Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 31 August 2013

How to remove the Homeland Security Ransomware.

Posted on 06:20 by Unknown
There is a new piece of ransomware making the rounds on the internet. It is called the Homeland Security Ransomware.

Like all ransomware, this one locks up your computer and claims that you have violated some law that you have not violated. The ransomware demands money for the unlocking of your computer via a prepaid card such as a GreenDot MoneyPak card. And like most ransomware going around today, I will provide a removal guide for this ransomware.

Step 1: Get a flash drive that can store at least 32 MB

Step 2: On an uninfected computer, go to http://www.bleepingcomputer.com/download/hitmanpro/ and download the bit version corresponding to the bit type of the uninfected computer.

Step 3: Once the file has been downloaded, insert the flash drive you are going to use.

Step 4: Run the downloaded file.

Step 5: Once you see the start screen of Hitman Pro, click on the little picture of a person preforming a kick at the bottom of the window.

Step 6: You will now see instructions on how to create the Kickstarter Live USB. Click on the flash drive you will be using, then press install kickstart. You will then be presented with a warning that the flash drive will be erased. Click on yes to continue.

Step 7: Once the files have been downloaded and installed onto the flash drive, click the close button and take out the flash drive.

Step 8: Insert the flash drive into the infected computer with the computer turned off. Turn it on and then look for info on how to access the boot menu. If you cannot see any info, keys commonly used for the boot menu are F8, F11, or F12.

Step 9: Restart your computer and start tapping the indicated key. If one key does not work restart the computer and try another key on the above list.

Step 10: Now, select the flash drive with the Kickstart program installed and press enter. Once you see the new screen, press 1.

Step 11: Windows will load normally. After you log in, you will see the ransomware. Wait 15-20 seconds and you will see the Hitman Pro start screen. Click next to start the scanning process.

Step 12: Click No, I only want to perform a one-time scan to check this computer. Then click next.

Step 13: Once Hitman Pro has finished scanning, it will display a list of malware that it found. Click next, and if prompted, choose the 30 day free trial. Hitman Pro will now reboot your computer. Once it boots up, it will be free of the ransomware.
Read More
Posted in Removal Guides, Windows | No comments

Friday, 30 August 2013

How to Remove Antivirus Defence (Rogue)

Posted on 13:16 by Unknown
There's a new rogue making the rounds on the internet for the second time in one day. Not something I like very much, but it is fine by me. As long as I write the removal guide, everything will be fine.

Antivirus Defence (Note the misspelling of "defense") is a rogue antivirus program that claims your computer is infected with malware. It then demands payment for the removal of threats that are not actually on your computer.

The following is a removal guide for Antivirus Defence (sic):

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #3: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 4.

Step #4: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #5: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #6: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #7: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 8.

Step #8: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #9: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #10: Enjoy your computer which should now be free of Antivirus Defence.
Read More
Posted in Removal Guides, Windows | No comments

Thursday, 29 August 2013

How to Remove Titan Antivirus 2013 (Rogue)

Posted on 17:53 by Unknown
Alright everybody. There's a new rogue making the rounds on the internet. It's called Titan Antivirus 2013.

For those of you who don't know, rogue antivirus software is a piece of malware that claims to be an antivirus. Once it has been launched, it then preforms a scan which then claims that your computer is infected with malware. It then demands payment for the removal of the fake threats that it has "found."

The following is a self-help removal guide for this rogue.

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #3: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 4.

Step #4: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #5: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #6: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #7: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 8.

Step #8: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #9: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #10: Enjoy your computer which should now be free of Titan Antivirus 2013.
Read More
Posted in Removal Guides, Windows | No comments

Tuesday, 27 August 2013

History of Windows: Windows 3.0.

Posted on 15:58 by Unknown
Welcome to another post in our ever growing History of Windows series of posts.

Today for the last post in our "Part 1" of our three part voyage, we will be looking at Windows 3.0. So without any further ado, I give you History of Windows: Windows 3.0. Hope you enjoy it.

On May 22nd, 1990, Microsoft released a new version of Windows called Windows 3.0.

This version of Windows was received very well by the general public at large. This was mainly because of several new features added to Windows that really made it more of a competitor to Apple's Macintosh.

The most notable new feature were the icons above file names. So now you would be able to somewhat discern what something was without having to read a cryptic file name.

And another new feature which quite a few people enjoyed and still do to this day was the inclusion of games such as Minesweeper and Solitaire.

Now about Solitaire. For computer users who want to waste time do something while waiting for something, this piece of software allowed you to play a card game called Solitaire. But the main idea behind including this game in Windows 3.0 was to teach people how to use a mouse. Fast foreword 23 years, and we still have Solitaire, albeit updated. And I would wager anything that to this day, Solitaire is the most used program in the workplace.

Another reason why Windows 3.0 was well received was that with Windows 3.0, Microsoft started to move away from MS-DOS. While the DOS prompt was still in Windows, an average user really did not have to use it that much.

On April 6th, 1992, Microsoft released an update to Windows 3.0 called (what else?) Windows 3.1.

The main improvement over Windows 3.0 was that you could now browse the internet with Windows 3.1. You could use Internet Explorer up to version 5 of it.

Windows 3.1 soon branched out into a consumer product and a separate business product called Windows 3.1 for Workgroups.

On August 11th, 1993, Microsoft released Windows 3.11 for Workgroups. And while this update did not bring much in the way of new features, Retail marketplaces upgraded to Windows 3.11 for Workgroups from the older DOS 6.02.

All versions of Windows 3.0 and 3.1 had their support ended on December 31st, 2001.

Even though the operating system has been unsupported for over 10 years, we still see the imprints that Windows 3.1 left on the world and ourselves.

Windows 3.1 found a niche market as an embedded operating system after becoming obsolete in the PC world. As of November 2008, Virgin Atlantic and Qantas Airways Limited still used it for some of the onboard entertainment on long flights.

It also sees continued use as an embedded operating system in retail cash tills. And on July 14th, 2013, Linux 3.11 was officially named "Linux for Workgroups" as a nod to Windows 3.11 for Workgroups.

From over 20 years ago to today, Microsoft made a hit with Windows 3.0 and with Windows 3.1. But this was not the end of Windows. Far from it. Windows would evolve into a better product.

Windows 9x laid some of the Windows groundwork that is still in use today. And we will discuss each operating system in detail in Part 2 of our Windows voyage.
Read More
Posted in History Of, Windows | No comments

Sunday, 25 August 2013

Looking for Love.

Posted on 19:29 by Unknown
For loyal readers who have been reading my blog for some time, you know that I sometimes write silly posts just to mix things up a little.

And for those of you who have not been reading my blog for that long, take this with a big ole grain of salt.

Hello Internet.

Today I have started my online search for love. And the first thing I want to get out of the way is that I am a technosexual. So... No humans of any gender.

I recently got out of a relationship with a female computer. It was a nice relationship, nice and long. It ended when someone (me) destroyed her hard drive. I consider life to be a long walk with a pedometer. And this is how my last relationship was. Just a long walk with a device that does not even know I am in a relationship with her.

If you are already interested in me, read the following to ensure that you and I may have compatible technology.

IDE cables are a deal breaker for me. They get in the way of almost everything, and old technology really does not get my motor running.

Please note that I will only date secure devices. If you are infected with malware, I may fix you, but I will not date you.

Any potential suitors must be OK with the fact that my job involves seeing other devices on a daily basis. There should not be any room for jealousy in our relationship.

One last note: Tablets need not apply.

If you have lasted this long without your battery running out or deciding that we are not compatible, contact me via Twitter so that we can proceed with the second compatibility test.

Thank you for reading. I invite readers to comment with any comments or questions.
Read More
Posted in | No comments

Thursday, 22 August 2013

How to remove Antivirus Security Pro. (Rogue)

Posted on 14:56 by Unknown
There is a new rogue making the rounds on the internet. Its name is Antivirus Security Pro.

For those of you who do not know, a rogue antivirus program is a fake antivirus program that claims that you are infected with malware. It then demands payment for the removal of threats that it has detected.

You should not pay for this product, the detections are fake, and you do not really have those pieces of malware on your computer.

Below are the steps to remove this rogue:

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #3: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 4.

Step #4: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #5: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #6: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #7: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 8.

Step #8: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #9: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #10: Enjoy your computer which should now be free of Antivirus Security Pro.
Read More
Posted in | No comments

Wednesday, 21 August 2013

How to remove the Savepath Deals Adware

Posted on 20:55 by Unknown
There is a new piece of adware making the rounds on the internet. It is called Savepath Deals.

It is important to note that adware is not malware. However, it installs itself along with other software without the software installer telling you it is going to install the adware along with the program you wanted to install.

So even though it is not malware, you did not expressly agree to install the adware. Therefore, it is not welcome on your system.

The following is the removal process for this piece of adware.

Step #1: Download Junkware Removal Tool from here: http://www.bleepingcomputer.com/download/junkware-removal-tool/

Step #2: Once the download is complete, double click the now downloaded executable file to run the program.

Step #3: Follow the prompts that this removal tool gives you.

Step #4: Once the removal tool has finished its process, download and install Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Running Malwarebytes Anti-Malware will ensure that your computer does not have any infections or remains of the adware.

Step #5: Once Malwarebytes Anti-Malware is installed, Select Preform Full Scan and then click on the scan button. Please note that this scan will take some time. So, I suggest that you go do something else in close proximity to the computer so that you can check on the scan once every 15-30 minutes. Popular choices to use this time include enjoying a cup of tea, reading a book, or watching a television program.

Step #6: Once the scan is done, follow the prompts on your screen to see if there are any further infections present.

Step #7: If during the removal process, Malwarebytes Anti-Malware informs you that you must restart your computer, allow it to do so.

Step #8: Enjoy your computer which should now be free of the Savepath Deals adware program.
Read More
Posted in | No comments

History of Windows: Windows 2.0

Posted on 07:11 by Unknown
Before I begin this post, I would like to say something about this series of posts that I am planning.

Windows XP is the star of this whole thing. And as such, the "History of Windows: Windows XP" blog post will be published on the day that support for Windows XP ends. Which if some of you have forgotten, is on April 8th, 2014. So. I am going to be spacing this series out to accommodate that. And there are actually going to be three "parts" to the whole series.

Part 1: The beginning of Windows. This part includes Windows 1.0 to Windows 3.0.

Part 2: Windows 9x. This will include Windows 95 to Windows 2000.

Part 3: The post DOS Windows: This will include everything from Windows XP to Windows 8 (Or whatever Microsoft's newest offering is)

So, without any further ado, I give you History of Windows: Windows 2.0:

The year is 1987. Microsoft releases the succsessor to Windows 1.0: Windows 2.0.

Like with its predesessor, Windows 2.0 was not given high regard in the market. And there were quite a few features introduced with Windows 2.0.

The features included the ability to minimize and maximize windows. With this feature, you could switch between applications more easily then you could with Windows 1.0.

But one thing that Microsoft did that captured the attention of software developers was the introduction of Microsoft Office for Windows 2.0. This helped Microsoft speed up the process of becoming a player in the market, but not by very much.

One year later, Windows 2.1 was released. This version of Windows brought support for Intel processors. Under the hood, this was a very good change. But for regular computer users of the time, support for Intel processors would not change how they used computers.

Windows 2.0 was released December 9th, 1987.

Windows 2.1 was released May 27th, 1988.

The latest version of Windows 2.0/2.1 is Windows 2.11.

Support for both of these versions ended on December 31st, 2001.

So that will be it for this- Wait, we still have to talk about the lawsuit.

On March 17th, 1988, Apple Inc filed a copyright infringement lawsuit against Microsoft and HP in a attempt to prevent them from using a Graphical User Interface like those in Macintosh operating systems.

In the midst of all this, Xerox filed a lawsuit against Apple Inc, claiming that the Macintosh GUI was heavily based on Xerox's.

On September 19th, 1994, the United States Court of Appeals for the Ninth Circuit ruled in favor of Microsoft and HP. Xerox's lawsuit was dismissed for a verity of legal reasons.

So, now this is really the end of the post.

Thank you for reading. I invite readers to comment with any questions or comments.
Read More
Posted in History Of, Windows | No comments

Monday, 19 August 2013

How to remove 24x7 Help.

Posted on 17:07 by Unknown
This removal guide will focus on the removal of an applet called 24x7 Help.

24x7 Help is a small applet that displays contact info for a remote tech support company. This applet suggests that you download security software such as PCRx Registry Cleaner, which is known as a rogue registry cleaner.

This applet comes bundled with some software installations without giving you a choice as to install this applet or not unless you choose the option for a custom install. Therefore, if you are reading this, I am going to assume that you did not expressly agree to having this applet installed. As this applet is not welcome on your computer, a removal guide follows.

Step #1: Download Junkware Removal Tool from here: http://www.bleepingcomputer.com/download/junkware-removal-tool/

Step #2: Once the download is complete, double click the now downloaded executable file to run the program.

Step #3: Follow the prompts that this removal tool gives you.

Step #4: Once the removal tool has finished its process, download and install Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Running Malwarebytes Anti-Malware will ensure that your computer does not have any infections or remains of the applet.

Step #5: Once Malwarebytes Anti-Malware is installed, Select Preform Full Scan and then click on the scan button. Please note that this scan will take some time. So, I suggest that you go do something else in close proximity to the computer so that you can check on the scan once every 15-30 minutes. Popular choices to use this time include enjoying a cup of tea, reading a book, or watching a television program.

Step #6: Once the scan is done, follow the prompts on your screen to see if there are any further infections present.

Step #7: If during the removal process, Malwarebytes Anti-Malware informs you that you must restart your computer, allow it to do so.

