<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>A1 Computer Repair</title>
	<atom:link href="https://a1computerrepair.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://a1computerrepair.com/</link>
	<description>Computer Services</description>
	<lastBuildDate>Mon, 25 Jul 2022 19:26:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Windows 11 Update, how to upgrade your computer</title>
		<link>https://a1computerrepair.com/windows-11-update/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 11 Jun 2022 17:08:31 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[Computer Tips]]></category>
		<category><![CDATA[windows tips]]></category>
		<category><![CDATA[windows upgrade]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=2269</guid>

					<description><![CDATA[<p>How we update Windows 10 to Windows 11. There are a couple of methods but this is the method we use for all Windows upgrades here in our shop. How to update to Windows 11 You will need a good internet connection and a bank 8GB USB drive or larger. If you are upgrading a [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/windows-11-update/">Windows 11 Update, how to upgrade your computer</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>How we update Windows 10 to Windows 11. There are a couple of methods but this is the method we use for all Windows upgrades here in our shop.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img fetchpriority="high" decoding="async" width="450" height="253" src="https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update-450x253.jpg" alt="How to update to Windows 11" class="wp-image-2271" srcset="https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update-450x253.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update-250x141.jpg 250w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update-768x432.jpg 768w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update-1536x864.jpg 1536w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows-11-update.jpg 1920w" sizes="(max-width: 450px) 100vw, 450px" /><figcaption>How to update to Windows 11</figcaption></figure></div>


<p>How to update to Windows 11</p>



<p>You will need a good internet connection and a bank 8GB USB drive or larger. If you are upgrading a laptop, make sure it is plugged in and not running on battery only.</p>



<p>Download Windows 11 and select <a href="https://www.microsoft.com/software-download/windows11">Create Windows 11 Installation Media</a></p>



<p>Plug your blank USB into your computer and then click on the Windows 11 installer and select create a USB installer. This will take a while, just follow the instruction, they are self-explanatory. </p>



<p>In the shop, we perform a <a href="https://a1computerrepair.com/computer-services/full-tune-up/">full tuneup</a> and a full backup prior to updating to Windows 11 but since you probably will not have the equipment for that you need to at least uninstall old programs you no longer use and optimize your hard drives, and backup your computer.</p>



<p>Now to perform your Windows 11 update, after creating your backup, reboot your computer and plug in your Windows 11 installer USB.  Click on the setup.exe like the image below.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img decoding="async" src="https://a1computerrepair.com/wp-content/uploads/2022/06/windows11usb-450x169.jpg" alt="Windows 11 USB installer" class="wp-image-2270" width="450" height="169" srcset="https://a1computerrepair.com/wp-content/uploads/2022/06/windows11usb-450x169.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows11usb-250x94.jpg 250w, https://a1computerrepair.com/wp-content/uploads/2022/06/windows11usb.jpg 632w" sizes="(max-width: 450px) 100vw, 450px" /><figcaption>Windows 11 USB Installer</figcaption></figure></div>


<p>Now just follow the USB installer directions and your Windows 10 computer will be updated to Windows 11. </p>
<p>The post <a href="https://a1computerrepair.com/windows-11-update/">Windows 11 Update, how to upgrade your computer</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Audacity 3.0 called spyware over data collection changes</title>
		<link>https://a1computerrepair.com/audacity-3-0-called-spyware-over-data-collection-changes-by-new-owner/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 05 Jul 2021 18:58:28 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1855</guid>

					<description><![CDATA[<p>Audacity, the well-known open-source audio-editing software, has been called spyware in a report, with privacy policy changes revealing the tool is collecting data on its users and sharing it with other firms, as well as sending the data to Russia. Audacity was acquired by Muse Group in May, a company that also controls Ultimate Guitar, [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/audacity-3-0-called-spyware-over-data-collection-changes-by-new-owner/">Audacity 3.0 called spyware over data collection changes</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter"><img decoding="async" src="https://a1computerrepair.com/wp-content/uploads/2021/07/audacity-e1625511350372.jpg" alt="Audacity 3.0 called spyware" class="wp-image-1856"/></figure></div>


