End of life for Windows 10 1803 so update to 1903 now

Microsoft has been alerting their users running Windows 10 1803 also known as the April 2018 Update that this version of windows is nearing end of life and that they should update to the latest version of Windows.

When and how am I affected? 

Windows 10 1803 will reach end of support on November 12th, 2019, which means Microsoft will no longer be pushing out security updates and you will be vulnerable to any new security threats that are discovered.

How do I update to the latest version?

Click here if you need assistance with updating to Windows 10 1903 which is the latest version of windows. 

Read the rest

Google Warns Zero-Day Bug For Android Under Active Attack

Google has stated a warning of an Android zero-day flaw actively being exploited in the wild. This flaw impacts 18 Android models including Google’s flagship Pixel, Samsung, Huawei and Xiaomi.

Project Zero member Maddie Stone wrote in a technical post . which said the unpatched vulnerability(CVE-2019-2215) can be exploited in several ways. In one scenario, a target is enticed to download a rogue app. The second method of infection includes chaining the bug with an additional vulnerability in code the Chrome browser uses to render content.

“It is a kernel privilege escalation [bug] using a use-after free vulnerability, accessible from inside the Chrome sandbox,” Stone said. “The vulnerability is exploitable in Chrome’s renderer processes under Android’s ‘isolated_app’ SELinux domain, leading to us suspecting Binder as the vulnerable component.”

A patch for the vulnerability is expected in the next few days as part of Google’s October Android security … Read the rest

The Benefits Of Managed IT Service Providers

Managed IT Services is a term that refers to the practice of outsourcing your company’s IT computer network support and management to improve business operations. Companies that provide these managed services are called Managed Services Providers (MSP).

These MSP companies would take the place of a full-time IT professionals that you would normally have on staff. But that’s not the only advantage of managed services.

1. REDUCE RISK

Every investment your business makes carries a certain risk. Government regulations, technologies, markets, financial conditions and markets all change at a rapid pace. When you utilize an outsourcing provider, they tend to manage a lot of this risk for you because of our industry knowledge in areas such as compliance and security issues.

2. PROACTIVE SOLUTIONS

When you choose to outsource your IT as a proactive effort, you receive better performance, nearly zero downtime and fewer glitches. They help detect problems to … Read the rest

FBI Released Public Announcement About Ransomware Threat

The FBI released a new public announcement about the ongoing ransomware threat. They stated that the attacks are becoming more targeted and with losses increasingly more damaging.

HOW DOES RANSOMWARE INFECT ITS VICTIMS?

The new public message lists the common infection vectors; namely, email phishing campaigns, Remote Desktop Protocol vulnerabilities and software vulnerabilities.

IF MY SYSTEM IS INFECTED, SHOULD I PAY THE RANSOM? SHOULD I CONTACT THE FBI?

You should avoid paying the ransom at all costs. This also emboldens the criminals to target other organizations and attempt to hold them for ransom as well. Remember just because you paid the ransom does not guarantee they will give you your data back.

HOW CAN I PROTECT MYSELF AGAINST RANSOMWARE?

The FBI Stated the following: “As ransomware techniques and malware continue to evolve and become more sophisticated, even the most robust prevention controls are no guarantee against exploitation. This makes Read the rest

Comodo Forums Hacked By Exploiting vBulletin Flaw

Comodo, one of the largest SSL Security Certificate Authorities notifies that their vBulletin Forum has been hacked. Comodo Group reported that 170,000 forum users had their data stolen by a hacker who exploited a recently disclosed vulnerability in vBulletin’s internet forum software.

Comodo notifies its forum users

According to the announcement from Comodo, an attacker exploited the vBulletin security flaw on Sunday 11/30/2019; their action resulted “in a potential data breach on the Comodo Forums.”

The Comodo Forum is powered by the open-source Simple Machine Forum software but vBulletin is used on another board dedicated for product updates and discussions, which has far fewer members.

ITarian a Free MSP platform solution. It’s forums, also by Comodo, has 45,300 users and is on vBulletin. They published a similar announcement and the same recommendations.

What was affected?

It was found that the affected data includes forum usernames, names, e-mail addresses, IP … Read the rest

PowerShell Tutorials

How To Uninstall All Windows 10 Apps Using PowerShell

You have noticed that Windows 10 came with all sorts of Apps and you want a simple way to Uninstall all these Apps, well using PowerShell will be the quickest method.

Introduction:

Uninstalling Windows 10 apps using PowerShell provides a convenient and efficient way to remove built-in or pre-installed applications that you may not need or want on your system. PowerShell is a command-line scripting language developed by Microsoft, and it offers powerful tools for managing and automating various tasks in Windows.

In this guide, I will walk you through the steps to uninstall all Windows 10 apps using PowerShell. This method allows you to remove multiple apps simultaneously, saving you time and effort. It is important to note that this process will only uninstall the apps for the current user account and not for all users on the system.

Before proceeding, please ensure that you have administrative privileges on … Read the rest

PowerShell Tutorials

How To Reinstall All Windows 10 Apps Using PowerShell

I take it some how some way you may have uninstalled a few or all Windows 10 Apps and they are no longer in your start menu, This PowerShell command will get those Windows 10 Apps back onto your system. 

Introduction:

Reinstalling Windows 10 apps using PowerShell can be useful if you have accidentally uninstalled essential applications or if you want to restore the default set of built-in apps on your system. PowerShell, a command-line scripting language developed by Microsoft, provides a convenient way to manage and automate tasks in Windows.

In this guide, I will walk you through the steps to reinstall all Windows 10 apps using PowerShell. This method allows you to reinstall multiple apps simultaneously, saving you time and effort. However, please note that this process will only reinstall the apps for the current user account and not for all users on the system.

Before proceeding, make … Read the rest

How To Update To Windows 10 Version 1903

Microsoft released Windows 10 Version 1903 but not everyone is on it due to issues, so read on to find how to download and install Windows 10 Version 1903.

 

First lets check your Windows 10 version

On your task bar locate the [ Type here to search ] area and type in “About your PC” if you see that your on 1903 your golden and do not need to do anything else.


First and safest way to update to Windows 10 Version 1903

The easiest and safest way to download and install windows 1903 is to first restart your device. Then check for new updates. Select Start  > Settings  > Update & Security  > Windows Update , then select Check for updates and install any available updates.

 

How to download and install the Windows 10 version 1903 Update using the Update Assistant

Windows has provided an Update Assistant to force … Read the rest

What Is A Data Breach?

A data breach is a security incident in which information is accessed without authorization. Data breaches can hurt businesses and consumers in a variety of ways. They are a costly expense that can damage lives and reputations and take time to repair.

Personally identifiable information — such as full names, credit card numbers, and Social Security numbers — is the most common form of data lost to data breaches, with personal financial information close behind.

Corporations and businesses are extremely attractive targets to cyber criminals, simply due to the large amount of data that can be nabbed in one fell swoop.

Why do data breaches occur?

Cybercrime is a profitable industry for attackers and continues to grow. Hackers seek personally identifiable information to steal money, compromise identities, or sell over the dark web. Data breaches can occur for a number of reasons, including accidentally, but targeted attacks are typically carried

Read the rest

Remove These 25 Malware Infested Android Photo Editing Apps NOW

Many Android photo editing apps in the Google Play Store were found to be malware infested, cybersecurity firm Symantec said they should be removed Now.

Symantec uncovered 25 malware infested apps in the Play Store, which were downloaded more than 2 million times. Symantec reported the malicious apps to Google already but if they are still on your phone you should delete them as soon as you can.

Here are the apps that were found to be infected with malware: 

-Auto Blur Photo

-Auto Cut Out (Free)

-Auto Cut Out Pro

-Background Cut Out Pro

-Blur Image Plus

-Blur Image Plus (1.0)

-Blur Image Pro

-Cut Paste Photo Editor

-Cut Paste Photo Editor (X 1.0)

-Face Feature 

-Fashion Hairstyles Pic Editor

-Fashion Hairstyles Pic Editor 2.4.6

-Image Blur Editor

-Image Blur Editor (Free)

-Image Blur Editor (Unlimited)

-Hairstyles Photo Editor Plus

-Latest Hairstyles (Free)

-Motion On Picture Read the rest

Stay Informed

Receive instant notifications when new content is released.