News, Announcements, Tech Discussions
What a last 24 hours.After a software install i rebooted and win8 got stuck in a repair loop.Tried pretty much everything.Could not access my acronis backups on the external.Nothing i tried worked,so went out this morning and bought the full edition of windows 8 pro and did a clean install.As my prev win8 install was a download and an upgrade edition,i could not access any of that info.It winds up working out better as a clean install is always better and the pc is dejunked software wise.Slowly getting all the stuff back in and of course webroot was my first install after the windows updates.I want to get some decent imaging software installed again,but it's not in the budget right now as i just shelled out $200 for win8.My acronis True image was the 2013 edition which was purchased as an upgrade to the 2012.Unfortunately the prerequisite for installing an upgrade edition is a pre-existing install.I cannot wait for this day to be over.Thankfully this all happened on my vacation.Hope al
Personal details of more than two million customers of Vodafone Germany have been stolen by a hacker. Vodafone said the attacker got access to customer names, addresses, bank account numbers and birth dates. The trove of information was stolen from a database sitting on the company's internal network. The operator said customers had been told about the breach and warned to watch out for "phishing" messages that try to extract more personal data. "Vodafone deeply regrets the incident and apologises to all those affected," the operator said in a statement. [url=http://www.bbc.co.uk/news/technology-24063621]Full Article[/url]
Hey there, I work for Technical Support at onOneSoftware.com and our applications always seem to conflict with your virus protection. I have duplicated the problem myself. What are the steps we can take to prevent this and get our software on your whitelist? Thanks, Nathan
Webroot users, [url=http://webroot.qualtrics.com/SE/?SID=SV_74LZ0KxX4BOqYRL]this survey[/url] is for you! This 9 question survey should take less time than one of our blazingly quick scans. Please take a moment to provide some quick feedback to help us improve. Thanks! :cathappy: The survey will close Sept. 20th.
Intel has launched Bay Trail - a family of chips it hopes will help it make further inroads against processors designed by its rival ARM. The chips are designed for use in low-power devices, including tablets. They incorporate what the US company calls "3D transistors", which it introduced to its PC chips in 2012, designed to boost computational power while using less energy. One analyst said Bay Trail could pose a serious challenge to ARM. Unlike Intel, the British company does not make chips of its own but rather makes money by licensing its designs to other companies, including Qualcomm, Apple and Nvidia, which then adapt them for their own uses. ARM's designs currently dominate central processing units (CPUs) used in smartphones and tablets, while Intel's x86-based architecture is far more common in desktop and laptop computers. This has been a consequence of ARM having the reputation of being the more energy efficient of the two. But the new Bay Trail chips may cause some tablet m
A new phishing attack targeting outdated Adobe Reader and Java versions is being disseminated in the form of a fake CNN alert email claiming that the U.S. has bombed Syria. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6217i7668753FA16FD16A.png[/img] img/source: [url=http://threatpost.com/fake-cnn-alert-says-us-bombed-syria-leads-to-malware]Threatpost[/url] This one is easy to spot because 1. The U.S. has not actually bombed Syria, and 2. As is the habit of many malware authors, the grammar is atrocious. For instance, the tagline says, "It was dropped about 15 bomn on stalitsu syria Demascus.” If a CNN writer actually wrote that, I'm Santa Claus. Notably however, Casey Wian is an actual CNN reporter, so they did get that right. Keep an eye out for this threat, and don't let it try to trick you into opening the link.
