Ransomware Update – The Threat Continues, by DoctorLaptop

Ransomware Update – The Threat Continues, by DoctorLaptop
Despite what you may have heard about a solution found to stop the recent ransomware attacks the threat is not gone. Be sure you have protected your computers. A new wave of attacks has begun and we should expect several more waves of attacks in coming months. The new attacks don’t only encrypt your data like classic ransomware. Instead some hijack your system and run hacker programs hidden in the background while your computer is on. This is known in tech jargon as turning your computer into a “bot”. As a result your computer gets slow and all your data and info are exposed. Hackers use armies of bots to accomplish hacking schemes that require massive numbers of computers focused on a task, such as doing “denial of service attacks” and “mining” crypto-currency. Read this article for an explanation in easy to understand terms.  Contact me if you need help or have questions. Email: doctorlaptop@protonmail.com or Mobile 675 993 069 (after 11am please).
https://www.yahoo.com/tech/another-large-scale-cyberattack-underway-experts-194944965.html

DOCTORLAPTOP’S TIPS #61

DoctorLaptop’s Tips #61
Ransomware has returned as an active threat after an 18 month period
where it was not very common. This is due to the recent release of  U.S. NSA
hacking tools. In the last wave of ransomware I advised the installation of
Hitman Alert. If you still have it keep it updated, and be glad you took my
advice and got it while it was free. New copies are no longer free. Here is
what you need to know to protect your computers.
1. Ransomware usually arrives in an email attachment and installs when you
open the attachment. New hacking techniques make it possible for these
booby-trapped emails to appear as if they were sent by someone on your
Contacts list! Do not open any attachments, even from contacts, unless you
are expecting an attachment. Ransomware can also come from other sources like
poisoned websites or infected network connections. Spanish internet service provider Telefonica had servers targeted with ransomware this week.
2. Keep your Windows fully updated. There are no forced Windows 10 upgrades
to worry about anymore. If Windows Updater does not run after a half hour wait then it is probably corrupt, a common problem with Windows 7/8.1. This can be repaired with the proper tools.
3. Only download software from sites with a good reputation. Many sites that
offer free downloads will infect your computer. I suggest using these safe sites:
4. Use a good antivirus and keep it updated. Free, reliable options are
explained on this site, including safe download links.
5. Use a ransomware blocker unless you use BitDefender antivirus, which has
one built in. I suggest using this free one, it will run beside your antivirus without
problems and requires no user actions unless you are attacked. If it detects ransomware it will pop up a window with instructions to complete the removal process. If it asks for permission to update do so. Read the info on the download page to understand how it works, explained in easy to understand language:
6. If you get infected with ransomware, force computer off by using the power button and bring it to me or a true professional repair facility immediately. I can probably remove it and save everything if you get it to me in under 24hrs. Time is of the essence! Do not let untrained techs attempt a recovery or you risk losing all your data and necessitating a full system re-install. This is not a job for amateurs.
7. To remove an unwanted antivirus is now a 2 step process. Windows instructions: First, uninstall in the usual way by going to Control Panel>Programs and Features, then choose the program and click Uninstall. Restart computer. Second, go to one of the download sites mentioned above and use the site’s search-box by entering
“the name of your antivirus + uninstall tool” and click search. Find the appropriate tool, download it. Find the downloaded file, usually in your Downloads Folder, right click it and choose Run As Administrator. Then follow the prompts. Then restart computer. Now run CCleaner and use the Registry function to remove any left over files.
Contact: doctorlaptop @ protonmail.com Mobile: 675 993 069 (no calls before 11am)

08Nov15, pt2 – New Ransomware Warning

A new version of ransomware, meaner and harder to recover from, has been released on the public.  At this time you cannot depend on any software, like Hitman Pro Alert, to protect you. Backups are required to fully recover from this type of attack.

Read the full article here:

http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/

Windows 10 Update 04Aug15- A New Scam and Undoing Win 10 Upgrade

Be aware, after upgrading your Windows 7 or Windows 8.1 systems to Windows 10, you do have 30-days to “downgrade” your PC back to the previous version of Windows.

To start the downgrade, make sure you’re plugged in — the downgrade can take several hours — and log into an admin account. From the Start Menu, click or tap “Settings” then “Update & security.” Choose the “Recovery” option, and then select “Go back to Windows 7” or “Go back to Windows 8.1.” Click “Get started”. You’ll have to give a reason why you want to downgrade. Click “Next” twice and the rollback will begin.

********************************************************************

 New Windows 10 scam will encrypt your files for ransom

A cautionary tale in being patient, and not skipping the line.

Just days after Microsoft released its latest operating system, hackers have begun targeting soon-to-be Windows 10 users with an emerging kind of malware.

Cisco security researchers are warning users against opening email attachments purporting to be from the software giant. The “ransomware” malware, which encrypts files until a ransom is paid, is being sent as part of an email spam campaign. The emails claims it’s attachment includes an installer that allows users to get the new operating system sooner. Once a user downloads and opens the attached executable file, the malware payload opens, encrypting data on the affected computer, and locking the owner out.

If you do get this infection you need professional servicing immediately, time is of the essence if you want to save your data and avoid a full re-install of your operating system.  Read more here:  http://www.zdnet.com/article/windows-10-scam-email-will-encrypt-your-files-for-ransom/

malware-upload-jpg.jpg