<p>Audacity, the well-known open-source audio-editing software, has been called spyware in a report, with privacy policy changes revealing the tool is collecting data on its users and sharing it with other firms, as well as sending the data to Russia.<br></p>



<p>Audacity was acquired by Muse Group in May, a company that also controls Ultimate Guitar, MuseScore, and Tonebridge. Since the purchase of Audacity, changes have been discovered in online support documents indicating that it is being used to perform data collection on its users.</p>



<p><a href="https://appleinsider.com/articles/21/07/04/open-source-audacity-deemed-spyware-over-data-collection-changes" target="_blank" rel="noreferrer noopener nofollow">Read More</a></p>
<p>The post <a href="https://a1computerrepair.com/audacity-3-0-called-spyware-over-data-collection-changes-by-new-owner/">Audacity 3.0 called spyware over data collection changes</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bad Android Apps Removed From Play Store, Uninstall Now</title>
		<link>https://a1computerrepair.com/bad-android-apps-removed-from-play-store-uninstall-these-now/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 07 Nov 2019 20:39:23 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[bad apps]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1779</guid>

					<description><![CDATA[<p>Updated: Google has confirmed that another set of Play Store apps have now been removed after they were found to be infecting devices with malware. Any users with those apps installed should ensure they are uninstalled from their devices. The seven apps are designed to open backdoors onto an infected device, pulling separate malware apps [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/bad-android-apps-removed-from-play-store-uninstall-these-now/">Bad Android Apps Removed From Play Store, Uninstall Now</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Updated: </em>Google has confirmed that another set of Play Store apps have now been removed after they were found to be infecting devices with malware. Any users with those apps installed should ensure they are uninstalled from their devices. The seven apps are designed to open backdoors onto an infected device, pulling separate malware apps from elsewhere, circumventing Play Store security. When those apps are downloaded and installed, they hide away from users who don’t even realize they&#8217;ve been brought onto their phones. The malicious intent of the latest malware-laced apps is ad fraud , but there is a more dangerous threat lurking behind.</p>



<figure class="wp-block-image"><a href="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/bad-aps.jpg?iv=204"><img decoding="async" src="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/bad-aps_thumb.jpg?iv=204" alt="Bad Android Apps" title="Bad Android Apps"/></a></figure>



<p>This latest warning comes just as as Google announced an “<a href="https://developers.google.com/android/play-protect/app-defense-alliance" target="_blank" rel="noreferrer noopener nofollow">App Defense Alliance</a>” to “ensure the safety of the Play Store.” The seven apps, discovered by the threat research team at <a href="https://www.wandera.com/" target="_blank" rel="noreferrer noopener nofollow">Wandera</a>, do not contain ad fraud malware themselves. Instead they are dropper apps—they download malware “payload” apps and install them onto target devices. This leaves the user with both the dropper app and the payload app installed. Both need to be identified and deleted. The dropper apps bypass store security to bring in threats from outside the ecosystem.</p>



<p>These dropper apps pull the malware payloads from Github, and Wandera VP Michael Covington told me the team was escalating details about the apps “because the backdoor introduced via the dropper code is a significant risk for anyone using these apps—given the obfuscation techniques in use, we have not yet ruled out other apps that may be using similar techniques to introduce unsanctioned code.”</p>



<p><strong>Continue Reading</strong></p>
<p>The post <a href="https://a1computerrepair.com/bad-android-apps-removed-from-play-store-uninstall-these-now/">Bad Android Apps Removed From Play Store, Uninstall Now</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trend Micro insider sold 120,000 records to scammers</title>
		<link>https://a1computerrepair.com/trend-micro-insider-sold-120000-customer-records-to-scammers/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 07 Nov 2019 06:14:53 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[scammers]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1774</guid>

					<description><![CDATA[<p>Trend Micro today revealed one of its staff went rogue and illegally sold the personal information of roughly 120,000 of its customers. The security software vendor said names, email addresses, ticket support numbers, and in some cases phone numbers, of around one per cent of Trend&#8217;s 12 million customers, were copied from an internal database [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/trend-micro-insider-sold-120000-customer-records-to-scammers/">Trend Micro insider sold 120,000 records to scammers</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Trend Micro today revealed one of its staff went rogue and illegally sold the personal information of roughly 120,000 of its customers.</p>



<p><a href="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/trend-micro.jpg?iv=204" target="_blank" rel="noreferrer noopener nofollow"><img decoding="async" title="trend micro" style="margin: 2px 12px 0px 5px; float: left; display: inline; background-image: none;" src="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/trend-micro_thumb.jpg?iv=204" alt="trend micro" width="199" height="260" border="0" align="left"></a><a href="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/trend-micro.jpg?iv=204"><br></a>The security software vendor said names, email addresses, ticket support numbers, and in some cases phone numbers, of around one per cent of Trend&#8217;s 12 million customers, were copied from an internal database by the worker and sold off to an outside scammer.</p>



<p>Payment card details are not believed to have been accessed, nor were any details from government or enterprise customer accounts, we&#8217;re told.</p>



<p>Trend said it caught wind the scheme back in August, when customers began to report receiving suspicious calls by people claiming to be Trend Micro support staff. After learning that the scammers seemed to know detailed information about the clients and their accounts, Trend started probing.</p>



<p>&#8220;We immediately started investigating the situation and found that this was the result of a malicious insider threat,&#8221; Team Trend said in announcing the leak. &#8220;The suspect was a Trend Micro employee who improperly accessed the data with a clear criminal intent.</p>



<p><strong><a href="http://bit.ly/32nnovI" target="_blank" rel="noreferrer noopener nofollow">Continue Reading</a></strong></p>
<p>The post <a href="https://a1computerrepair.com/trend-micro-insider-sold-120000-customer-records-to-scammers/">Trend Micro insider sold 120,000 records to scammers</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Updating your software makes you more secure</title>
		<link>https://a1computerrepair.com/updating-your-software-makes-you-more-secure/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 05 Nov 2019 02:33:52 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[windows updates]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1769</guid>

					<description><![CDATA[<p>“Keep your software updated!” is the closest thing we have to security advice that will work for everyone. But the reasoning behind it can be counterintuitive, and even quick updates can intolerably interrupt people’s workflows. Below are several common questions about why it is so important to update one’s software, as well as tips for [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/updating-your-software-makes-you-more-secure/">Updating your software makes you more secure</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>“Keep your software updated!” is the closest thing we have to security advice that will work for everyone. But the reasoning behind it can be counterintuitive, and even quick updates can intolerably interrupt people’s workflows. Below are several common questions about why it is so important to update one’s software, as well as tips for how to talk about it with people new to digital security.</p>



<figure class="wp-block-image"><a href="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/Software-update.jpg?iv=202"><img decoding="async" src="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2019/11/Software-update_thumb.jpg?iv=202" alt="Updating your software" title="Software-update"/></a></figure>



<h4 class="wp-block-heading">Updating your software makes you more expensive to hack.</h4>



<p>No software is perfect. Programmers make mistakes, best practices get updated, and security problems are discovered over time.</p>



<p>Sometimes, security researchers will discover security bugs and <em>not</em> report them to the developer. This kind of bug is called a “zero day” or “0-day,” because the company that could fix it does not know about it and has had “zero days” to address it. These kinds of bugs can be hard to find and expensive to purchase, and are sometimes used in targeted malware or phishing attacks on very high-value targets. Most people do not have to worry about these kinds of bugs.</p>



<p>More often, it will be amateur or professional security researchers, academics, or employees at the company itself who discover such problems, and report them back to the developers to get fixed. When that’s the case, the company can release updates (also known as “patches”) to correct the problem. If you update your software as soon as that pesky “Update!” notification pops up, you are staying current with the best available protections.</p>



<p><strong><a href="https://sec.eff.org/articles/software-updates" target="_blank" rel="noreferrer noopener nofollow">Read More</a></strong></p>
<p>The post <a href="https://a1computerrepair.com/updating-your-software-makes-you-more-secure/">Updating your software makes you more secure</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t fall for fake virus infection alerts</title>
		<link>https://a1computerrepair.com/fake-virus-infection-alerts/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 20 Sep 2019 03:59:26 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[Infecting]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Virus]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1754</guid>

