<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PC Sympathy</title>
	<atom:link href="https://www.pcsympathy.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.pcsympathy.com/</link>
	<description>Your Source for PC News and Technical Support</description>
	<lastBuildDate>Sat, 20 Feb 2021 12:44:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">3183512</site>	<item>
		<title>How to Transfer Your LastPass Passwords to Bitwarden</title>
		<link>https://www.pcsympathy.com/2021/02/20/how-to-transfer-your-lastpass-passwords-to-bitwarden/</link>
					<comments>https://www.pcsympathy.com/2021/02/20/how-to-transfer-your-lastpass-passwords-to-bitwarden/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sat, 20 Feb 2021 12:43:13 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[bitwarden]]></category>
		<category><![CDATA[lastpass]]></category>
		<category><![CDATA[Open-source]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[two-factor authentication]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3556</guid>

					<description><![CDATA[Starting on March 16, 2021, LastPass is changing how its free plan works. You will no longer be able to use the desktop and mobile apps simultaneously. If you wish to use LastPass on your smartphone and your computer, you’ll need to pay for the company’s $3/month plan. Alternatively, you can switch to Bitwarden. Bitwarden [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Starting on March 16, 2021, LastPass is changing how its free plan works. You will no longer be able to use the desktop and mobile apps simultaneously. If you wish to use LastPass on your smartphone and your computer, you’ll need to pay for the company’s $3/month plan.</p>
<p>Alternatively, you can switch to Bitwarden. Bitwarden is a secure, open-source password manager that offers cross-device sync and unlimited password entries for free.</p>
<p>Bitwarden’s Premium plan only costs $10/year and gets you access to its two-factor authentication feature (including hardware keys support), emergency access, and 1GB encrypted storage. Bitwarden is available for every platform you can imagine. You can use its desktop app, browser extensions, mobile apps, web client, and even command-line tools.</p>
<p>Moving from LastPass to Bitwarden is actually quite easy. All you have to do is to generate a CSV file from your LastPass account that you can then import directly into Bitwarden.</p>
<p>Source:<br />
<a href="https://www.howtogeek.com/714518/how-to-transfer-your-lastpass-passwords-to-bitwarden/" target="_blank" rel="noopener">https://www.howtogeek.com/714518/how-to-transfer-your-lastpass-passwords-to-bitwarden/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2021/02/20/how-to-transfer-your-lastpass-passwords-to-bitwarden/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3556</post-id>	</item>
		<item>
		<title>Ziggy ransomware shuts down and releases victims&#8217; decryption keys</title>
		<link>https://www.pcsympathy.com/2021/02/07/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/</link>
					<comments>https://www.pcsympathy.com/2021/02/07/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sun, 07 Feb 2021 19:12:28 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[keys]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3551</guid>

					<description><![CDATA[The Ziggy ransomware operation has shut down and released the victims&#8217; decryption keys after concerns about recent law enforcement activity and guilt for encrypting victims. Over the weekend, security researcher M. Shahpasandi told BleepingComputer that the Ziggy Ransomware admin announced on Telegram that they were shutting down their operation and would be releasing all of the decryption keys. In [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Ziggy ransomware operation has shut down and released the victims&#8217; decryption keys after concerns about recent law enforcement activity and guilt for encrypting victims.</p>
<p>Over the weekend, security researcher M. Shahpasandi told BleepingComputer that the Ziggy Ransomware admin announced on Telegram that they were shutting down their operation and would be releasing all of the decryption keys.</p>
<p>In an interview with BleepingComputer, the ransomware admin said they created the ransomware to generate money as they live in a &#8220;third-world country.&#8221;</p>
<p>After feeling guilty about their actions and concerns over recent law enforcement operations against Emotet and Netwalker ransomware, the admin decided to shut down and release all of the keys.</p>
<p>Today, the Ziggy ransomware admin posted a SQL file containing 922 decryption keys for encrypted victims. For each victim, the SQL file lists three keys needed to decrypt their encrypted files.</p>
<p>Source:<br />
<a href="https://www.bleepingcomputer.com/news/security/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2021/02/07/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3551</post-id>	</item>
		<item>
		<title>New phishing attack uses Morse code to hide malicious URLs</title>
		<link>https://www.pcsympathy.com/2021/02/07/new-phishing-attack-uses-morse-code-to-hide-malicious-urls/</link>
					<comments>https://www.pcsympathy.com/2021/02/07/new-phishing-attack-uses-morse-code-to-hide-malicious-urls/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sun, 07 Feb 2021 16:40:53 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[attachment]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[encode]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3549</guid>

