<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News - Malware Complaints</title>
	<atom:link href="https://malwarecomplaints.info/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://malwarecomplaints.info/news/</link>
	<description>Virus and Malware Removal Guides</description>
	<lastBuildDate>Tue, 07 Jul 2020 07:50:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://malwarecomplaints.info/wp-content/uploads/2020/11/Malware-Complaints-Logo.svg</url>
	<title>News - Malware Complaints</title>
	<link>https://malwarecomplaints.info/news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Search Pulse Test Results</title>
		<link>https://malwarecomplaints.info/search-pulse-test-results/</link>
					<comments>https://malwarecomplaints.info/search-pulse-test-results/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Fri, 14 Sep 2018 13:56:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=2006</guid>

					<description><![CDATA[<p>From the results that we have gathered none of the major anti-virus companies have detected SearchPulse.net to be a malicious. A further study of ours has found Search Pulse to install software on the end user without its full consent and automatically redirect all mac users using mainly safari and Chrome to there main search [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/search-pulse-test-results/">Search Pulse Test Results</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>From the results that we have gathered none of the major anti-virus companies have detected SearchPulse.net to be a malicious. A further study of ours has found Search Pulse to install software on the end user without its full consent and automatically redirect all mac users using mainly safari and Chrome to there main search engine page. If you would like to find out more information on how to remove <a href="https://malwarecomplaints.info/how-to-remove-pulse-search-mac/#removalguide">Search Pulse you can check our removal instructions here. </a></p>
<p><a href="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe-2.png"><img fetchpriority="high" decoding="async" class="size-full wp-image-2007 aligncenter" src="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe-2.png" alt="" width="447" height="353" srcset="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe-2.png 447w, https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe-2-300x237.png 300w" sizes="(max-width: 447px) 100vw, 447px" /></a><a href="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe.png"><img decoding="async" class="size-full wp-image-2008 aligncenter" src="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe.png" alt="" width="511" height="185" srcset="https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe.png 511w, https://malwarecomplaints.info/wp-content/uploads/2018/09/search-engine-safe-300x109.png 300w" sizes="(max-width: 511px) 100vw, 511px" /></a></p>
<p>The post <a href="https://malwarecomplaints.info/search-pulse-test-results/">Search Pulse Test Results</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/search-pulse-test-results/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Firefox 57 (Firefox Quantum) review</title>
		<link>https://malwarecomplaints.info/firefox-57-firefox-quantum-review/</link>
					<comments>https://malwarecomplaints.info/firefox-57-firefox-quantum-review/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 10:23:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1615</guid>

					<description><![CDATA[<p>[add_top_banner] Welcome to our overview of the latest version of the Mozilla Firefox browser &#8211; today is the release date of Firefox 57 or as its official name is, Firefox Quantum, and in the next couple of paragraphs, we will take a look at the most important changes that have been added to one of [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/firefox-57-firefox-quantum-review/">Firefox 57 (Firefox Quantum) review</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[add_top_banner]</p>


<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Welcome to our overview of the latest version of the <a href="http://malwarecomplaints.info/mozilla-firefox-review-stability-performance-customization/">Mozilla Firefox browser</a> &#8211; today is the release date of Firefox 57 or as its official name is, Firefox Quantum, and in the next couple of paragraphs, we will take a look at the most important changes that have been added to one of the most popular and widely used browsers.</span></p>



<p><strong><span style="font-family: helvetica, arial, sans-serif;">The Interface</span></strong></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Once you open Firefox 57, you’d instantly notice that its whole look has been changed and made to appear more stylish and with a more modern feel. A lot of critics of Firefox have been pointing out in the past that the browser had a somewhat outdated look. Hopefully, the new changes will put an end to this. Here are some of the most notable examples of what’s been changed regarding the appearance of Firefox:</span></p>



