Category: Training & How-To

  • WikiLeaks Reveals ‘Athena’ CIA Spying Program Targeting All Versions of Windows

    More CIA spying tools… WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which “provides remote beacon and loader capabilities on target computers” – allegedly being used by the CIA that works against every version of Microsoft’s Windows operating systems, from Windows XP to Windows 10. Dubbed…

  • WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

    If you were infected by WannaCry, they have released a decryption tool to unlock your files without paying the ransom. If your PC has been infected by WannaCry – the ransomware that wreaked havoc across the world last Friday – you might be lucky to get your locked files back without paying the ransom of…

  • Microsoft Issues Emergency Patch For Critical RCE in Windows Malware Scanner

    Make sure you get this Microsoft update asap. Microsoft’s own antivirus software made Windows 7, 8.1, RT and 10 computers, as well as Windows Server 2016 more vulnerable. Microsoft has just released an out-of-band security update to patch the crazy bad bug discovered by a pair of Google Project Zero researchers over the weekend. Security…

  • How to Make Windows Troubleshoot Your PC’s Problems for You

    Why not let Windows do all the heavy lifting when you have a problem? Windows includes a variety of “troubleshooters” designed to quickly diagnose and automatically solve various computer problems. Troubleshooters can’t fix everything, but they’re a great place to start if you encounter a problem with your computer. Troubleshooters are built into the Control Panel…

  • Source Code for CIA’s Tool to Track Whistleblowers Leaked by Wikileaks

    Yet one more reason why Microsoft should be worried about their market share… “It generates a random watermark for each document, inserts that watermark into the document, saves all such processed documents in an output directory, and creates a log file which identifies the watermarks inserted into each document,” Scribbles’ user guide manual reads. Scribbles Only…

  • How to Open Office Files Without Being Hacked

    Here are some good safety tips for opening Word documents, especially since Microsoft seems to be so slow at patching known exploits.  The easiest and most foolproof (so far) method is to open your documents in an online service: either Office online or Google Docs.  This way the desktop exploits can’t be utilized. Microsoft Office…

  • Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild

    As a general rule, you should never open a file from anyone that you aren’t expecting.  If your best friend or family member sends you a file you didn’t ask for, email them and make sure they sent it. This exploit bypasses the disabled macro settings and is very devious. According to researchers, this zero-day…

  • Microsoft Finally Reveals What Data Windows 10 Collects From Your PC

    Microsoft has always collected data for diagnostics, but it’s never really said what data it actually collects: … now for the first time, Microsoft has revealed what data Windows 10 is collecting from your computer with the release of the Windows 10 Creators Update, bringing an end to nearly two years of its mysterious data…

  • Tools We Recommend – ibVPN

    These are some great tools to secure your online privacy.  Just getting a vpn or using Tor browser is not enough.  Btw, just because someone values their privacy doesn’t mean they are doing something wrong. Privacy can be, and is, eroded at any time, especially when corporate corruption and greed are such strong motivations and…

  • Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability

    Again, how can this be good for Microsoft business? This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability…