| 

Microsoft privacy portal a target of rogue security software

  • Post author: Omid Farhang
  • Post published: December 19, 2009
  • Reading Time: 2 min
  • Word Count: 249 words

Earlier in 2009, the Microsoft privacy homepage became the target of rogue security software developers looking to make a fast buck. The developers of the rogue security application known as ā€œPrivacy Centerā€ even went so far as to include a link to Microsoft to trick users into thinking the rogue is a Microsoft product. Trojan:Win32/PrivacyCenter is a family of programs that claims to scan for malware and displays fake warnings of ā€œmalicious programs and virusesā€. They then inform the user that they need to pay money to register the software in order to remove these non-existent threats. ...

Continue Reading Microsoft privacy portal a target of rogue security software

Do you want Bing for iPhone? There's an app for that

  • Post author: Omid Farhang
  • Post published: December 17, 2009
  • Reading Time: 3 min
  • Word Count: 553 words

Earlier this evening, Microsoft formally announced a new search app for iPhone on the Bing Community blog. The Bing app is available now from the App Store, complete with voice search. I emphasize the now because the app has a December 16 release date on the 15th. Based on a very quick, cursory look, Bing is a competent iPhone app, tapping into the kind of capabilities expected from the platform. Bing fits nicely into the App Store repertoire. I wouldn’t call the features revolutionary — Apple and Google are there already with advanced mapping and GPS — but the packaging appeals, and Microsoft manages to offer a user experience that is fairly consistent with Bing Web search. ...

Continue Reading Do you want Bing for iPhone? There's an app for that

Microsoft Hack

  • Post author: Omid Farhang
  • Post published: December 10, 2009
  • Reading Time: 2 min
  • Word Count: 245 words

Basically, the rogue antispy was directing the victim to a genuine Microsoft address, but was modifying the html on the fly as it came back from the real Microsoft page. It made it read that Microsoft was recommending that the victim should buy the rogue. That’s a pretty good trick that will catch a lot of folks, and it reminded us of another one that we frequently see. It works like this… The victim attempts to reach Microsoft, or receives a link like http://go.microsoft.com/?linkid=9480113 and if you go there on a normal computer, you see a page like this (click to enlarge)… ...

Continue Reading Microsoft Hack

Beware of fake Microsoft updates coming through email

  • Post author: Omid Farhang
  • Post published: December 9, 2009
  • Reading Time: 3 min
  • Word Count: 488 words

Email is still the most common method used for security update notifications from all major vendors, but it is also the most commonly used trigger for launching the chain of infection attacks by malware writers. When I came to work today I found in my Inbox a message from Microsoft with the Security Bulletin Advance Notification for December. I immediately clicked on one of the links to visit the yet to be published December Security Bulletin and investigate how many critical vulnerabilities will be fixed this month. ...

Continue Reading Beware of fake Microsoft updates coming through email

Check for Windows Updates

  • Post author: Omid Farhang
  • Post published: January 13, 2009
  • Reading Time: 1 min
  • Word Count: 47 words

3 Step to make sure your windows is fully updated and patched to have fast, stable and secure windows: Update windows, office and other Microsoft products automatically:Ā Microsoft Update Check for update for common windows programs:Ā FileHippo.com Update Checker Check if you have insecure program usingĀ Secunia

Continue Reading Check for Windows Updates

Cleanup Windows Hard Disk

  • Post author: Omid Farhang
  • Post published: January 13, 2009
  • Reading Time: 3 min
  • Word Count: 509 words

The Disk Cleanup tool helps you free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files. Why Cleanup Remove temporary Internet files. Remove downloaded program files (such as Microsoft ActiveX controls and Java applets). Empty the Recycle Bin. Remove Windows temporary files such as error reports. Remove optional Windows components that you don’t use. Remove installed programs that you no longer use. Remove unused restore points and shadow copies from System Restore. Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later. ...

Continue Reading Cleanup Windows Hard Disk