How to install Bitdender’s free Ransomware Protection Tool

Bitdefender has just released a free tool that can protect against ransomeware viruses. Here is how to install it.

Hackers have been hitting everything from hospitals to police stations with Ransomeware viruses. Bitdefender has released a tool that could help fight it:

“Bitdefender anti-malware researchers have released a new vaccine tool which can protect against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families.

“The new tool is an outgrowth of the Cryptowall vaccine program, in a way.” Chief Security Strategist Catalin Cosoi explained. “We had been looking at ways to prevent this ransomware from encrypting files even on computers that were not protected by Bitdefender antivirus and we realized we could extend the idea.”

Installation could not be easier

  1. Download the file:

  1. Run it:

Ransomeware Protection 1


3. Click Next, and then install:

Ransomeware Protection 2

  1. And then Finish

Ransomeware Protection 3

And that is it!

Ransomeware Protection 4

How easy was that?

If you want you can change the settings for the program. You may want to set it to “minimize on startup” and “minimize to tray on close”:

Ransomeware Protection 5

But it is pretty much an install and forget about it type app, no fuss, no muss.

Bitdefender has always been one of my favorite anti-virus programs, and this is a handy tool to have.

Check it out!


China Demos Hacker obtained Stealth Tech during Obama Visit

During the Asia-Pacific Economic Cooperation meeting in Beijing, President Obama took China to task about its cyber espionage campaign against Western technology creators and innovators. And China responded by showing off the fruit of their hacker’s labor by test flying the J-31 Stealth Fighter prototype.

The J-31 (seen above) and China’s other stealth fighter, the J-20, both allegedly contain stealth technology stolen from US military contractors. Adding insult to injury, China plans on exporting the stealth fighter to nations that can not afford the American F-35.

Electronic espionage has allowed China to make very rapid advances in military & research fields and they show no sign of slowing down amidst political pressure. If anything they are expanding their attempts at an alarming rate.

As we haven’t had a lot of luck keeping Chinese hackers out of US systems, maybe it is time to create fake honeypot systems for them to attack that contain purposely flawed military designs…

Retail POS System compromised through Video Security System

teal credit card digits close-up

I have been harping on the dangers of insecure embedded systems and physical security systems posing a huge security risk for your internal network. Recently I was talking with a Retail Point of Sale (POS) software expert and was told how a POS system was hacked by an attacker that had gained access to the network through a video security system!

It is so simple now, in the name of convenience, to put various devices online by using extremely cheap embedded systems that act as web servers and remote access devices. With the rush to put everything online, called the “Internet of Things”, security is massively taking a back seat.

I particularly find it hard to believe that physical security devices meant to protect your building or premises from a physical attacker are being made with old, outdated or even wide open online services that will allow an electronic attacker full access.

Even heating and air conditioning system could be targeted by hackers. The Target hack from recent memory was made possible by hackers stealing login information from an HVAC system.

HP recently released a study on the Internet of things and found:

HP Internet of Things

Analyzed device included:
  • Televisions
  • Webcams
  • Home thermostats
  • Remote power outlets
  • Sprinkler controllers
  • Hubs for controlling multiple devices
  • Door locks
  • Home alarms
  • Scales and garage door openers

Sadly many of these insecure devices can be found worldwide using Google and Shodan searches.

I personally have seen a video security system that used a short lower case letter password for admin access to it’s Telnet interface! With further research I found that the company had been notified of the issue years ago and never rectified the situation. New devices are still being made by this manufacturer with the weak password that is publicly posted on the internet!

It is time that the Internet of Things is held to the same security standards as the rest of the computer world. But until manufacturers begin to care about YOUR security or regulations are put into place, I don’t see this problem going away anytime soon, in fact it is going to get much, much worse.

In the mean time, business owners need to add physical security and “Internet of Things” type devices to their list of systems that need to be scanned for security issues.

DARPA unveils “Hack Proof” Mini-Quad Copter

DARPA’s has unveiled a “hack proof” UAV that demonstrated that a non-compromisable drone could be developed.

The mini-quadcopter is the creation of their High-Assurance Cyber Military Systems (HACMS) program, and one of many DARPA devices displayed to the Pentagon on Wednesday according to DefenseTech.

There are numerous reports of drones malfunctioning or possibly even hacked by attacking their GPS guidance system.

Basically DARPA understands the risks of Drones being hacked or mission compromised and is looking for new ways to protect these valuable assets.

Enter DARPA’s HACMS (Hack-ems? Hack MS?? Gotta love government acronyms) division. According to DARPA’s website, “The goal of the HACMS program is to create technology for the construction of high-assurance cyber-physical systems, where high assurance is defined to mean functionally correct and satisfying appropriate safety and security properties.

And in this case, DARPA unveiled a hardened software system and pared it with a mini-Quad copter to see if they could create a non-hackable platform.

The software is designed to make sure a hacker cannot take over control of a UAS. The software is mathematically proven to be invulnerable to large classes of attack,” Kathleen Fischer, HACMS program manager said.

Of course all in the cyber security realm will scoff at the idea of being “unhackable”, but in it’s defense, the mini-copter was able to hold off a “Red Team” – a group of hackers that pretend to be bad guys and test systems looking for holes.

The control software wasn’t necessarily created with mini-UAV’s in mind, but larger military grade drone platforms. And that is not all, in the future it may not just be used for drones.

Soon you may see this same tech released as an Open Source project and used to create hardened network routers and even possibly solve security problems associated with BYOD or employees bringing in their mobile wireless devices for network connectivity.

Pretty impressive indeed!