					<description><![CDATA[A new targeted phishing campaign includes the novel obfuscation technique of using Morse code to hide malicious URLs in an email attachment. Samuel Morse and Alfred Vail invented morse code as a way of transmitting messages across telegraph wire. When using Morse code, each letter and number is encoded as a series of dots (short [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A new targeted phishing campaign includes the novel obfuscation technique of using Morse code to hide malicious URLs in an email attachment.</p>
<p>Samuel Morse and Alfred Vail invented morse code as a way of transmitting messages across telegraph wire. When using Morse code, each letter and number is encoded as a series of dots (short sound) and dashes (long sound).</p>
<p>Starting last week, a threat actor began utilizing Morse code to hide malicious URLs in their phishing form to bypass secure mail gateways and mail filters.</p>
<p>BleepingComputer could not find any references to Morse code being used in phishing attacks in the past, making this a novel obfuscation technique.</p>
<p>Source:<br />
<a href="https://www.bleepingcomputer.com/news/security/new-phishing-attack-uses-morse-code-to-hide-malicious-urls/" target="_blank" rel="noopener">https://www.bleepingcomputer.com/news/security/new-phishing-attack-uses-morse-code-to-hide-malicious-urls/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2021/02/07/new-phishing-attack-uses-morse-code-to-hide-malicious-urls/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3549</post-id>	</item>
		<item>
		<title>Seven Common Microsoft Active Directory Misconfigurations that Adversaries Abuse</title>
		<link>https://www.pcsympathy.com/2021/02/07/seven-common-microsoft-active-directory-misconfigurations-that-adversaries-abuse/</link>
					<comments>https://www.pcsympathy.com/2021/02/07/seven-common-microsoft-active-directory-misconfigurations-that-adversaries-abuse/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sun, 07 Feb 2021 13:24:44 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Domain]]></category>
		<category><![CDATA[microsoft]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3547</guid>

					<description><![CDATA[The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate impact on business operations. Unfortunately, this operating model inevitably leads to unaddressed vulnerabilities and security misconfigurations in services and Active Directory. We’ll refer to these unknown vulnerabilities and misconfigurations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate impact on business operations. Unfortunately, this operating model inevitably leads to unaddressed vulnerabilities and security misconfigurations in services and Active Directory. We’ll refer to these unknown vulnerabilities and misconfigurations as “Skeletons in the IT Closet.” These skeletons are then leveraged by attackers to move laterally within a network and escalate privileges within the Active Directory domain.</p>
<p>In this blog, we explore seven of the most common system and Active Directory misconfigurations, how adversaries take advantage of them, and how IT and security teams can address them to strengthen their organization’s overall cybersecurity posture.</p>
<p>Source:<br />
<a href="https://www.crowdstrike.com/blog/seven-common-microsoft-ad-misconfigurations-that-adversaries-abuse/" target="_blank" rel="noopener">https://www.crowdstrike.com/blog/seven-common-microsoft-ad-misconfigurations-that-adversaries-abuse/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2021/02/07/seven-common-microsoft-active-directory-misconfigurations-that-adversaries-abuse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3547</post-id>	</item>
		<item>
		<title>Proof-of-concept exploits published for the Microsoft-NSA crypto bug</title>
		<link>https://www.pcsympathy.com/2020/01/16/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/</link>
					<comments>https://www.pcsympathy.com/2020/01/16/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Thu, 16 Jan 2020 11:06:39 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[man-in-the-middle]]></category>
		<category><![CDATA[mitm]]></category>
		<category><![CDATA[nsa]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3487</guid>