<ul class="wp-block-list"><li><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> The tabs &#8211; similarly to most modern browsers, Mozilla Firefox with its Quantum release will now have square-looking tabs rather than the rounded ones that it used to have.</span></li><li><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Snapshot tool &#8211; a built-in screenshot tool has been added to Firefox through which you can take snapshots of your whole browser window or choose separate segments and crop them into a image file. The tool also has the ability to recognize images on your browser screen and suggest to automatically make a snapshot of them. Here, we must note that many other browsers (Opera, Vivaldi, Slimjet, Maxthon, etc.) have had a similar feature for quite some time now.</span></li><li><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Combined search/URL box &#8211; Firefox was one of the few remaining browsers that still had separate boxes for site addresses and for its searches. With the introduction of Firefox 57 this has been changed as the two boxes are now combined into one similarly to how they are on Edge, Chrome, Opera and on many other modern browsers. Many users and researchers actually dislike this due to privacy concerns. Supposedly, when the two boxes are combined, search engines will be able to gather telemetry data from anything that gets typed in the URL/search bar. Otherwise, others might find this to be more convenient as it can potentially speed up browsing and leave more space for other buttons on the toolbar.</span></li></ul>



<p><span style="font-family: helvetica, arial, sans-serif;"><strong>The Engine</strong></span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">A major modification that Firefox 57 introduces is an improved version of its old Gecko Engine. The new modified engine is called Quantum which is what gives the name of this version of the browsers &#8211; Firefox Quantum.</span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> According to Mozilla developers, with this new and improved engine, the browser would run significantly faster. It is said that its performance will now be twice as fast compared to what it used to be an year ago. Beta testers have already confirmed that Firefox Quantum indeed runs smoother and faster than it used to making it one of the best-performing browsers at this moment.</span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Additionally, the RAM consumption has been decreased so that Firefox would now be more memory-friendly. Mozilla claim that the RAM that is now used by their browser is 30% less than what the memory usage normally is on Google Chrome.</span></p>



<p><span style="font-family: helvetica, arial, sans-serif;"><strong>WebExtensions Standard</strong></span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Extensions in Firefox used to be handled using differently than they are now. The old XUL (XML User Interface Language) API has been replaced with the WebExtensions Standard that Chromium-based browsers and Microsoft Edge use. Due to this, browser add-ons for Chrome or Opera will now be compatible with Firefox. However, on the flip side, a number of dedicated Firefox extensions will need to be re-made in order to be compatible with the WebExtensions Standard, otherwise customers won’t be able to use them.</span></p>



<p><span style="font-family: helvetica, arial, sans-serif;"><strong>Tracking Protection</strong></span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">A major focus with Firefox 57/Firefox Quantum is improvements made to the browser’s privacy levels. One of the most important changes in that regard is the introduction of a full Tracking Protection settings.</span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> A little backstory here, the Tracking Protection for Firefox has been around for quite some time now, it was introduced back in 2014. The feature blocked most trackers that would try to gather telemetry data from the user’s browser. However, there were no settings for it and it was enabled by default only for Incognito Mode browsing. It was technically possible to enable it for regular browsing as well but there was no section for doing that from within the browser’s settings. In order to do that, one would need to go through a number of steps that few people knew about.</span></p>



<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Now, with Firefox 57, everybody would be able to easily choose if they want to have their regular browsing protected against trackers as well from the settings of the program. It has also been said that the next update, 58, would further boost the security of Firefox keeping the emphasis on making this one of the more privacy-oriented browsers out there. If you want to read more about the full Tracking Protection, you can go to <a href="http://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/">this link</a> where we have given it a more in-depth analysis.</span></p>



<p><span style="font-family: helvetica, arial, sans-serif;"><strong>To sum up</strong></span></p>