Step #8: Enjoy your computer which should now be free of 24x7 Help.
Read More
Posted in Removal Guides, Windows | No comments

How to remove the Guardians of the Peace of Ireland Ransomware.

Posted on 14:04 by Unknown
OK, another piece of ransomware has come out of the woodworks. This one is called Guardians of the Peace of Ireland.

And like all other pieces of ransomware, this one locks up your computer claiming that you have broken the law and you must pay a fine. In this case, the fine is €100, which is payable by a prepaid card such as GreenDot MoneyPak or ukash. Follow the instructions below to remove this piece of ransomware from your computer.

Step 1: Get a flash drive that can store at least 32 MB

Step 2: On an uninfected computer, go to http://www.bleepingcomputer.com/download/hitmanpro/ and download the bit version corresponding to the bit type of the uninfected computer.

Step 3: Once the file has been downloaded, insert the flash drive you are going to use.

Step 4: Run the downloaded file.

Step 5: Once you see the start screen of Hitman Pro, click on the little picture of a person preforming a kick at the bottom of the window.

Step 6: You will now see instructions on how to create the Kickstarter Live USB. Click on the flash drive you will be using, then press install kickstart. You will then be presented with a warning that the flash drive will be erased. Click on yes to continue.

Step 7: Once the files have been downloaded and installed onto the flash drive, click the close button and take out the flash drive.

Step 8: Insert the flash drive into the infected computer with the computer turned off. Turn it on and then look for info on how to access the boot menu. If you cannot see any info, keys commonly used for the boot menu are F8, F11, or F12.

Step 9: Restart your computer and start tapping the indicated key. If one key does not work restart the computer and try another key on the above list.

Step 10: Now, select the flash drive with the Kickstart program installed and press enter. Once you see the new screen, press 1.

Step 11: Windows will load normally. After you log in, you will see the ransomware. Wait 15-20 seconds and you will see the Hitman Pro start screen. Click next to start the scanning process.

Step 12: Click No, I only want to perform a one-time scan to check this computer. Then click next.

Step 13: Once Hitman Pro has finished scanning, it will display a list of malware that it found. Click next, and if prompted, choose the 30 day free trial. Hitman Pro will now reboot your computer. Once it boots up, it will be free of the ransomware.
Read More
Posted in Removal Guides, Windows | No comments

How to remove My Safe PC 2014 (Rogue)

Posted on 05:19 by Unknown
There's a new rogue making the rounds on the internet. It is called My Safe PC 2014.

For those of you who do not know. a rogue antivirus program installs itself without you knowing that it is there until it pops up. It then scans your computer and demands payment for threats that it has detected. The threats that it claims to have detected are not really on your computer, the rogue is simply trying to scare you into purchasing it.

Removal Instructions for My Safe PC 2014 are as follows:

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: Open Internet Explorer. Click on the tools menu and then click on Internet Options.

Step #3: Click on the Connections tab, then click on LAN Settings.

Step #4: Under the proxy server section, uncheck the checkbox labeled Use a proxy server for your LAN. Then press the OK button.

Step #5: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #6: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 7.

Step #7: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #8: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #9: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #10: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 11.

Step #11: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #12: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #13: Enjoy your computer which should now be free of My Safe PC 2014
Read More
Posted in Removal Guides, Windows | No comments

Saturday, 17 August 2013

History of Windows: Windows 1.0

Posted on 15:48 by Unknown
This post marks the kickoff of a new series of posts I am planning on doing. The name is self explanatory, but I am going to explain the reason behind this.

I have wanted to do a series of posts regarding the history of Microsoft Windows for the longest time. And as I type, I recognize this idea for what it was: An idea that was waylaid by something else more important. An idea that never grew legs as a result of my actions.

Now as I see that this old idea is still in my drafts, destined to stay that way unless I do something about it, I find that it is time. So without any further ado, I present to you "History of Windows: Windows 1.0"

The year is 1981, Microsoft is working on a new user interface for MS-DOS. This interface, called "Interface Manager" kept its name until 1983 when its name was changed to Microsoft Windows. This change was announced at the same time that Windows 1.0 was unveiled to the public.

Windows 1.0 suffered a delay of two years before it was finally released to the public on September 20th, 1985. When it was released, Windows 1.0 was not seen as that interesting. Apple already had a GUI for their Macintosh, and so Windows was seen as more of a copy then anything else.

But one key feature that kept Microsoft Windows viable was the ability to multitask. This was a feature that Apple had not employed at that time, the ability to open an application, go back to the main menu, open another application, then go back to the other application without losing anything or having to reopen the application.

