Chrome – careful on their extensions

There is an excellent article written by Ernestas Naprys who states be careful on using the handy adblocker, price tracker or spell checker extensions that might be risking your online safety! Ernestas came across a tool found at crxcavator.io that analyzes chrome extensions. They use “chrome.webRequest” API that is regarded as a critical risk. Please check out his online writing at https://cybernews.com/security/chrome-extensions-see-everything-cybersecurity-expert/ which explains it all. Enjoy the read!

AI – Should you use this?

AI (Artificial Intelligence) has been expanding exponentially over the last number of years.  Recently, a study found that more than half of its participants using AI for work saw a 30% increase in productivity.  Many people have heard of ChatGPT but there are other great AI tools out there as well.  One of them is called GrammarlyGo. GrammarlyGo can add any human or AI-generated text into a document, and it can improve, shorten, lengthen or change the tone of the wording. This performs better than ChatGPT as ChatGPT doesn’t have a very good grasp of grammar & syntax. 

A few other good AI apps are DailyBot, Felix, Canva & Slack. Please check out this link by Ashley Couto who provides excellent insight about the various AI models & their benefits!

Video tips on ransomware: Be armed with knowledge!

Title:  Video tips on ransomware – be armed with knowledge!
Date:  Wednesday, 06/22/2016

The other day I did a short write-up on ransomeware ~ tips on how to protect your system from the Locky and like viruses.  Today I would like to follow up with two short videos – check them out:  “5 Tips to avoid ransomware”, courtesy of “welivesecurity” and “What is ransomware and how can I protect myself?”,  courtesy of  “ESET” :

Tips on how to Combat the Locky Virus

Title:  Tips on how to combat the Locky Virus
Monday, 06/20/2016

A really nasty virus hit the internet around mid-February of this year and is creating utter havoc! It is a ransomware virus commonly known as the “Locky” virus, and it has been modified into other name variants producing similar results.  Locky uses an AES type of encryption, and is spread generally through email and spam email with either a Word doc, Excel, .js or .zip file.  Check out the Avast blog link – it goes into very specific detail on the infection vector and what to look for.  The most common method so far in presentation has been an email with a Word doc invoice attachment.  It will ask the recipient to open the invoice and click enable to allow the macros to process.

When a user’s system is infected, it may present with a red _Locky_recover-Instructions.png wallpaper that covers the entire desktop, or similar type pop-up dialogue boxes.  This will infect all versions of Microsoft Windows.  When it first infects the computer, it will create a random named executable in the %AppData% or %LocalAppData% folder.  This then will be launched and begin to scan all the drive letters on your computer and network.  The virus will encrypt all the user data, making it completely in-accessible.  Following this a message will appear stating to retrieve the data, you need to pay in bitcoins and within a specific time-frame.  Unfortunately, even if the bitcoins are paid to the hacker, it does not guarantee return of the user data.

What to do when infected?  First thing that should be done immediately is to unplug the network cable from the PC and if connected wirelessly, to disconnect from the wireless network by either disabling the adapter, or shutting down the system.  Next, go to Stelian Pilici’s MalwareTips website – he provides an excellent overview of the virus, how it works, and what tools to use to remove the Locky virus.  Keep in mind, this may not always be successful and Stelian advises this.  However, if the virus has not fully infected the system then there is a chance of possibly recovering some or most of the user data.  The tools Stelian recommends in a nutshell are as follows:

  • Malwarebytes
  • HitmanPro
  • ShadowExplorer
  • CryptoWall

One other word of advice:  It is always good practice to back up your data onto an external device such as an external hard drive, disconnect it from the system and/or network, and store this either in a safe or off-site.  Perform periodic backups moving forward to keep the data backup current.  Good luck and keep your data safe!

–written by Miylani