Hi Chad,
In windows 7, I am using Microsoft security essential as my main
protection, and Malware bytes as a second opinion; i.e., the live
protection is set to off.
Ub windows 8 I have AVG as my main protection.
In both computers I use spybot.
Here is a copy of my email to my family and friends which I sent
yesterday, which is urgent:
Aloha family and friends,
This only took me about 10 minutes. It should take you less.
Download and run the following:
http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp
You will need your ipaddress for all your computers on the network if
you have more
than one computer.
To do this
press window key plus the letter r
then type cmd and enter
then type ipconfig and enter
your address will look like 192.188.300.4
the router or modem will have the same number but ending in 1
Robins computer has the same number but ending with 6,
so I entered 192.188.300.1 and 192.188.300.6 for the range to be scanned.
You need to click on the result window and scroll to the end for the
results.
Here is a copy of our results:
Exploitable
Identified
0
0
Want to scan for more vulnerabilities? Download the free
Nexpose Community Edition
I passed the test.
CAN YOU?
If your results indicate that you are at risk,
than go to your network properties and disable the plug and play feature
found to
be at risk.
May The Force be with you,
Manny
I got this info from:
Warning: New Hack Threat Leaves Millions at Risk of Cyber Attack
Text Size
Published: Tuesday, 29 Jan 2013 | 1:11 PM ET
cyber-hacker-180.jpg
The U.S. Department of
Homeland Security
urged computer users on Tuesday to disable a common networking
technology feature,
after researchers warned that hackers could exploit flaws to gain access
to tens
of millions of vulnerable devices.
The U.S. government's Computer Emergency Readiness Team advised
consumers and businesses
to disable a feature known as Universal Plug and Play or UPnP, and some
other related
features that make devices from computers to
printers
accessible over the open Internet.
(
Read More
:
Pentagon in Major Expansion of Cybersecurity Force
)
UPnP is designed to let networks identify and communicate with
equipment, reducing
the amount of work it takes to set up networks. Dave Marcus, chief
architect of advanced
research and threat intelligence with Intel's McAfee unit, said hackers
would have
a "field day" once the vulnerability in network devices is exposed.
"Historically, these are amongst the last to be updated and protected
properly which
makes them a gold mine for potential abuse and exploitation," said
Marcus, who advises
government agencies and corporations on protections against
sophisticated attacks.
Computer security
company Rapid7 said in a white paper released on Tuesday that it
discovered between
40 million and 50 million devices that were vulnerable to attack due to
three separate
sets of problems that the firm's researchers have identified with the
UPnP standard.
(
Read More
:
Former US Spy Warns on Cybersecurity
)
The flaws could allow hackers to access confidential files, steal
passwords, take
full control over PCs as well as remotely access devices such as
webcams, printers
and
security systems
, according to Rapid7.
It has alerted electronics makers about the problem through the CERT
Coordination
Center, a group at the Carnegie Mellon
Software Engineering Institute
that helps researchers report vulnerabilities to affected companies.
Government Warns of Hack Threat to Network Gear
CNBC's Jon Fortt reports on a battle going on over cyber security
involving universal
plug & play technology. Apparently, a flaw in the protocol opens the
digital door
to hackers. Security experts are recommending users disable plug & play.
CERT in turn has tried to contact the more than 200 companies
identified, including
Belkin, D-Link, Cisco Systems Inc's Linksys division and Netgear.
Representatives for Belkin, D-Link, Linksys and Netgear did not
immediately responded
to requests for comment.
Chris Wysopal, chief technology officer of
security software
firm Veracode, said he believed that publication of Rapid7's findings
would draw
widespread attention to the still emerging area of UPnP security,
prompting other
security researchers to search for more bugs in UPnP.
(
Read More
:
Code Wars: America's Cyber Threat
)
"This definitely falls into the scary category," said Wysopal, who
reviewed Rapid7's
findings ahead of their publication. "There is going to be a lot more
research on
this. And the follow-on research could be a lot scarier."
A source with a major networking equipment maker confirmed on Monday
they had been
alerted to the problem, and that companies were preparing to respond.
"This is the most pervasive bug I've ever seen," said HD Moore, chief
technology
officer for Rapid7. He discussed the research with Reuters late on Monday.
Taking Control
Moore said that there were bugs in most of the devices he tested and
that device
manufacturers will need to release software updates to remedy the problems.
He said that is unlikely to happen quickly.
In the meantime, he advised computer users to quickly use a free tool
released by
Rapid7 to identify vulnerable gear, then disable the UPnP functionality
in that equipment.
Moore said hackers have not widely exploited the UPnP vulnerabilities to
launch attacks,
but both Moore and Wysopal expected they may start to do so after the
findings are
publicized.
Still, Moore said he decided to disclose the flaws in a bid to pressure
equipment
makers to fix the bugs and generally pay more attention to security.
People who own devices with UPnP enabled may not be aware of it because
new routers,
printers, media servers, Web cameras, storage drives and "smart" or
Web-connected
TVs are often shipped with that functionality turned on by default.
"You can't stay silent about something like this," he said. "These
devices seem to
have had the same level of core security for decades. Nobody seems to
really care
about them."
Veracode's Wysopal said that some hackers have likely already exploited
the flaws
to launch attacks, but in relatively small numbers, choosing victims one
at a time.
"If they are going after executives and government officials, then they
will probably
look for their home networks and exploit this vulnerability," he said.
Rapid7 has released a tool to help identify those devices on its website at
www.rapid7.com
checkout:
http://www.youtube.com/watch?v=75fbevlz10g
Good luck, Manny
checkout my stand-up comedy performance
http://www.youtube.com/watch?v=75fbevlz10g computer specifications:
Window Eyes 8 Dell xps420 with 8 gb memory c p u: Intel q6600 quad core
dual boot between Windows 7 64-bit and windows 8 64 bit all software and
drivers are up to date
On 2/5/2013 2:49 AM, chad baker wrote:
> hi is there any free antimalware removal programs
> i tried super antispyware but the latest version isn't accessible
> the installer is a bunch of check boxes which window eyes don't read
> thanks
> If you reply to this message it will be delivered to the original
sender only. If your reply would benefit others on the list and your
message is related to GW Micro, then please consider sending your
message to [email protected] so the entire list will receive it.
>
> GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You
can manage your list subscription at http://www.gwmicro.com/listserv.
>
>
>
If you reply to this message it will be delivered to the original sender only.
If your reply would benefit others on the list and your message is related to
GW Micro, then please consider sending your message to [email protected] so
the entire list will receive it.
GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You can manage
your list subscription at http://www.gwmicro.com/listserv.