					<description><![CDATA[<p>Two Americans used bogus virus-infection alerts to bilk $10m out of PC owners, it is alleged. Romana Leyva, 35, of Las Vegas, Nevada, and Ariful Haque, 33, of Bellerose, New York, were each charged this week with one count of wire fraud and conspiracy to commit wire fraud. Each count carries a maximum of 20 [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/fake-virus-infection-alerts/">Don&#8217;t fall for fake virus infection alerts</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Two Americans used bogus virus-infection alerts to bilk $10m out of PC owners, it is alleged.</p>



<p>Romana Leyva, 35, of Las Vegas, Nevada, and Ariful Haque, 33, of Bellerose, New York, were each charged this week with one count of wire fraud and conspiracy to commit wire fraud. Each count carries a maximum of 20 years in the clink.</p>


<div class="wp-block-image">
<figure class="alignleft"><img decoding="async" src="https://a1computerrepair.com/wp-content/uploads/2019/09/fake-virus-alerts-e1568951776760.jpg" alt="Don't fall for fake virus infection alerts" class="wp-image-1756"/></figure></div>


<p>According to prosecutors in southern New York, Leyva and Haque&nbsp;masterminded a classic tech-support scam that warned netizens their computers were infected with malware that didn&#8217;t actually exist and would need a costly, and yet entirely unnecessary, repair.</p>



<p>We all know this type of scam: phony &#8220;system alert&#8221; pop-up ads in web browsers that try to scare punters into believing their machine is riddled with spyware, along with a phone number to call for &#8220;tech support&#8221; or a repair service that costs an arm and a leg – and doesn&#8217;t actually do anything useful.</p>



<p>&#8220;In at least some instances, the pop-up threatened victims that, if they restarted or shut down their computer, it could cause serious damage to the system&#8217; including &#8216;complete data loss&#8217;,&#8221; the prosecution wrote in its court [PDF] paperwork.</p>



<p><a href="https://www.theregister.co.uk/2019/09/20/tech_support_charges/" target="_blank" rel="noreferrer noopener nofollow">Continue Reading at The Register</a></p>
<p>The post <a href="https://a1computerrepair.com/fake-virus-infection-alerts/">Don&#8217;t fall for fake virus infection alerts</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple Is Discouraging Repair by Locking iPhones</title>
		<link>https://a1computerrepair.com/apple-is-discouraging-repair-by-locking-iphone-batteries/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 Aug 2019 19:34:48 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1745</guid>

					<description><![CDATA[<p>By activating a dormant software lock on their newest iPhones, Apple is effectively announcing a drastic new policy: only Apple batteries can go in iPhones, and only they can install them. If you replace the battery in the newest iPhones, a message indicating you need to service your battery appears in Settings&#160; Battery, next to [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/apple-is-discouraging-repair-by-locking-iphone-batteries/">Apple Is Discouraging Repair by Locking iPhones</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>By activating a dormant software lock on their newest iPhones, Apple is effectively announcing a drastic new policy: only Apple batteries can go in iPhones, and only they can install them.</p>


<div class="wp-block-image">
<figure class="alignleft"><img decoding="async" src="https://a1computerrepair.com/wp-content/uploads/2019/08/iphone-battery-service-835x900-e1565810883797.jpg" alt="Apple Is Discouraging Repair by Locking iPhone Batteries" class="wp-image-1746"/></figure></div>


<p>If you replace the battery in the newest iPhones, a message indicating you need to service your battery appears in Settings&nbsp; Battery, next to Battery Health. The “Service” message is normally an indication that the battery is degraded and needs to be replaced. The message still shows up when you put in a brand new battery, however. Here’s the bigger problem: our lab tests confirmed that even when you swap in a genuine Apple battery, the phone will still display the “Service” message.</p>



<p>It’s not a bug; it’s a feature Apple wants. Unless an Apple Genius or an Apple Authorized Service Provider authenticates a battery to the phone, that phone will never show its battery health and always report a vague, ominous problem.</p>



<p><a href="https://www.ifixit.com/News/apple-is-locking-batteries-to-iphones-now" target="_blank" rel="noreferrer noopener nofollow">Continue Reading at iFixIt</a></p>
<p>The post <a href="https://a1computerrepair.com/apple-is-discouraging-repair-by-locking-iphone-batteries/">Apple Is Discouraging Repair by Locking iPhones</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Millions Exposed To Ads That Use Infected Images</title>
		<link>https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 08 Dec 2016 06:51:33 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[malvertising]]></category>
		<category><![CDATA[malware ads]]></category>
		<category><![CDATA[malware protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus protection]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1651</guid>

					<description><![CDATA[<p>Antivirus provider ESET released a report on Tuesday stating that its researchers have discovered malicious code residing within advertisements that are currently in rotation on many “reputable” news websites. Since the beginning of October, these malicious ads have been exposed to millions of web surfers who still use Microsoft’s Internet Explorer browser. According to the [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/">Millions Exposed To Ads That Use Infected Images</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Antivirus provider ESET <a href="https://www.eset.com/us/resources/detail/malicious-code-hides-in-pixels-of-advertising-banners-eset-uncovers-new-stegano-exploit-kit/" target="_blank" rel="noreferrer noopener nofollow">released a report on Tuesday</a> stating that its researchers have discovered malicious code residing within advertisements that are currently in rotation on many “reputable” news websites. Since the beginning of October, these malicious ads have been exposed to millions of web surfers who still use Microsoft’s Internet Explorer browser.</p>


<div class="wp-block-image">
<figure class="alignleft"><img loading="lazy" decoding="async" width="450" height="300" src="https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb.jpg" alt="Millions Exposed To Ads That Use Images Infected By Malicious Scripts" class="wp-image-1650" srcset="https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2016/12/imagemalware_thumb-250x167.jpg 250w" sizes="auto, (max-width: 450px) 100vw, 450px" /></figure></div>


<p>According to the report, the ads promote applications called “Browser Defense” and “Broxu.” What’s scary is that the actual graphic used in these ads contain malicious code buried within the parameters of their alpha channel, which is used to define the transparency of each pixel in images. By way of explanation, an alpha channel is what makes the background color of an image transparent so that the focused object can reside as an overlay against any backdrop image or color.</p>



<p>Adding the malicious script to an image’s alpha channel is only a minor modification. The resulting image has a slightly different tone than the original, but if web surfers have no idea what the originating image looks like, then they have no clue the altered, malicious version is on their screen. The sample provided by the ESET researchers is barely indistinguishable from the “clean” original.</p>



<p>Once the advertisement is displayed on the visitor’s screen, the embedded code uses the CVE-2016-0162 vulnerability in Internet Explorer to scan the target PC to see if it’s running on a malware analyst’s machine. If the coast is clear, it will then load a landing page that includes a Flash file built for exploiting three vulnerabilities in Flash Player: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.</p>



<p>“Upon successful exploitation, the executed shell code collects information on installed security products and performs — [in a manner] as paranoid as the cybercriminals behind this attack — yet another check to verify that it is not being monitored,” <a href="http://www.welivesecurity.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/" target="_blank" rel="noreferrer noopener nofollow">the antivirus firm reports</a>. “If results are favorable, it will attempt to download the encrypted payload from the same server again, disguised as a GIF image.”</p>



<p>When the encrypted payload is downloaded to the target PC, it is then decrypted and launched through regsvr32.exe or rundll32.exe in Microsoft Windows. The payloads detected thus far have included various trojan downloaders, banking trojans, backdoors, spyware, and “file stealers.”</p>



<p>The attack is based on the Stegano exploit kit, which uses steganography to hide malware out in plain sight. The term is typically used when hiding messages or information within public text and data. However, in this case, the method throws a malicious script within the alpha channel information of an image. The kit was first used in 2014 to target Dutch customers, and moved on to residents in the Czech Republic. New attacks are targeting web surfers in Australia, Britain, Canada, Italy, and Spain.</p>



<p>ESET senior malware researcher <a href="http://www.welivesecurity.com/2016/12/06/stegano-exploit-kit/" target="_blank" rel="noreferrer noopener nofollow">Robert Lipovsky pointed out in an interview</a> that web surfers aren’t required to do anything to trigger the malicious script: all they have to do is visit a website displaying the infected ad. The payloads aren’t random either: attackers choose what to download to the target PCs.</p>