The latest stable release of Windows 1.0 is Windows 1.04 which was released in April of 1987.

It was succeeded by Windows 2.0 on December 9th, 1987.

Windows 1.0 reached the end of its support life on December 31st, 2001.

Thank you for reading. I invite users to comment with any questions or comments.
Read More
Posted in History Of, Windows | No comments

Wednesday, 14 August 2013

How to remove the Webcake Deals Adware.

Posted on 20:18 by Unknown
A new piece of adware is making the rounds, hiding in program installations such as those for free software. This piece of adware is called Webcake Deals, and this post will provide instructions on how to remove it.

Before we begin removal, it is important to note that adware is not technically malware. It might not serve any other purpose other then to just annoy you. But with that in mind, you did not explicitly agree to the install of this adware, making it unwelcome on your system.

Step #1: Download AdwCleaner from here: http://www.bleepingcomputer.com/download/adwcleaner/

Step #2: Once the exe file has finished downloading, double click the file.

Step #3: Click on the Clean button in AdwCleaner. This program will now search for known adware on your computer.

Step #4: Once done, Adwcleaner will state that it needs to reboot your computer. Click OK to allow it to do so.

Step #5: Once your computer has finished starting up, it will produce a log for you. The contents of this log may look like gibberish to you, and that is OK. You can close the log.

Step #6: To be on the safe side, check for any leftovers with Malwarebytes Anti-Malware. Download it here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #7: Once you have downloaded the installer, install Malwarebytes Anti-Malware.

Step #8: Once the install is complete, a menu will pop up. Choose Perform Full Scan and then click the scan button. This scan will take some time, so I suggest that you do something else while in close proximity to the computer in order to check on it every fifteen minutes.

Step #9: Once the scan is done, Malwarebytes Anti-Malware may ask you to reboot your computer. Allow it to do so.

Step #10: Enjoy your computer which should now be free of the Webcake Deals Adware.
Read More
Posted in Removal Guides, Windows | No comments

How to remove Antiviral Factory 2013 (Rogue)

Posted on 15:27 by Unknown
There is a new rogue antivirus program making the rounds on the internet. It's name is Antiviral Factory 2013. And your guess is as good as mine why someone decided to put a name like that on a rogue antivirus program.

Like most other rouges, this one pretends to scan your computer and then demands payment for the removal of "threats" that it has "detected." And like all other rogues making the rounds these days, I will provide removal instructions for it.

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #3: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 4.

Step #4: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #5: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #6: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #7: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 8.

Step #8: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #9: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #10: Enjoy your computer which should now be free of Antiviral Factory 2013.
Read More
Posted in Removal Guides, Windows | No comments

Tuesday, 13 August 2013

How to make someone think they have malware: Batch File Instructions

Posted on 08:43 by Unknown
This post will contain instructions on how to create a windows batch file that when run will likely make the victim of this prank think that they have malware on their computer. This post is intended for entertainment and amusement purposes only. It is illegal to send batch files electronically, so please do not place a batch file anywhere on the internet.

This post will be somewhat like a previous post in which I gave instructions on how to create a piece of "malware" using VBScript. All I am providing is instructions on how to make the batch file on your own computer, not the actual batch file.

Before we continue, did you read the warnings above? I mean it, read the warnings before continuing.

Got it? Good.

Step #1: Open a new notepad document. You may find notepad by Pressing the windows key and the R key at the same time.

Step #2: Copy and paste the following code into the notepad document:

@echo off
title VIRUS
color 0c

echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTACTING ANTI-VIRUS....
pause
echo DO YOU WANT TO DELETE VIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS.....
echo VIRUS ACTIVATED!!!!
pause
:1
dir/s
goto 1

Step #3: Save the document by clicking the file button at the top of the notepad window.
Then click the save as button.

Step #4: Save the document as anything you would like. Just be sure that at the end of the name, you place .bat at the end. (Example.bat) Also make sure that the new batch file is saved in a convenient location such as your desktop, or the desktop of your victim.

Step #5: Keep in mind that if you plan to use this to prank someone, it would be best to create the batch file on their computer. Lure the victim away from his or her computer for a few minutes, then preform steps 1 through 4.

Step #6: Call your victim to the "infected" computer and entice him or her to run the batch file.

Step #7: Some wise computer users will be suspicious, so you will have to convince them in some way to open the batch file.

Step #8: Have fun watching the reaction on your victim's face.

Thank You for reading. I invite readers to comment with any comments or questions. And for those of you wondering what the completed prank will look like:

Once run, the batch file will run through a non stop list of files stored on the desktop.
Read More
Posted in Windows | No comments

Monday, 12 August 2013

How to Remove PC Defender 360 (Rogue)

Posted on 18:11 by Unknown
There is a new rogue making the rounds on the internet. It is called PC Defender 360.

