The Blog

Free Tips & Tricks
Cinch I.T. > The Blog (Page 23)

Ransomware is a particularly nasty piece of malware that takes infected machines hostage. CryptoLocker was successful at garnering multi-millions in ransom payments the first two months of CryptoLocker’s distribution, according to a recent blog by FireEye regarding the takeover of CryptoLocker infrastructure – Operation Tovar. Operation Tovar helped tear down the infrastructure used by attackers, but there are still many instances where users are still being...

Read More

Click Start, click Run, type regedit, and then click OK. In Windows Vista/7, simply type regedit in Start Search and hit Enter. Navigate to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Double-click the DefaultUserName entry, type the user name to log on with, and then click OK. If DefaultUserName registry value name is not found, create a new String Value (REG_SZ)with value name as DefaultUserName. Double-click the DefaultPassword entry, type the password for the user account under the value data box, and...

Read More

It's been a little sad to watch Facebook devolve from being a squeaky clean site full of people you love to a spam-ridden wasteland. And with a fifth of the world's population using the site, you can be sure the spam is going to keep coming. So you need all the help you can get separating the good links from the bad. Bitdefender, an antivirus firm,...

Read More

  “Adobe has released security updates for Adobe Flash Player 14.0.0.125 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.378 and earlier versions for Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest version”   “Users of Adobe Flash Player 14.0.0.125 and earlier versions for Windows...

Read More

Implementation issues with AVG Secure Search, a browser toolbar from antivirus vendor AVG Technologies that’s supposed to protect users from malicious websites, could have allowed remote attackers to execute malicious code on computers. The toolbar, also known as AVG SafeGuard, supports Google Chrome, Internet Explorer and Mozilla Firefox running on Windows XP and later, and is often bundled as an optional installation with popular free software...

Read More

Recently we have received several calls about spammers abusing Dropbox, a popular cloud-based, file-hosting and synchronization tool, to spread spam. Dropbox accounts have a public folder where files can be placed and made publicly available. This function is useful to spammers, as it effectively turns Dropbox into a free hosting site. Spammers have abused URL shortening and free hosting sites for some time. Dropbox also provides...

Read More