<p>Lipovsky added that the firm didn’t release a list of websites affected by the malicious ads because the information didn’t add any value to the warning. Even more, the firm didn’t want to inflict reputational harm to the websites given that they had no clue or control over displaying the ads. Naturally, web surfers can stay safe by keeping their browser, Flash Player, and security software updated regularly.</p>



<p><a href="http://www.digitaltrends.com/computing/eset-malware-images-alpha-channel-browser-defense-broxu-stegano/" target="_blank" rel="noreferrer noopener nofollow"><span style="font-size: small;">http://www.digitaltrends.com/computing/eset-malware-images-alpha-channel-browser-defense-broxu-stegano/</span></a></p>
<p>The post <a href="https://a1computerrepair.com/millions-exposed-to-ads-that-use-images-infected-by-malicious-scripts/">Millions Exposed To Ads That Use Infected Images</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>414,949 D-Link cameras, IoT devices can be hijacked</title>
		<link>https://a1computerrepair.com/security-news-414949-d-link-cameras-iot-devices-can-be-hijacked-over-the-net/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 08 Jul 2016 23:07:25 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[d-link]]></category>
		<category><![CDATA[dlink]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hijacker]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1639</guid>

					<description><![CDATA[<p>Shodan has turned up half a million D-Link devices exposed to the internet, and subject to easy hijacking using zero-day vulnerabilities. The stack overflow vulnerabilities affect more than 120 D-Link products, from Wi-Fi cameras to routers and modems, and allow remote attackers to completely hijack the administer account of the devices to install backdoors and [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/security-news-414949-d-link-cameras-iot-devices-can-be-hijacked-over-the-net/">414,949 D-Link cameras, IoT devices can be hijacked</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Shodan has turned up half a million D-Link devices exposed to the internet, and subject to easy hijacking using zero-day vulnerabilities.</p>


<div class="wp-block-image">
<figure class="alignleft size-large is-resized"><img loading="lazy" decoding="async" src="https://a1computerrepair.com/wp-content/uploads/2022/05/dlinkcamerahack-450x253.jpg" alt="414,949 D-Link cameras, IoT devices can be hijacked over the net" class="wp-image-1998" width="338" height="190" srcset="https://a1computerrepair.com/wp-content/uploads/2022/05/dlinkcamerahack-450x253.jpg 450w, https://a1computerrepair.com/wp-content/uploads/2022/05/dlinkcamerahack-250x141.jpg 250w, https://a1computerrepair.com/wp-content/uploads/2022/05/dlinkcamerahack-768x432.jpg 768w, https://a1computerrepair.com/wp-content/uploads/2022/05/dlinkcamerahack.jpg 1027w" sizes="auto, (max-width: 338px) 100vw, 338px" /></figure></div>


<p>The stack overflow vulnerabilities <a href="https://dlink-report.shodan.io/" target="_blank" rel="noreferrer noopener nofollow">affect more than 120 D-Link products</a>, from Wi-Fi cameras to routers and modems, and allow remote attackers to completely hijack the administer account of the devices to install backdoors and intercept traffic.</p>



<p>D-Link has been contacted for comment.</p>



<p>It takes only one command to exploit the flaw, according to Senrio researchers who published a proof-of-concept that changed administrator passwords.</p>



<p>&#8220;&#8230; the Senrio research team discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera,&#8221; the researchers say.</p>



<p>&#8220;While the thought of strangers watching your sleeping baby is disturbing, the implications for enterprise and infrastructure environments are downright scary.&#8221;</p>



<p>Almost 140,000 of the devices are located in the US, with 23,442 in Canada, and 20,982 in Sweden.</p>



<p>Founder Stephen Ridley told <a href="http://www.securityweek.com/serious-vulnerability-affects-over-120-d-link-products" target="_blank" rel="noreferrer noopener nofollow">Security Week</a> attacking the 120-odd D-Link device models requires to exploit tweaking to suit different firmware.</p>



<p>&#8220;An attacker would practically account for this difference in versions [and] devices by fingerprinting a device, and then changing the exploit payload based on the target,&#8221; Ridley says.</p>