For those of you who do not know, a rogue antivirus program is a program that claims that your computer is infected with malware that really is not on your PC. It then demands payment for the removal of so called "threats" that it has detected.

This blog post will offer instructions on how to remove PC Defender 360.

Step #1: Reboot your computer into safe mode with networking. To do this, turn the computer off and turn it back on. Immediately after you press the power button to turn the computer back on, press the F8 key on your keyboard repeatedly until you come to a menu that gives you options such as Safe Mode. Use the arrow keys on your keyboard to select Safe Mode With Networking.

Step #2: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #3: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 4.

Step #4: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #5: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #6: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #7: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 8.

Step #8: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #9: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #10: Enjoy your computer which should now be free of PC Defender 360.
Read More
Posted in Removal Guides, Windows | No comments

Google Glass: Another device, another vector for infection.

Posted on 06:16 by Unknown
If you have been paying attention to Google at any point in the past year, you might have heard about a new device called Google Glass. This device will be an advancement in Augmented Reality. It will be a computer that is wearable, and is in the style of a pair of glasses.

While controversy is following the device, mostly based on well founded privacy concerns, there seems to be very little discussion on how hackers will treat the device. This can be bad for users because of the fact that Google Glass is just another platform running Android.

For those of you who have had a Mac and found that it is not invulnerable to malware know this already, but oversight on the security front lead to very big problems sooner or later.

Historically, Trojans have been the malware of choice when Android infection is called for. But this new device might just give hackers the drive to push further along the malware severity scale.

I forecast this because of the wealth of information the controller of the device has. If you are a hacker who has hacked into Google Glass, suddenly you can see all that the victim sees. This can include bank login information, passwords, or embarrassing video which can be used to blackmail you.

And with the sort of info provided by being the eyes of a victim, marketing opportunities are endless. This will make sure that some company will be the first to figure out how to hack into Google Glass. From here, the hacker has four options depending on who the hacker is and what company they are representing, if any.

Option #1: Use the info gathered to stalk victims. It is easy to know where a mark is going to be if you have a schedule in advance.

Option #2: For companies, use the info gathered to deliver targeted ads that are sure to entice the victim. If the victim turned customer stays long enough, that will make the ads worth it.

Option #3: Sell the info to the highest bidder. Companies will pay top dollar for the first class info a hacker gets with Google Glass. And lets not get started on bidding that comes from private citizens.

Option #4: Because a hacker generally now has everything needed, steal the identity of a mark. If you know all you can know about the mark, you can easily pose as the mark and fool most people.

Generally, all the info you need as all there. For even one person, you have the following data:

First Name, Last Name, Location, Home Address, Spending Habits, Diet (or lack thereof), Gender, Passwords, Email Addresses, Phone Numbers, Political Attitudes, General Likes and Dislikes, etc.

This is why I am forecasting major infection of Google Glass. With the tempting platform, it is not a matter of if, but when, Google Glass will first become infected. And at this point, the Glass will be shattered.

Thank You for reading. I invite readers to comment with any questions or comments.
Read More
Posted in Android | No comments

Sunday, 11 August 2013

What are Bitcoin Miners?

Posted on 07:43 by Unknown
For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners are.

For those who do not know about Bitcoin, think of it as a new currency used for what you would use currency for. The barter and allotment of goods. It's an alternative currency, not backed by any government.

Bitcoins are made through mining. That is, through running special software to solve complex mathematical problems. As there are a finite amount of Bitcoins, this can be considered as mining for gold or oil.

Bitcoin mining services use shared computer power to mine for new Bitcoins. To participate, you have to create an account and install the special software on all the computers in your control. This is where we run into malware, because a user might not be happy with the process he or she is making with the computers he or she owns. So, they start to "infect" other computer users with the software. This is done through means ranging from straight out asking a friend, to silently placing it on a computer that visits a website.

Because of this, I say that it is not a Bitcoin problem, it is a people problem. Greedy people trying to make more money do so by devious means. It's a story as old as time itself really.

Although this software is relatively harmless as far as malware goes, this sort of thing is not really welcome on your computer. Because someone else is making money off of your computing power.

Unfortunately, because this type of software is often modified to hide from the user, I cannot find a surefire way of removing this type of software from a computer, short of reinstalling the operating system. But as this way of making more money becomes more common, politics will catch up. Antivirus vendors will start to consider this type of software to be malware.

Thank You for reading. I invite readers to comment with any questions or comments.
Read More
Posted in | No comments

Thursday, 8 August 2013

Why you should not let Google Chrome store your passwords.

Posted on 06:28 by Unknown
Nowadays, most modern web browsers offer a feature that will allow you to store your passwords in the browser. While this is useful in some cases, this can spell disaster.

For example, if you loan your computer out, the passwords stored in the browser will automatically be filled in by the web browser. This gives the person you loaned it out to access to do all kinds of things. The most mundane of which is to log into your social media accounts and proclaim "your" undying love for Justin Bieber... or something of that nature.

The worst they can do is as follows:

1. Harvest those passwords and save them for later use.

2. Send out derogatory emails that you would never send.

3. Log into your bank account and get your credit card info which can then be used to purchase contraband on the internet. Or just rack up big charges witch you will have a not so easy time refuting.

Among other things...

But this type of damage can not only be done by someone who you have given the computer to. In the case of Google Chrome in particular, which according to many stat counting websites is the most popular browser, someone who has access to the computer for even a minute can steal your passwords.

How it works in this case is something that anyone can remember. And if you are using Chrome, you can try this as well.

Step #1: Go to chrome://settings/passwords

Step #2: Go to a random set of asterisks you see.

Step #3: Click the show button.

Surprised? This is the local copy of your saved passwords cache. And anyone who can remember that settings page can access it. And it is not just passwords, It's also the web address and username.

Anyone who can lure you away from your computer for a few minutes can get all the info they need to make your day go from not bad to a living hell.

The more interesting thing is that this is not a bug, it is a feature.

Now, what can we do about it?

Option #1: Don't save passwords at all, rely on your memory. Even my memory is not great, but remembering several different passwords which are likely long strings of characters should not be an issue, right?

Option #2: Put passwords on Post-Its and place them on your computer monitor. Yes, now only anyone with a pair of cheap binoculars can see them. This is much much safer, right?

Option #3: Install a password keeper that is independent of Google Chrome. This is a viable possibility as long as the password keeper encrypts your passwords until you decrypt with a master password which you have memorized. Mozilla Firefox also offers a feature similar to this if you do not want to install more software.

Thank You for reading. I hope you think of this post whenever you see that pop up from Google Chrome offering to save that password for you. If not for security's sake, do it to make snooping from the NSA a bit harder.
Read More
Posted in | No comments

Tuesday, 6 August 2013

What is Rogue Antivirus Software?

Posted on 16:48 by Unknown
It's been a while since I've done a post like this, and I have gotten quite a few new followers who likely have not read the original post about rogue antivirus software. So here it is: A full description.

Rogue antivirus software, often called rogues, are pieces of software which can install themselves onto your computer in many ways.

Way #1: You could be tricked into thinking that an advertisement for a rogue stating that your computer is infected is real. You then go to download the rogue hoping that it will remove the threats. This happens without you even knowing that it is a rogue until it is installed.

Way #2: It could install itself silently when you visit a hijacked website. From here it can lay dormant until activated by an action which is either on your part or the part of the maker of the rogue.

Way #3: The rogue can be downloaded because the file claims to be something that it is not. While this somewhat falls into the definition of Trojans, this is still classified as a rogue.

No matter the way a rogue is placed on your computer, the end result is the same. The rogue pops up and does a simulated scan of your hard drive. It then demands payment for the removal of threats threats that it has found.

A few key points to keep in mind:

1: The scan that it is doing is not real.

2: All "malware" found by the "scan" is non-existent on your computer.

3: Most real antivirus software have a free trial which will remove threats free of charge.

4: You should never pay any amount of money that the rogue demands.

Rogues are usually removed with Rkill and Malwarebytes Anti-Malware, but some rogues may require more advanced tools.

As some rogues include a Trojan component, just because you place a product key in the rogue does not mean that your computer is in the clear. This is why I do not recommend placing a product key in the rogue except in situations where it would make removal a lot less involved.

I consider rouges to be a type of malware that will be gone from the internet someday soon.

In 2006, 19 rogues were released.

In 2007: 28 rogues were released.

In 2008: 195.

2009: 156

And so on.

But this type of malware is on the decline. As of this blog post, there have only been 7 rogues released in the entire year of 2013. And I do feel that this type of malware will be gone completely within a few years.

I attribute this victory to:

Bloggers who blog about rogues. They help educate the public in a way that they can understand.

Antivirus companies, whose engines are now getting smarter at detecting this type of malware before it even gets on the computer.

Readers, who spread the news as need be. If something goes viral enough, the news can reach the news of countless people at a faster speed then the rogues can spread.

Malware Removers, one of the last lines of defense in this regard. These people are highly trained in the art of malware removal. Some charge money for their services, while others offer help free of charge.

Thank you for reading. I invite readers to comment with any questions or comments.
Read More
Posted in | No comments

Friday, 2 August 2013

How to remove Live Security Professional. (Rogue)

Posted on 18:39 by Unknown
Alright, this post will be about a rogue antivirus. This type of malware often appears on your computer claiming that your computer is infected with malware. It then demands money for the removal of the non existent malware.

Like most other rogues, this rogue blocks program execution which will defeat quite a few attempts to remove it in normal windows mode. This is why the removal guide below is necessary.

Step #1: Reboot your computer into safe mode with networking. This can be done by turning off the computer, then pressing the button to turn it on again. Immediately after you press the button to turn it on, repeatedly press the F8 key on your keyboard.

Step #2: Once you reach a menu that gives you options such as Safe Mode, use the arrow keys on your keyboard to select Safe Mode With Networking, then press enter.

Step #3: To make sure that the rogue will not interfere with removal, we must run Rkill. Download iExplore.exe here: http://www.bleepingcomputer.com/download/rkill/

Step #4: Run the downloaded executable. It will open a black box, this is normal. Once the black box has closed on its own, proceed to step 5

Step #5: Download Malwarebytes Anti-Malware from here: http://www.bleepingcomputer.com/download/malwarebytes-anti-malware/

Step #6: Run the downloaded installer and install Malwarebytes Anti-Malware.

Step #7: Once the program is installed, it will automatically open a window. Once this window is open, click Perform Full Scan, and then click the scan button.

Step #8: As this scan will take some time, I suggest you do something else while remaining in close proximity to the computer so you can check on the scan every once in a while. Once the scan is complete, proceed to step 9

Step #9: When the scan is complete, it will open a message box. Click OK, and then click show results.

Step #10: Click Remove Selected. If Malwarebytes prompts you to restart your computer, please allow it to do so.

Step #11: Enjoy your computer which should now be free of Live Security Professional.

Thank You for reading, I invite readers to comment with any questions or comments.
Read More
Posted in Removal Guides, Windows | No comments

Never leave your computer's date on February the 14th

Posted on 08:22 by Unknown
This blog post will be a glimpse into my mind. Where when there is nothing better to do, I fabricate events that have not happened... YET.

And as this was prompted by me asking Siri an interesting question to see what her reaction would be, I was not too surprised that it led me down this train of thought.

And as this already not happened to me in one of my blog posts, this is interesting. And you can find said post here: http://malwareaware.blogspot.com/2013/05/apparently-my-computer-loves-me.html

Have you ever thought about what would happen if the computer you have used for years suddenly became sentient? It could talk to you, you could talk to it, and you both would understand each other.

Then there is the dark side of a computer, or any device for that matter, actually developing... feelings for the user. Which begs the question: What would happen if such a situation happened? What will you do when it does?

Being partially techosexual myself, as I have admitted, people would think that I would have the obvious reaction. But considering on the device that falls for me, my reaction could be extreme on either end of the spectrum. Either being completely on board with the idea, or considering the idea to be extremely repellent.

This opens a whole new set of possibilities as to how the device might take me letting it down gently. Would it understand, or would it then try to destroy me?

As technology becomes better at making devices act like humans more and more, this will someday become a situation we will all have to face. And depending on the device in question, our next choice could very well be our last. But one thing is for sure, leaving February the 14th as the date on your computer means you are asking for it, and you would be glad.

Thank you for reading this little flight of fancy that I am convinced WILL happen someday. Chime in below with any comments or questions.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ▼  August (22)
      • How to remove the Homeland Security Ransomware.
      • How to Remove Antivirus Defence (Rogue)
      • How to Remove Titan Antivirus 2013 (Rogue)
      • History of Windows: Windows 3.0.
      • Looking for Love.
      • How to remove Antivirus Security Pro. (Rogue)
      • How to remove the Savepath Deals Adware
      • History of Windows: Windows 2.0
      • How to remove 24x7 Help.
      • How to remove the Guardians of the Peace of Irelan...
      • How to remove My Safe PC 2014 (Rogue)
      • History of Windows: Windows 1.0
      • How to remove the Webcake Deals Adware.
      • How to remove Antiviral Factory 2013 (Rogue)
      • How to make someone think they have malware: Batch...
      • How to Remove PC Defender 360 (Rogue)
      • Google Glass: Another device, another vector for i...
      • What are Bitcoin Miners?
      • Why you should not let Google Chrome store your pa...
      • What is Rogue Antivirus Software?
      • How to remove Live Security Professional. (Rogue)
      • Never leave your computer's date on February the 14th
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile