New threats mean brushing up on new protections
Malware can be nasty for many reasons, the most obvious is that it can slow down your computer or make it vulnerable for other tools to infect your system.
At its worst it’s nothing more than a heavy spam tool, but at its best you end up with something a little closer to ransomware.
Ransomware – if you’re not already familiar – is a type of malware that holds your computer hostage. It restricts access to certain apps, system tools, or websites and then demands the user pay a fee (ransom) to have the malware removed.
For advanced users, ransomware is a nuisance and requires an hour or two – and special tools – to remove.
For casual users, ransomware can be downright horrifying. Especially, since some of the tactics used by these infections are intimidating.
For example, many forms of ransomware will lock you out of your computer, or the add/remove programs panel so that you cannot remove it the easy way. The most dangerous ransomware can encrypt your personal files – or hide them – so you cannot access the content until you pay the ransom.
Personal files affected can be anything from important business or tax documents to personal photos and videos.
As you’ve no doubt realized by now, ransomware is not something you want to encounter, but it happens – even to the most tech literate of folks. And it doesn’t help that it’s on the rise either.
There’s a lot you can do to prevent it, but in the event your computer is seized by ransomware, there are steps you can take to remove it, as well. If you do find yourself face to face with an infected computer, it’s important not to panic, and be sure to review the resources we have provided below.
How do computers get infected?
Because ransomware is a form of malware, it can infect computers in the same way.
- Download: Most people think they are safe if they don’t download files or content often but that’s not necessarily true. One of the most common ways for malware and ransomware to get onto a computer is that it’s downloaded by one of the users. This can even be done unknowingly, after you click a malicious advertisement, link, or even interact with a pop-up.
- Exploits: This type of infection is less common, but it does happen. Some malware can infect machines by getting past security vulnerabilities in apps, virus software, or the operating system. The most common form of exploit infection comes from web browsers and web applications such as Flash.
- Email: With email infections, you still need to click on a link or download a file. That is why you should always be careful when opening emails – especially from people you don’t know. Regardless, hackers can embed an infected file or link in an email that attacks as soon as you interact with it.
- Phishing: Phishing is when hackers create a web form or site that looks identical to an official one. You access the site by accident by following an email or web link and are tricked into submitting your login details and personal info. These types of sites can also be used to trick you into downloading ransomware after you let your guard down thinking they are safe to browse.
How to protect yourself and your computer
One the best ways to protect yourself from malware and ransomware is preventative maintenance. That is, you should be carrying out these tasks on a regular basis before something happens.
- Create Data Backups: Whether you backup your personal or business related content to a cloud account or another local drive matters little. Heck, if you have the opportunity do both. What matters is that you are making frequent backups, especially of your important documents. In the event your computer is infected by ransomware, you will likely lose some amount of data so it’s best to have everything backed up. This also protects you from the occasional hardware failure too, which is known to happen.
- Keep Everything Up-to-Date: You’ll want to keep all your applications, operating systems, security tools, and anything else you use up-to-date (especially your web browser). Not only does this take care of bugs and performance issues, but also security problems that developers patch out.
- Secure Your Computer: Use anti-virus and malware software to protect your computer from harm. As mentioned in the step above, always keep your security tools up-to-date, as well.
- Avoid Suspicious Links, Ads, and Attachments: Sometimes, you make a mistake and click on the wrong page element or open an attachment you didn’t mean to. It happens to the best of us. Still, you should always do what you can to avoid anything suspicious. Avoid emails with attachments from people you don’t know. Double check emails for phishing links even if it’s a company you trust. Avoid suspicious websites, especially ones that use pop-up ads. Most importantly, just use common sense to avoid bad areas of the internet.
Under no circumstances should you ever pay money to remove ransomware or malware. If you don’t know what to do, enlist help from a professional.
There is no guarantee the malware author will restore your computer, files, or apps even after you pay. They may even try to extort more money out of you if you do so.
What to do when you get infected
If your computer has been infected, do the following immediately:
- Disconnect your computer from the network or disable internet access. This will prevent the infection from spreading. It will also prevent the ransomware from making things worse in some cases.
- If you have a recent system restore point – from before the malware appeared, obviously – then give that a try. If you have recent backups of your data, then just format your operating system and conduct a clean reinstall of Windows. Many people choose not to do this, but it’s really the best – and safest – option.
- Boot into safe mode and run your anti-virus software to remove the infection. Most virus tools include an option to conduct a boot scan, which will remove infected content before booting into Windows. Use this option if it’s available.
- Download the EMSIsoft Emergency Kit scanner on another computer and move it to a portable flash drive. Important:Before using the tool on the infected computer, run it on a computer that has internet accessso it can update the database.
- If your files were encrypted or hidden by the ransomware – use this site to identify what type of malware you encountered. Once you identify the malware, you can find a decrypting tool to restore your files or locked data.
Are there any other tools I can use?
Alternate tools to fight off a computer infection include:
- MalwareBytes Anti-Malware
- MalwareBytes Anti-Ransomware
- Kaspersky TDSSKiller – Rootkit removal tool
- Kaspersky WindowsUnlocker
- IObit Malware Fighter
- McAfee Stinger
4 ways startups prove their investment in upcoming technology trends
(TECH NEWS) Want to see into the future? Just take a look at what technology the tech field is exploring and investing in today — that’s the stuff that will make up the world of tomorrow.
Big companies scout like for small ones that have proven ideas and prototypes, rather than take the initial risk on themselves. So startups have to stay ahead of technology by their very nature, in order to be stand-out candidates when selling their ideas to investors.
Innovation Leader, in partnership with KPMG LLP, recently conducted a study that sheds light onto the bleeding edge of tech: The technologies that the biggest companies are most interested in building right now.
The study asked its respondents to group 16 technologies into four categorical buckets, which Innovation Leader CEO Scott Kirsner refers to as “commitment level.”
The highest commitment level, “in-market or accelerating investment,” basically means that technology is already mainstream. For optimum tech-clairvoyance, keep your eyes on the technologies which land in the middle of the ranking.
“Investing or piloting” represents the second-highest commitment level – that means they have offerings that are approaching market-readiness.
The standout in this category is Advanced Analytics. That’s a pretty vague title, but it generally refers to the automated interpretation and prediction on data sets, and has overlap with Machine learning.
Wearables, on the other hand, are self explanatory. From smart watches to location trackers for children, these devices often pick up on input from the body, such heart rate.
The “Internet of Things” is finding new and improved ways to embed sensor and network capabilities into objects within the home, the workplace, and the world at large. (Hopefully that doesn’t mean anyone’s out there trying to reinvent Juicero, though.)
Collaboration tools and cloud computing also land on this list. That’s no shock, given the continuous pandemic.
The next tier is “learning and exploring”— that represents lower commitment, but a high level of curiosity. These technologies will take a longer time to become common, but only because they have an abundance of unexplored potential.
Blockchain was the highest ranked under this category. Not surprising, considering it’s the OG of making people go “wait, what?”
Augmented & virtual reality has been hyped up particularly hard recently and is in high demand (again, due to the pandemic forcing us to seek new ways to interact without human contact.)
And notably, AI & machine learning appears on rankings for both second and third commitment levels, indicating it’s possibly in transition between these categories.
The lowest level is “not exploring or investing,” which represents little to no interest.
Quantum computing is the standout selection for this category of technology. But there’s reason to believe that it, too, is just waiting for the right breakthroughs to happen.
Internet of Things and deep learning: How your devices are getting smarter
(TECH NEWS) The latest neural network from Massachusetts Institute of Technology shows a great bound forward for deep learning and the “Internet of Things.”
The deep learning that modifies your social media and gives you Google search results is coming to your thermostat.
Researchers at the Massachusetts Institute of Technology (MIT) have developed a deep learning system of neural networks that can be used in the “Internet of Things” (IoT). Named MCUNet, the system designs small neural networks that allow for previously unseen speed and accuracy for deep learning on IoT devices. Benefits of the system include energy savings and improved data security for devices.
