by Blogger.