<p><a href="http://www.theregister.co.uk/2016/07/08/414949_dlink_cameras_iot_devices_can_be_hijacked_over_the_net/" target="_blank" rel="noreferrer noopener nofollow">http://www.theregister.co.uk/2016/07/08/414949_dlink_cameras_iot_devices_can_be_hijacked_over_the_net/</a></p>
<p>The post <a href="https://a1computerrepair.com/security-news-414949-d-link-cameras-iot-devices-can-be-hijacked-over-the-net/">414,949 D-Link cameras, IoT devices can be hijacked</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Uninstall QuickTime for Windows Today</title>
		<link>https://a1computerrepair.com/uninstall-quicktime-for-windows-today/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 07 May 2016 17:00:11 +0000</pubDate>
				<category><![CDATA[Tech Support Blog]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[quicktime]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows security]]></category>
		<guid isPermaLink="false">https://a1computerrepair.com/?p=1636</guid>

					<description><![CDATA[<p>TrendMicro is putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible. This is for two reasons. First, Apple is deprecating QuickTime for Microsoft Windows. They will no longer be issuing security updates for the product on the Windows Platform and recommend users uninstall it. Note [&#8230;]</p>
<p>The post <a href="https://a1computerrepair.com/uninstall-quicktime-for-windows-today/">Uninstall QuickTime for Windows Today</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2016/05/RemoveQuickTime.png?iv=69"><img loading="lazy" decoding="async" style="background-image: none; float: left; padding-top: 0px; padding-left: 0px; margin: 5px; display: inline; padding-right: 0px; border: 0px;" title="RemoveQuickTime" src="https://d2kxdfzqb0lula.cloudfront.net/wp-content/uploads/2016/05/RemoveQuickTime_thumb.png?iv=69" alt="RemoveQuickTime" width="320" height="352" border="0" align="left"></a>TrendMicro is putting the word out that everyone should follow Apple’s guidance and uninstall QuickTime for Windows as soon as possible.</p>



<p>This is for two reasons.</p>



<p>First, Apple is deprecating QuickTime for Microsoft Windows. They will no longer be issuing security updates for the product on the Windows Platform and recommend users uninstall it. Note that this does not apply to QuickTime on Mac OSX.</p>



<p>Second, our Zero Day Initiative has just released two advisories ZDI-16-241 and ZDI-16-242 detailing two new, critical vulnerabilities affecting QuickTime for Windows. These advisories are being released in accordance with the Zero Day Initiative’s Disclosure Policy for when a vendor does not issue a security patch for a disclosed vulnerability. And because Apple is no longer providing security updates for QuickTime on Windows, these vulnerabilities are never going to be patched.</p>



<p>We’re not aware of any active attacks against these vulnerabilities currently. But the only way to protect your Windows systems from potential attacks against these or other vulnerabilities in Apple QuickTime now is to uninstall it. In this regard, QuickTime for Windows now joins <a href="https://www.microsoft.com/en-us/WindowsForBusiness/end-of-xp-support" target="_blank" rel="noreferrer noopener nofollow">Microsoft Windows XP</a> and <a href="http://www.oracle.com/technetwork/java/eol-135779.html" target="_blank" rel="noreferrer noopener nofollow">Ora</a>cle Java 6 as software that is no longer being updated to fix vulnerabilities and is subject to ever-increasing risk as more and more unpatched vulnerabilities are found affecting it.</p>



<p>You can find information on how to uninstall Apple QuickTime for Windows from the Apple website here:<a href="https://support.apple.com/HT205771" target="_blank" rel="noreferrer noopener nofollow">https://support.apple.com/HT205771</a></p>



<p><a href="http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/" target="_blank" rel="noopener">Continue for </a><a href="http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/" target="_blank" rel="noreferrer noopener nofollow">F</a><a href="http://blog.trendmicro.com/urgent-call-action-uninstall-quicktime-windows-today/" target="_blank" rel="noopener">ull Article</a></p>
<p>The post <a href="https://a1computerrepair.com/uninstall-quicktime-for-windows-today/">Uninstall QuickTime for Windows Today</a> appeared first on <a href="https://a1computerrepair.com">A1 Computer Repair</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