Created in the early 1980s, the IoT is essentially a large group of everyday household objects that have become increasingly connected through the internet. They include smart fridges, wearable heart monitors, thermostats, and other “smart” devices. These gadgets run on microcontrollers, or computer chips with no processing system, that have very little processing power and memory. This has traditionally made it hard for deep learning to occur on IoT devices.
“How do we deploy neural nets directly on these tiny devices? It’s a new research area that’s getting very hot,” said Song Han, Assistant Professor of Computer Science at MIT who is a part of the project, “Companies like Google and ARM are all working in this direction.”
In order to achieve deep learning for IoT connected machines, Han’s group designed two specific components. The first is TinyEngine, an inference engine that directs resource management similar to an operating system would. The other is Tiny NAS, a neural architecture search algorithm. For those not well-versed in such technical terms, think of these things like a mini Windows 10 and machine learning for that smart fridge you own.
The results of these new components are promising. According to Han, MCUNet could become the new industry standard, stating that “It has huge potential.” He envisions the system has one that could help smartwatches not just monitor heartbeat and blood pressure but help analyze and explain to users what that means. It could also lead to making IoT devices far more secure than they are currently.
“A key advantage is preserving privacy,” says Han. “You don’t need to transmit the data to the cloud.”
It will still be a while until we see smart devices with deep learning capabilities, but it is all but inevitable at this point—the future we’ve all heard about is definitely on the horizon.
Google is giving back some privacy control? (You read that right)
(TECH NEWS) In a bizarre twist, Google is giving you the option to opt out of data collection – for real this time.
It’s strange to hear “Google” and “privacy” in the same sentence without “concerns” following along, yet here we are. In a twist that’s definitely not related to various controversies involving the tech company, Google is giving back some control over data sharing—even if it isn’t much.
Starting soon, you will be able to opt out of Google’s data-reliant “smart” features (Smart Compose and Smart Reply) across the G-Suite of pertinent products: Gmail, Chat, and Meet. Opting out would, in this case, prevent Google from using your data to formulate responses based on your previous activity; it would also turn off the “smart” features.
One might observe that users have had the option to turn off “smart” features before, but doing so didn’t disable Google’s data collection—just the features themselves. For Google to include the option to opt out of data collection completely is relatively unprecedented—and perhaps exactly what people have been clamoring for on the heels of recent lawsuits against the tech giant.
In addition to being able to close off “smart” features, Google will also allow you to opt out of data collection for things like the Google Assistant, Google Maps, and other Google-related services that lean into your Gmail Inbox, Meet, and Chat activity. Since Google knowing what your favorite restaurant is or when to recommend tickets to you can be unnerving, this is a welcome change of pace.
Keep in mind that opting out of data collection for “smart” features will automatically disable other “smart” options from Google, including those Assistant reminders and customized Maps. At the time of this writing, Google has made it clear that you can’t opt out of one and keep the other—while you can go back and toggle on data collection again, you won’t be able to use these features without Google analyzing your Meet, Chat, and Gmail contents and behavior.
It will be interesting to see what the short-term ramifications of this decision are. If Google stops collecting data for a small period of time at your request and then you turn back on the “smart” features that use said data, will the predictive text and suggestions suffer? Only time will tell. For now, keep an eye out for this updated privacy option—it should be rolling out in the next few weeks.
Opinion Editorials2 weeks ago
Improve UX design by tracking your users’ eye movements
Business News2 weeks ago
Movie theaters explore renting out their space to survive COVID
Business News2 weeks ago
Driverless delivery startup raises half a billion dollars to transport local goods
Tech News5 days ago
Internet of Things and deep learning: How your devices are getting smarter
Tech News2 weeks ago
First wireless, now headphoneless headphones? Enter, Soundbeamer
Tech News2 weeks ago
Microsoft engineer *almost* gets away with $10 million
Business Marketing2 weeks ago
This new Chipotle location will be fully digital
Opinion Editorials2 weeks ago
COVID-19 and mask mandates: What we can and can’t control