I read a lot of articles about yesterday's Apple keynote and have stumbled upon [url=http://www.engadget.com/2013/09/10/apples-september-10th-event-roundup-iphone-5s-5c-ios-7/]this great roundup[/url]. Therein are two sections, iPhone and iOS & apps, the both containing links to the main news. BTW, what are your thoughts about the new hardware things in 5S and what do you think about the new 5C? As for myself, [list] [*]5S - except new A7 chip, M7 motion-sensing chip, iOS7 and Touch ID nothing new. It continues in the footsteps of previous "S" models. [*]5C - this model is in fact iPhone 5 dressed up in another body, everything would be fine with this model except price - everybody expected a low cost model thus being able to fight with the middle-priced Android phones but it turned out that it wasn't the case. Time will tell ... [*]iOS7 - I like it, cute and smart, a real improvement[/list]
[b]Java SE Runtime Environment 7u40 Released September 10, 2013[/b] [b] [/b] [b]Download:[/b] [u][b][url=http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html]http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html[/url][/b][/u] [b]Be sure to download both x64 & x86 if you have a x64 system and uncheck any unwanted add-ons if offered.[/b] Also here is the version verification page: [u][b][url=http://java.com/en/download/installed.jsp]http://java.com/en/download/installed.jsp[/url][/b][/u] [u][b] [/b][/u]I guess it had to happen another update just to make [b]ProTruckDriver's[/b] day! Enjoy Buddy! [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/5388iD61A9DB6BE27C4AC.gif[/img] [i][b]TH[/b][/i]
The Folder pane on the left disappears or Empty had to remove [url=http://support.microsoft.com/kb/2817630/en-us]KB2817630[/url] which repaired that and [url=http://support.microsoft.com/kb/2810009/en-us]KB2810009[/url] failed to install twice so I did it manually and Windows update still says it's not installed so I had to hide them. [url=http://social.technet.microsoft.com/Forums/lync/en-US/8ebce46d-1645-4909-8951-d1ca954179ac/outlook-2013-folder-pane-is-empty]http://social.technet.microsoft.com/Forums/lync/en-US/8ebce46d-1645-4909-8951-d1ca954179ac/outlook-2013-folder-pane-is-empty[/url] [i][b]TH[/b][/i]
Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms. The latest development is a mass email spam campaign being used to distribute Android scareware -- applications that use scare tactics to trick users into paying for worthless services. Researchers from security vendor FireEye identified one such campaign that was launched on Sept. 6 and is still ongoing. The rogue emails use themes like failed package delivery notifications from USPS or electronic wedding invitations that have long been used in phishing emails to spread Windows malware. The emails contain links that lead to websites serving an Android package (APK) file called LabelReader.apk. This APK installs a known Android scareware application called FakeDefender that masquerades as a commercial Android security product. "The malware deceives users into paying for cleanup of othe
66 years ago today, on the 9th September, 1947, operators of the Mark II Aiken Relay Computer being tested at Harvard University, found something curious trapped between points at Relay #70, Panel F. A note made at the time explains, this was the “first actual case of bug being found”. History records that the legendary Grace Hopper was the person who located the moth, and in so doing, helped popularise the idea of “debugging computers”. [url=http://grahamcluley.com/2013/09/first-actual-computer-bug/]Full Article[/url]
...and instead you might have ended up with malware. From [url=http://www.net-security.org/malware_news.php?id=2584]net-security.org[/url]: [i]However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through.[/i] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6215i60C010FC89E5E05B.jpg[/img] [i]In this latest case they discovered, the developer has misused Windows', Twitter's, YouTube's and AVG's names to offer apparently harmless wallpaper and puzzle apps that are usually used to trick users into signing up for pricy services or to deliver a constant stream of ads.[/i] [i] They also discovered a bogus "avg antivirus pro" app by another developer, possibly riding on the coattails of the recent launch of the latest version of their AV solution.[/i] [i] [/i] Watch out for these scam apps! Some of them are easier to figure out than others. In the screenshot
Or will it be the dawn of the new iPhones (as in more than one)? That's just one of the many questions people have as they prepare for today's Apple event at 10 AM pacific in Cupertino, California. One thing we can expect to see is the previously 'maybe/maybe not' Fingerprint Sensor, originally confirmed by the Wall Street Journal (and posted on [url=http://arstechnica.com/apple/2013/09/new-iphone-will-have-a-fingerprint-sensor-confirms-wsj/]ARS Technica[/url]). But what surprises does Apple still have up it's sleeve? Let's think! Or better yet, let's just watch the [url=http://live.cnet.com/Event/CNETs_Apple_Sept_10_event_live_blog]live blog[/url], courtesy of CNET. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6213i43F95C9ED84BF367.png[/img] (Source: CNET)
[b]Adobe Reader 11.0.04[/b][b] is now released[/b] to fix some security issues posted here: [url=https://community.webroot.com/t5/Security-Industry-News/Prenotification-Security-Advisory-for-Adobe-Reader-and-Acrobat/td-p/56149#.Ui8uZT-zqSo]https://community.webroot.com/t5/Security-Industry-News/Prenotification-Security-Advisory-for-Adobe-Reader-and-Acrobat/td-p/56149#.Ui8uZT-zqSo[/url] [u][b][url=http://get.adobe.com/reader/]Download[/url][/b][/u] [h2]Adobe AIR 126.96.36.1990 is now released. [/h2] [u][b][url=http://get.adobe.com/air/?promoid=JZEFV]Download[/url][/b][/u] [b]Be sure to uncheck any unwanted add-ons if offered.[/b] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6205iC0D07EDA9A2DE06B.jpg[/img] [i][b]TH[/b][/i]
[b]New Adobe Flash build has been released today. Sept 10, 2013[/b] [url=http://www.adobe.com/software/flash/about/]Click here to check your version[/url] and [url=http://get.adobe.com/flashplayer/otherversions/]Here to Download[/url] and here is an [url=http://www.adobe.com/products/flashplayer/distribution3.html]Alternate Download[/url] and download both the one for IE and the other for other Browsers such as Firefox & Opera plugins![b] Windows 8 no need to update as it comes through Windows update for IE10 & IE11 but if using another Browser such as Firefox & Opera please download the version for [/b][b]Plugin-based browsers also no need to download for Google Chrome as they update it themselves. [/b] [b] [/b] [u][b][url=http://www.adobe.com/support/security/bulletins/apsb13-21.html]Security Bulletin[/url][/b][/u] [h2]Adobe Shockwave Player 188.8.131.52[/h2] [b]Security update available for Adobe Shockwave Player Release date: September 10,
Back in July 2013, four computers were stolen from a large health care provider in Illinois, USA. At first blush, it doesn't sound like "Crime of the Century," but according to reports, those missing computers have become a huge thorn in the side of Illinois-based Advocate Health Care. That's because the computers contained Personally Identifiable Information (PII) of patients going right back to the 1990s - four million of them, in fact. The computers were password protected, whatever that means, but the data on their hard disks was not encrypted. In theory, then, if you were to put the hard disks into another computer, or boot the "protected" computers from a CD or USB key, you would almost certainly be able to copy off any or all of those four million records. The stolen data is said to have contained at least names, addresses, dates of birth and Social Security numbers (SSNs). SSNs are the closest thing that the US has to a national identity number, giving them an influence i
Google is stepping up efforts to toughen data encryption in an effort to limit unofficial snooping on user information in the wake of the revelations about the NSA and PRISM. Speaking to the Washington Post, Eric Grosse, vice president for security engineering at Google said "It's an arms race", as he described government hackers as "among the most skilled players in this game." In the aftermath of leaked documents from Edward Snowden, suggesting that some US companies have made it easy for information to flow to the government, Google is keen to show it is doing its utmost to protect its users' privacy. [url=http://nakedsecurity.sophos.com/2013/09/09/google-to-encrypt-data-end-to-end-in-effort-to-block-nsa-and-other-agencies/]Full Article[/url]
After facing a backlash from developers concerned that they wouldn't get early access to the latest versions of Windows, Microsoft has released builds of Windows 8.1 and Windows Server 2012 R2 to its MSDN and TechNet subscription programs, more than a month ahead of the updates' official launch date. "We heard from you that our decision to not initially release Windows 8.1 or Windows Server 2012 R2 RTM bits was a big challenge for our developer partners as they're readying new Windows 8.1 apps and for IT professionals who are preparing for Windows 8.1 deployments," Microsoft chief evangelist Steve Guggenheimer said in a blog post on Monday. "We've listened, we value your partnership, and we are adjusting based on your feedback." The OS updates are available as ISO disc images in a variety of formulations, including x86 and x64 builds and "N editions" that ship without Windows Media Player. [url=http://www.theregister.co.uk/2013/09/09/windows_81_developer_release/]Full Article[
I hate looking stupid but I usually have little say over the matter. I've wiped my hard drive clean but in a moment of rare mental clarity I backed everything up into 'Back up and Sync.' How do I retrieve these irreplaceable gems of wit and wisdom??? It's clear that I can click and drag but that seems to remove said file from back up and sync and then it only lives on my hard drive? Even I understand it would be better to have it in both places. Thanks much
Webroot - should we choose it to recommend to our clients? Your opinion and experiences appreciated.
Hi all, We are a small systems integrator, and are looking for an AV product to recomment to our clients. In the past we have used Trend, and Symantec, and Avast. I'm looking for any real IT folks opinions and experiences on Webroot. We like the cloud management aspect of it. Thanks, Simon.