					<description><![CDATA[Security researchers have published earlier today proof-of-concept (PoC) code for exploiting a recently-patched vulnerability in the Windows operating system, a vulnerability that has been reported to Microsoft by the US National Security Agency (NSA). The bug, which some have started calling CurveBall, impacts CryptoAPI (Crypt32.dll), the component that handles cryptographic operations in the Windows OS. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have published earlier today proof-of-concept (PoC) code for exploiting a recently-patched vulnerability in the Windows operating system, a vulnerability that has been reported to Microsoft by the US National Security Agency (NSA).</p>



<p>The bug, which some have started calling CurveBall, impacts CryptoAPI (Crypt32.dll), the component that handles cryptographic operations in the Windows OS.</p>



<p>According to&nbsp;<a href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6" target="_blank" rel="noreferrer noopener">a high-level technical analysis</a>&nbsp;of the bug from cyber-security researcher Tal Be&#8217;ery, &#8220;the root cause of this vulnerability is a flawed implementation of the Elliptic Curve Cryptography (ECC) within Microsoft&#8217;s code.&#8221;</p>



<p>According to both the NSA, the DHS, and Microsoft, when exploited, this bug (tracked as CVE-2020-0601) can allow an attacker to:</p>



<ul class="wp-block-list"><li>launch MitM (man-in-the-middle) attacks and intercept and fake HTTPS connections</li><li>fake signatures for files and emails</li><li>fake signed-executable code launched inside Windows</li></ul>



<p>Source:<br><a href="https://www.zdnet.com/article/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/">https://www.zdnet.com/article/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2020/01/16/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3487</post-id>	</item>
		<item>
		<title>The Quantum Computing Threat to American Security</title>
		<link>https://www.pcsympathy.com/2019/11/11/the-quantum-computing-threat-to-american-security/</link>
					<comments>https://www.pcsympathy.com/2019/11/11/the-quantum-computing-threat-to-american-security/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Mon, 11 Nov 2019 13:30:56 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[computing]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[infrastructure]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3475</guid>

					<description><![CDATA[Google announced last month that it had achieved “quantum supremacy,” demonstrating the potential of a new kind of computer that can perform certain tasks many orders of magnitude faster than the most advanced supercomputers. It’s a crucial moment for America’s national security, which depends on winning the race to do what quantum computers will do [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Google announced last month that it had achieved “quantum supremacy,” demonstrating the potential of a new kind of computer that can perform certain tasks many orders of magnitude faster than the most advanced supercomputers. It’s a crucial moment for America’s national security, which depends on winning the race to do what quantum computers will do best: decrypt the vast majority of existing public-key encryption systems.</p>



<p>Google reports that its quantum computer, dubbed Sycamore, solved a mathematical calculation in 200 seconds that would take a supercomputer 10,000 years. IBM, a quantum competitor, asserted that Google’s claim of supremacy is overblown, and that the world’s most powerful classical computer, the Summit OLCF-4 at Oak Ridge National Laboratory, could have done the same calculation in 2.5 days—roughly a thousandfold difference rather than 1.5 trillionfold. Still, quantum computers are no longer science fiction.</p>



<p>To process information, digital computers use bits, essentially switches that can be either off or on, corresponding with the binary digits, 0 and 1. Quantum computers employ “qubits,” which use the probabilistic nature of quantum physics to represent any combination of 0 and 1 simultaneously, enabling them to encode more complicated data.</p>



<p>Their computing power grows exponentially as the number of qubits expands. Sycamore’s 54-qubit chip allowed it to outcompute the best supercomputer. A 2,000- to 4,000-qubit quantum computer would render most public-key encryption architectures—used for applications from banking and credit cards to the power grid—obsolete. They rely on numbers too big for conventional computers to factorize, but which a quantum computer could.</p>



<p>Building quantum computers is a very heavy lift. They require hugely expensive infrastructure to stabilize the qubits at temperatures near absolute zero. They also generate high error rates, or “quantum noise,” for which researchers have to compensate. Developers are probably years away from the large-scale code-breaking quantum computer everyone worries about—although once scientists and engineers start using quantum computers to build the next generation of quantum computers (since modeling complex systems like themselves is one of their strengths) the timeline could quickly shorten.<br><br>Source:<br><a href="https://www.wsj.com/articles/the-quantum-computing-threat-to-american-security-11573411715" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">https://www.wsj.com/articles/the-quantum-computing-threat-to-american-security-11573411715</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2019/11/11/the-quantum-computing-threat-to-american-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3475</post-id>	</item>
		<item>
		<title>Microsoft is Relaunching Power Toys For Windows 10 Users</title>
		<link>https://www.pcsympathy.com/2019/05/12/microsoft-is-relaunching-power-toys-for-windows-10-users/</link>
					<comments>https://www.pcsympathy.com/2019/05/12/microsoft-is-relaunching-power-toys-for-windows-10-users/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sun, 12 May 2019 12:32:30 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[command]]></category>
		<category><![CDATA[shell]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[tweak]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3463</guid>

					<description><![CDATA[Microsoft announced this week that they will be bringing back the Windows Power Toys so that a new generation of users can enjoy them. To start they will be offering two new Power Toys, but have a list of others that they hope to add. For those who are unfamiliar with Windows Power Toys, they [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Microsoft announced this week that they will be bringing back the Windows Power Toys so that a new generation of users can enjoy them. To start they will be offering two new Power Toys, but have a list of others that they hope to add.</p>



<p>For those who are unfamiliar with Windows Power Toys, they were small freeware utilities that were created by Windows developers as side projects related to something that they were interested&nbsp;about. They were not supported by Microsoft and were use-at-your-own-risk type of tools.</p>



<p>For Windows users, especially power users, they allowed you to play with Windows internals by tweaking undocumented features, play with fun tools,&nbsp;or to provide functionality that made it easier to get things done.</p>



<p>Some of the more popular Power Toys were Tweak UI that allowed you to enable&nbsp;undocumented features in the Windows Shell and user interface, a virtual desktop manager, and &#8220;Open Command Window Here&#8221;, which allowed you to open a command prompt within whatever folder you right-clicked on.</p>



<p>While some of these features are now built into Windows, in the past they were not and users enjoyed them as many provided an insight into the Windows internals that mostly Microsoft developers really knew about.</p>



<p>Source:<br><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-is-relaunching-power-toys-for-windows-10-users/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">https://www.bleepingcomputer.com/news/microsoft/microsoft-is-relaunching-power-toys-for-windows-10-users/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2019/05/12/microsoft-is-relaunching-power-toys-for-windows-10-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3463</post-id>	</item>
		<item>
		<title>Cylance expands its AI-powered antivirus software to the consumer market</title>
		<link>https://www.pcsympathy.com/2018/08/12/cylance-expands-its-ai-powered-antivirus-software-to-the-consumer-market/</link>
					<comments>https://www.pcsympathy.com/2018/08/12/cylance-expands-its-ai-powered-antivirus-software-to-the-consumer-market/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Sun, 12 Aug 2018 13:58:44 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[cylance]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3426</guid>

					<description><![CDATA[The global cybersecurity market is estimated to be a $232 billion industry by 2022, up from around $138 billion last year. As such, it is brimming with well-funded startups, a number of which have elected to go public in recent months, such as Zscaler and Carbon Black. Others have been snapped up by bigger companies, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The global cybersecurity market is estimated to be a $232 billion industry by 2022, up from around $138 billion last year. As such, it is brimming with well-funded startups, a number of which have elected to go public in recent months, such as Zscaler and Carbon Black. Others have been snapped up by bigger companies, including AlienVault, which was acquired by AT&amp;T this week, and Phantom, which was recently bought out by Splunk.</p>
<p>Cylance is another startup that has been making big strides in the cybersecurity realm. The company recently closed a $120 million funding round, taking its total raised to around $300 million since its inception eight years ago. This also positions it well to grow its enterprise client base ahead of a rumored IPO in the not-too-distant future.</p>
<p>But before all that, Cylance has other plans to bolster its growth. Today, the company announced that it’s broadening its horizons to include the lucrative consumer cybersecurity market.</p>
<p>Source:<br />
<a href="https://venturebeat.com/2018/07/12/cylance-expands-its-ai-powered-antivirus-software-to-the-consumer-market/" target="_blank" rel="noopener">https://venturebeat.com/2018/07/12/cylance-expands-its-ai-powered-antivirus-software-to-the-consumer-market/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2018/08/12/cylance-expands-its-ai-powered-antivirus-software-to-the-consumer-market/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3426</post-id>	</item>
		<item>
		<title>CCleaner Adds Data Collection Feature With No Way to Opt-Out</title>
		<link>https://www.pcsympathy.com/2018/08/02/ccleaner-adds-data-collection-feature-with-no-way-to-opt-out/</link>
					<comments>https://www.pcsympathy.com/2018/08/02/ccleaner-adds-data-collection-feature-with-no-way-to-opt-out/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 20:59:54 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[avast]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3422</guid>

					<description><![CDATA[Like many others, do you also believe that the popular system-cleaning tool CCleaner was performing well before Avast acquired the software from Piriform last year? If yes, then pop-up advertisements in the previous CCleaner software version was not the last thing you have to deal with. Avast has released a new version of CCleaner 5.45 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Like many others, do you also believe that the popular system-cleaning tool CCleaner was performing well before Avast acquired the software from Piriform last year?</p>
<p>If yes, then pop-up advertisements in the previous CCleaner software version was not the last thing you have to deal with.</p>
<p>Avast has released a new version of CCleaner 5.45 that not only always runs in the background, but also collects information about your system without giving you a way to turn the feature off.</p>
<p>CCleaner is a popular application, available in both free and premium versions, with over 2 billion downloads that allow users to clean up their Windows, Mac, and mobile devices to optimize and enhance performance.</p>
<p>Last year, CCleaner made headlines when it suffered a massive supply-chain malware attack of all times, wherein hackers compromised its servers for over a month and replaced the original version of the software with the malicious one, infecting over 2.3 million users worldwide.</p>
<p>Source:<br />
<a href="https://thehackernews.com/2018/08/ccleaner-software-download.html" target="_blank" rel="noopener">https://thehackernews.com/2018/08/ccleaner-software-download.html</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2018/08/02/ccleaner-adds-data-collection-feature-with-no-way-to-opt-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3422</post-id>	</item>
		<item>
		<title>Introducing: Malwarebytes Browser Extension</title>
		<link>https://www.pcsympathy.com/2018/07/26/introducing-malwarebytes-browser-extension/</link>
					<comments>https://www.pcsympathy.com/2018/07/26/introducing-malwarebytes-browser-extension/#respond</comments>
		
		<dc:creator><![CDATA[manunkind]]></dc:creator>
		<pubDate>Thu, 26 Jul 2018 23:01:47 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[hijack]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://www.pcsympathy.com/?p=3418</guid>

					<description><![CDATA[Malwarebytes Browser Extension delivers a safer and faster web browsing experience. It blocks malicious websites and filters out unwanted content (resulting in up to three times faster webpage load times). The filtering is not based on definitions, so the extensions can block previously-unidentified fake tech support scams and their tactics. What will it do for [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Malwarebytes Browser Extension delivers a safer and faster web browsing experience. It blocks malicious websites and filters out unwanted content (resulting in up to three times faster webpage load times). The filtering is not based on definitions, so the extensions can block previously-unidentified fake tech support scams and their tactics.</p>
<p>What will it do for your browsing experience? It prevents pop-ups, browser hijackers, and browser lockers from harassing you and interrupting your surfing. It also blocks clickbait links and fake news content, stops in-browser cryptocurrency miners, and gives other malicious content the boot. All this while relying on threat behavior patterns rather than on researchers who have to track down, identify the malware, and add it to a database of known threats. (We still need those researchers to make our products better. This is just a different, faster method.)</p>
<p>Speaking of behavior patterns, our browser extension is the first that heuristically identifies and blocks tech support scams‘ browser-locker pages, which scare users into calling fake tech support scammers. So it protects you from unwanted social engineering tactics as well.</p>
<p>Source:<br />
<a href="https://blog.malwarebytes.com/malwarebytes-news/betas/2018/07/introducing-malwarebytes-browser-extension/" target="_blank" rel="noopener">https://blog.malwarebytes.com/malwarebytes-news/betas/2018/07/introducing-malwarebytes-browser-extension/</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pcsympathy.com/2018/07/26/introducing-malwarebytes-browser-extension/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3418</post-id>	</item>
	</channel>
</rss>
