From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

Hello all, Blogmaster here – who also has run a Community Free help site for malware removal and information etc since around 2005. Here and there, more and more seeing many writings about the new Windows 10 from a security standpoint – well for me it is forget it. I will probably never buy one and certainly will not upgrade. I would rather switch to Linux forever than go through what they have going on now.

There is a circumvention of security with a more or less full blown allowance to third party ad network type activities. A lot like downloading software with adware and spyware bundled secretly inside and installs. It is a thumbing of the nose at the public for dollar$ gained through this type of harvesting. When this began around 2001-2002 and 2003, all laws and softwares were created to make it illegal as well as block and detect and remove it from any PC. This is when and where adware and spyware were discovered.

One hand washes or shakes the other on the internet as far as trying to get money to pay bills through ads etc. Most of the innocent are actually welcomed across the board – an ad here there – but sometimes irritating. Depends if you are surfing or studying. The infection by adware creates the continual intermittent pop up annoying ads and can as well be leaking personal information to third parties. This is how legally antispyware companies were legally allowed to create antispyware and as well, publicly declare these as adware infections without libel suit.

So the whole point here is basically that with Windows 10 – the world wide web is returning to those days of allowance and naivete to those days immediately preceding the spyware category of threats being discovered. (I have noticed some security products do not block browser leaks as much as you would think.) They’re sticking it to the newbies again, in a reverse manner of trying to help with UAC being released in Vista forward and much else to make security as automatic as possible for novices (newbies). If you were around for those “XP Years” when this was the day, you’ll see and get this feel all over again in reading this great blogpost below describing security and Windows 10. (Emsisoft Antimalware is all I have recommended as top product for several years now – which indeed blocks any attempt of a browser leak with user choices as you can plainly see in a free trial).

Of course for veteran users who tweak security settings across the board in Windows – there is going to be a lot to turn off and block anywhere possible which may be the cure. Some services will obviously be forget it -don’t use it, just use Windows as it was still 7 or 8. But read this blog for sure, if new or experienced user, and get a good eye full of what Windows 10 is doing to computing security. I won’t doubt there may even be lawsuits for data breach causing ID Theft long the near future.

The truth about Windows 10 spying on almost everything you do
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
In Security Knowledge
by Carla September 2, 2015 |

You have probably heard the news by now: Microsoft has updated a controversial service agreement that lays out in scary detail how your personal data is being used and abused – at least, that’s what the major tech blogs are saying. But the reality is, even if you read the 12,000 word service agreement, it’s still confusing and vague at best. ….

…..”Cortana is your voice-activated personal assistant, much like Siri and Google Now. But in order for her to operate, Windows 10 collects your personal information to better serve you. This includes calendar events, contact information, alarm settings, what you view and purchase, your browsing history, emails and text messages… “and more”.” …..

….. “OneDrive is Microsoft’s cloud storage system, and it comes with the Windows 10 territory. You might think it’s great because there is no additional sign up or installment required and you can access it from any of your Microsoft devices. But this new convenience comes with a price.
Every time you are signed into your machine with your Microsoft account, your operating system immediately syncs your settings and other data to company’s servers. This includes browser behavior and history, as well as mobile hotspot and Wi-Fi network passwords.” …..

READ IN FULL:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/

REMEDY / FIX …..

O&O ShutUp10
Free antispy tool for Windows 10
O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far.
Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated.
O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!

IN FULL AND DOWNLOAD LINK…..
HAS BEEN RECOMMENDED HERE:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
https://bluecollarpcwebs.wordpress.com/2015/09/09/from-security-standpoint-you-may-want-to-forget-a-windows-10-upgrade/

O&O ShutUp10
The telemetry components of Windows 10 and the way they affect the user’s privacy is a controversial topic ever since the release of the most recent iteration of Microsoft’s operating system. While many options can be tampered with during setup, there are applications out there specifically tailored to allow the manual tweaking of Windows 10’s security settings. One of them is O&O ShutUp10.
Various range of tweaks for Windows 10
Requiring no installation, O&O ShutUp10 provides users with a simple means of customizing the privacy options in Windows 10 and thus decide which data collection options will stay enabled and which should be blocked.
http://www.softpedia.com/get/Tweak/System-Tweak/O-O-ShutUp10.shtml


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

Advertisements

How Secure is the Windows Clipboard? Clipboard Hijacking

How Secure is the Windows Clipboard?
It is always a good idea to be concerned about the security of your data, especially when it comes to your login credentials for websites. With that in mind, just how secure is the Windows Clipboard? Today’s SuperUser Q&A post has the answer to a worried reader’s question.
Read This Article →
http://www.howtogeek.com/226207/how-secure-is-the-windows-clipboard/

Definition
clipboard hijack attack
http://whatis.techtarget.com/definition/clipboard-hijack-attack

FROM BLUECOLLARPC…..

REVIEW OUR HELP ARCHIVE – CLIPBOARD HIJACKED….
BLOG: Remember Clipboard Hijacking – Archived Help
June 21, 2011 — bluecollarpc
https://bluecollarpcwebs.wordpress.com/2011/06/21/remeber-clipboard-hijacking-archived-help/

CCLEANER CLEANS THE CLIPBOARD DATA…..
THE MOST POPULAR USED FREEWARE JUNK FILE CLEAN UP IS CCLEANER…
(CLICK CLIPBOARD BOX CHECKBOX IN THE SETTINGS)
CCleaner – (Recommended: very popular, safe, Genuine Freeware/donate, used by millions) CCleaner supports the cleaning of temporary and unneeded files from … http://en.wikipedia.org/wiki/CCleaner
Get – CCleaner http://www.ccleaner.com/

BLOG:
Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications
bluecollarpc
https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 
 MOBILES: http://pdamobilecafe.wordpress.com/ 
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com 
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

Have you disabled UPnP in your Router yet? Security Hole

Have you disabled UPnP in your Router yet? Security Hole

This is very simple to do. Check out the How-To Geek link here…

HTG Explains: Is UPnP a Security Risk? – How-To Geek
http://www.howtogeek.com/122487/htg-explains-is-upnp-a-security-risk/
Aug 24, 2012 – UPnP comes enabled by default on many new routers. At one point, the FBI and other security experts recommended disabling UPnP for …

How to fix the UPnP security holes | ZDNet
http://www.zdnet.com/article/how-to-fix-the-upnp-security-holes/
Jan 30, 2013 – The US Department of Homeland Security is urging everyone to disable the common networking Universal Plug and Play (UPnP) protocol….

What is UPnP? A Webopedia Definition
http://www.webopedia.com/TERM/U/UPnP.html
This page describes the term UPnP and lists other pages on the Web where you can find additional information…

Universal Plug and Play – Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Universal_Plug_and_Play
Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi …

Lenovo Slipped Superfish Malware Into Laptops (Windows 8.1)

Lenovo Slipped Superfish Malware Into Laptops (Windows 8.1)

If you have missed the security furor over Lenovo pre-installing adware (antispyware catagory of antimalware products) you may want to check out these news links for information, degree of danger, and most importantly removal instructions (easy).

It is absolutely recommended to remove this immediately by all. Lenovo has been caught and publicly apologized. Just about all new computers come with what they used to call “bloatware” which is a handful of extra softwares which some may find useful. They take up space and may even slow down performance. But this is a big no-no Lenovo has done. It became as infamous as the Sony Rootkit malware they bundled in downloads, of music I believe it was, a good while ago.

A snippet…. (Removal help/instructions below)

“…The furor blew up because Lenovo installed Superfish adware on consumer laptops sold between September 2014 and January 2015. All these laptops were running Microsoft Windows 8.1. Your laptop fits the time frame, but you may have escaped for two reasons. First, Superfish was not installed on Lenovo’s business machines, such as ThinkPads. Second, it was not installed on laptops running Windows 7, which is still the business standard…..”
SOURCE: http://www.theguardian.com/technology/2015/feb/26/how-can-i-find-and-remove-superfish-and-similar-malware

LINKS: / PRESS

US-CERT: Lenovo Superfish Adware Vulnerable to HTTPS Spoofing
https://www.us-cert.gov/ncas/alerts/TA15-051A

Lenovo Slipped ‘Superfish’ Malware Into Laptops
malaysiandigest.com
LenovoComputer maker Lenovo has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers — all for the sake …
http://www.malaysiandigest.com/technology/542592-lenovo-slipped-superfish-malware-into-laptops.html

Lenovo computers come with pre-installed adware and MITM proxy
Posted on Feb 19, 2015 10:45 am
If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even worse, the software in question is…
Read in browser »
http://www.net-security.org/secworld.php?id=17973

Lenovo apologises for preinstalling malware on its PCs that can snoop on
its customers’ bank …
SmartCompany.com.au
The preinstalled malware, known as Superfish, intercepts and decrypts
secured HTTPS connections, which are used to send sensitive information …
http://www.smartcompany.com.au/finance/45798-lenovo-apologises-for-preinstalling-malware-on-its-pcs-that-can-snoop-on-its-customers-bank-accounts.html#

US cyber-cops declare WAR on Superfish ad-spewing malware lurking in Lenovo laptops
The Register
The US government’s Computer Emergency Readiness Team (US-CERT) today said the Superfish ad-injecting malware installed by Lenovo on its …
http://www.theregister.co.uk/2015/02/20/superfish_is_malware_us_government/

— REMOVAL HELP:

Superfish Uninstall Instructions (Lenovo Website)
http://support.lenovo.com/us/en/product_security/superfish_uninstall
NOTE: Please download and run the Automatic Removal tool executable to ensure complete removal of Superfish and Certificates for all major browsers.

Superfish malware: how do you know if your computer is affected? And how do you get rid of it?
Belfast Telegraph
The Superfish malware that was revealed last week to have been installed onto Lenovo laptops could allow hackers to watch your internet activity and …
http://www.belfasttelegraph.co.uk/technology/superfish-malware-how-do-you-know-if-your-computer-is-affected-and-how-do-you-get-rid-of-it-31015018.html

How to wipe Superfish adware and offending cert from your Lenovo laptop
Posted on Feb 20, 2015 12:38 pm
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using self-signed MITM SSL certificate…
Read in browser »
http://www.net-security.org/secworld.php?id=17979

How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
PCWorld
You can revoke that certificate manually, however. Here’s how, as told to PCWorld by Chris Boyd, a malware intelligence analyst at Malwarebytes. ….
http://www.pcworld.com/article/2886278/how-to-remove-the-dangerous-superfish-adware-presintalled-on-lenovo-pcs.html

Internet Explorer Unicorn bug actively exploited in the wild

Internet Explorer Unicorn bug actively exploited in the wild
Posted on Nov 21, 2014 09:04 am
Last week, in its regular Patch Tuesday, Microsoft patched a number of serious vulnerabilities, including one that is nearly two decades old, dating back to Microsoft IE 3.0. Discovered by the IBM…
Read in browser »
http://www.net-security.org/secworld.php?id=17673

MAKE SURE YOU HAVE LATEST WINDOWS UPDATES INSTALLED – PATCH WAS RELEASED FOR THIS !


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Microsoft Releases Advisory for Unpatched Windows Vulnerability zero-day

Microsoft Releases Advisory for Unpatched Windows Vulnerability zero-day

Microsoft Releases Advisory for Unpatched Windows Vulnerability
United States Computer Emergency Readiness Team (US-CERT)
National Cyber Awareness System:
Microsoft Releases Advisory for Unpatched Windows Vulnerability
10/22/2014 09:02 AM EDT
Original release date: October 22, 2014
IN FULL:
https://www.us-cert.gov/ncas/current-activity/2014/10/22/Microsoft-Releases-Advisory-Unpatched-Windows-Vulnerability

PRESS:
Microsoft warns of Windows zero-day; hackers serve exploits in PowerPoint files
Computerworld
… that a successful exploit would let hackers hijack the PC so that they could, for example, steal information or plant other malware on the machine.
FULL: http://www.computerworld.com/article/2836722/microsoft-warns-of-windows-zero-day-hackers-serve-exploits-in-powerpoint-files.html

Windows 0-day exploited in ongoing attacks, temporary workarounds offered
Posted on Oct 22, 2014 02:09 pm
Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with…
Read in browser »
http://www.net-security.org/secworld.php?id=17521


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Microsoft patches two more 0-days actively used by attackers

Microsoft patches two more 0-days actively used by attackers
Posted on Oct 15, 2014 03:37 pm
With this month’s Patch Tuesday, Microsoft has provided patches for several critical vulnerabilities that allow remote code execution, some of which have been or are actively exploited in the wild. …
Read in browser »
http://www.net-security.org/secworld.php?id=17498

%d bloggers like this: