Categories
Editorials and informational articles

Three reasons why I use Brave Browser for Android

YouTube in the background + Adblocker + Chrome + Lion Icon + Android = Brave Browser.

While I am an old Mozilla and FOSS software fan, I never enjoyed their browser on my Android device, so I used Opera a period and then Chrome. Since I have received the Android 8.0 Oreo upgrade on my Nexus 5x, I was not able to use the Suamp music player anymore and so, I needed to look for an alternative that permitted me to minimize the app I used for listening music on YouTube.

The quest has ended when i stumbled upon Brave Browser, a free Chromium-based, cross-platform browser that uses a lion on its icon.

I like Brave Browser for three reasons:

  • it allows you to minimize the browser or to close the screen and to still listen to music on YouTube or other streaming services – this has to be enabled from Settings -> Site Settings -> Media -> video in background – enable.
  • it has an integrated adblocking module – malwaretising is replaced with Brave ads, but the browser splits the money received from ads with the developers, the site the ad is displayed, the sponsors and the users, which can donate the money to their favorite bloggers or youtubers.
  • it uses the Chrome engine, which is the best browser engine for Android (personal opinion)

Besides this, the browser has a HTTPS everywhere module integrated, which switches to the HTTPS versions of the sites, if they are available.

I am using the Brave Browser on both my Nexus 5x and my Samsung J5 and it works like a charm. I have decided to test it after reading this article on KnowYourMobile. The browser can be downloaded for free for Windows, Mac OS X and Linux from the official site and is available of Google Play Store and Apple iTunes, for mobile devices.

Categories
Editorials and informational articles Security solutions and antivirus software

The Ultimate Guide For Protecting Yourself From Malicious CPU Minigolf Websites

Lately, the crypto currency mining has risen a lot. Many malicious sites have started using the CPU to mine for Monero bitcoin, similar to what PirateBay did until they were caught. Also, the Trend Micro team has discovered Digmine, a crypto malware that spreads through Facebook Messenger and infects the systems with Monero miners.

The virus spreads via Facebook Messenger, when the malicious videos are opened in the Chrome browser, allowing the hackers to access the infected account and spread the malware to other friends from the list.

The Opera developers have already added a NoCoin feature starting with Opera 50, which blocks all the malicious CPU miners.

Instructions for protecting yourself against CPU minors:

Add an anti-mining extension:

To protect your computer against this type of threats, you should use one of the anti-mining extensions available for either Chrome or Firefox. The software works like an adblocker software, but prevents only the malicious sites from mining.

Anti-mining extensions for Firefox: MiningBlocking, NoCoin, AntiMiner, CoinBlock and others.

Anti-mining extensions for Chrome: NoCoin, MinorBlock, AntiMiner and others.

Add the NoCoin list to your current adblocking software:

You can add the NoCoin list to AdBlocker Plus, AdGuard, uBlock and other adblocking services. The easiest way to do that is to access FilterLists, scroll till you find NoCoin and press the Add button to implement the list.

To manually add the NoCoin list in uBlock, you need to access the Dashboard from the addon menu, go to the 3rd-party filters and add the below link:

https://raw.githubusercontent.com/uBlockOrigin/uAssets/master/filters/resource-abuse.txt

To add the NoCoin list in Adblock Plus, you need to access Options, go to Add your own list and add the below link:

https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/nocoin.txt

To add the NoCoin list in AdGuard, you need to access Options, go to User Filter and add the content of the file in the field (the content of the file, not the link):

https://raw.githubusercontent.com/hoshsadiq/adblock-nocoin-list/master/nocoin.txt

Restrict the access from the hosts file:

You need to add in the C:\Windows\System32\drivers\etc\hosts file the below line:

0.0.0.0 coin-hive.com

Power users can create  custon DNS or adblocker by using a Linux system (or a Raspberry Pi), to add in a list all the sites you don’t want to get resolved and set the device as DNS server.

It is enough to use only one of the methods above to protect yourself from malicious mining.

Categories
Editorials and informational articles Security solutions and antivirus software

OSArmor Is An Anti Exploit Free Software That Blocks Malicious Processes From Running

As you may know, OSArmor is a free anti exploit software that stays in the Windows Tray and protects the computer against auto executable scripts. The software has been designed by the NoVirus Thanks and is officially supported on Windows 7, Windows 8.1 and Windows 10.

Main features:

  • Block execution of pif, com and double file extensions.
  • Block USB spreading malware.
  • Prevent “important” system modifications via bcedit.exe.
  • Block direct execution of scripts and exe files from archives.
  • Prevent regsrv32 from executing remote scripts and /i: parameter.
  • Block processes executed from wscript.exe, cscript.exe, mshta.exe and wmic.exe.
  • Block executionpolicy bypass and windowstyle hidden in PowerShell.
  • Block remote URL downloads from the command line.
  • Block direct execution of JavaScript and VBscript code.
  • Limit Windows Screensaver files to Windows folder.
  • Block execution of schtasks.exe.

After the application has been installed, the configuration parameters can be modified via File -> Open Configurator. If you ask me, the default settings are enough for regular users. For extra security, the software can block running apps from Local AppData, Roaming AppData, Common AppData, but I do not recommend this setting for regular users, do to the fact that it may break some programs.

Also, it can be configured to block apps created by NirSofer, VNC software and LogMeIn, software which is commonly used by IT support specialists.

Tjhe interface is simple and clean and displays the number of blocked processes, the last blocked process and the date and time when the process was blocked. If you need to perform troubleshooting, you can read the logs.

When this article was written, the latest version available was OSArmor 1.3. The software can be downloaded for free from here.

I have toyed a little with OSArmor and decided to keep it installed on the system.

OSArmor Is An Anti Exploit Free Software That Blocks Malicious Processes From Running

OSArmor Is An Anti Exploit Free Software That Blocks Malicious Processes From Running

OSArmor Is An Anti Exploit Free Software That Blocks Malicious Processes From Running

OSArmor Is An Anti Exploit Free Software That Blocks Malicious Processes From Running

Categories
Editorials and informational articles Security solutions and antivirus software

Opera 50 NoCoin Feature Will Prevent Malicious Sites From Performing CPU Bitcoin Mining

Starting with Opera 50 stable, the Chromium based internet browser will receive two awesome changes: enhanced VPN service, which will be using the Opera data centers instead of the SurfEasy LLC ones used in the present and a new function called NoCoin, designed to block websites from performing CPU mining while you navigate on the internet.

The revised VPN function:

Starting with the new VPN function, Canada, US, Germany, Netherlands and Singapore will be replaced with Europe, America and Asia. Despite this, the functionality will remain the same.

If you don’t know this yet, the VPN feature can be enabled by going to the Settings menu (ALT + P) -> Privacy and Security – Enable VPN.

NoCoin – the anti mining service:

The NoCoin feature forbids the websites to perform malicious CPU mining while you navigate on the internet. For this to work, you need to also enable the built-in Opera adblocker and along with it, the NoCoin gets also activated (but can be disabled by user, if needed).

Basically, the NoCoin feature is just a list of malicious websites that get blocked by the adblocker.

So, if you want to enable both the built-in adblocker and NoCoin, you need to go to the Settings Menu (ALT + P) -> Block Ads.

Funcționalitatea antibitcoin nu permite siteurilor infectate sa mineze monede virtuale și să folosească putere de procesare în plus, in timpul navigării pe internet. Funcția este foarte bună și cred că va fi repede adoptată de celelalte browsere. Pentru ca noua funcție să funcționeze (și să apară în opțiuni), e nevoie să se activeze și mecanismul integrat adblocker.

The NoCoin function will be included in the stable version of Opera 50, but it is already present in both Opera 50 Beta and Opera 51 Dev.

For more information, see this article from the official Opera Blog.

Like usual, Opera is the browser that implements new features the fastest. The NoCoin feature should be adopted quickly to by the other internet browsers as well.

Opera 50 NoCoin Feature Will Prevent Malicious Sites From Performing CPU Bitcoin Mining

Opera 50 NoCoin Feature Will Prevent Malicious Sites From Performing CPU Bitcoin Mining

 

Categories
News

How To Remove The Troubleshooter Malware That Generates Fake BSODs And Asks Users To Buy A Non Existent Windows Defender AV

According to Myce, the security researchers from Malwarebytes have discovered a malware called Troubleshooter, which generates fake Blue Screen of Deaths (BSODs) and asks the user to buy Windows Defender Essentials (fake Windows Defender version) to clean the computer.

The malware inserts a BSOD image and disables the key combinations that permit the user to close the windows (e.g. ALT+F4) and asks for 25$ on Paypal, for buying the fake version of Win Defender.

How To Remove The Troubleshooter Malware That Generate Fake BSODs And Asks Users To Buy A Non Existent Windows Defender AV

How To Remove The Troubleshooter Malware That Generate Fake BSODs And Asks Users To Buy A Non Existent Windows Defender AV

How To Remove The Troubleshooter Malware That Generate Fake BSODs And Asks Users To Buy A Non Existent Windows Defender AV

A security researcher found out that if the user pays for the fake software, the website http://hitechnovation.com/thankyou.txt gets opened and the malware kills himself. If you get in this situation, just use the CTRL + O combination and navigate to the website yourself (without paying the ransom).

Apparently, this type of malware spreads with cracked software, so if you are a good samaritan and use only genuine software or open-source alternatives, you should be safe.

To remove this software completely, you need to reboot in safe mode, delete the Troubleshooter.exe file from %temp%, disable the csrvc service and scan your computer with Malwarebytes. More detailed instructions can be found on this Malwarebytes forum thread.