<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">For fans of the browser, Firefox 57 should come as a nice improvement with several nice additions. However, there’s surely going to be certain amounts of criticism, especially with regards to the combined search/URL bar and potentially with regards to the adoption of the WebExtensions standard. For anyone who wants to experience the new version, Firefox 57 download should occur automatically without any need to search for the browser’s newest update manually. If you want to see the official introduction to Quantum, you can visit&nbsp;</span><a href="https://www.mozilla.org/en-US/firefox/quantum/"><span style="font-weight: 400;">this official page from Mozilla</span></a><span style="font-weight: 400;">.</span></span></p>
<p>The post <a href="https://malwarecomplaints.info/firefox-57-firefox-quantum-review/">Firefox 57 (Firefox Quantum) review</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/firefox-57-firefox-quantum-review/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The vulnerability of the Internet</title>
		<link>https://malwarecomplaints.info/the-vulnerability-of-the-internet/</link>
					<comments>https://malwarecomplaints.info/the-vulnerability-of-the-internet/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Mon, 18 Dec 2017 16:26:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1649</guid>

					<description><![CDATA[<p>Can you imagine today’s world without the Internet? Of course, without the Internet, humanity would still continue to function but a lot of the progress we’ve had throughout the past couple of decades will be gone since a lot of it is contributed to this weird invention called the Internet. Nowadays, a lot of our [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/the-vulnerability-of-the-internet/">The vulnerability of the Internet</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Can you imagine today’s world without the Internet? Of course, without the Internet, humanity would still continue to function but a lot of the progress we’ve had throughout the past couple of decades will be gone since a lot of it is contributed to this weird invention called the Internet. Nowadays, a lot of our everyday lives is heavily dependent on it. We use the Internet for our work, leisure, to set up plans, find important information that we need, communicate with others transfer data and many more. Nearly all aspects of our lives are, in some way, connected to it and made easier (or possible) by it. Because of this, any significant disturbance or malfunction that happens to the Internet can have huge repercussions on a global scale.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Currently, the protocol used used to manage the computer networks that form the Internet, the TCP/IP, is a very stable one and it allows for the unwavering functioning of the Internet. Seemingly, there is no danger for the existence the greatest invention of the new world. And yes, in terms of the protocol used to manage it, things are fine for now. However, there is another aspect that seems to have been heavily disregarded throughout the years.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">What is the medium used to connect the devices and networks that form the Internet?</span></strong></p>
<p><img decoding="async" class="alignnone wp-image-1654" src="http://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-2.jpg" alt="" width="627" height="392" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-2.jpg 789w, https://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-2-300x187.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-2-768x480.jpg 768w" sizes="(max-width: 627px) 100vw, 627px" /></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">So, what do you think is the answer to that question? Many of you might think of satellites, right? It seems the only logical option that would allow for quick and efficient transfer of data all over the world. Well, it turns out that only a small percentage of the data transferred over the Internet gets managed via satellite connection. In reality, only a small portion of the whole online traffic goes through satellites &#8211; around one percent. The rest of the traffic is managed served by fiber cables Even when it comes to serving traffic overseas, there are thousands of kilometers of fiber-optic cables lying on the seafloor and transferring digital data between the continents. The main reason why this is the widely-preferred method is that it is much more efficient and much cheaper. That is not to say it is cheap to set up cables at the bottom of the sea that spread from one continent to another but it is certainly even more expensive to send more and more satellites in orbit.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">One other important aspect is the capabilities of the two separate methods. While the capacity of the submarine cables is measured in terabytes per second, satellites can only support data transfer that doesn’t exceed a thousand megabytes/second.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">So what’s the issue with cables?</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Apparently, it is a much better option to have the Internet traffic managed through cables rather than satellites, so where’s the problem with that. Well, although the submarine cables are placed really deep, where the seafloor is, there are still many physical dangers that can come to them.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> First and foremost, a lot of those cables have been there for quite some time. They are now old and likely, the natural processes around them have more or less weakened their integrity. After all, there are all sorts of stuff that can happen which could damage them &#8211; sea creatures can cause damage to the cables as well as various kinds of debris and even volcanic and/or tectonic activity and such is much more likely to occur deep down, at the sea floor, rather than on land.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Nature isn’t the only threat</span></strong></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Natural processes are only one of the major dangers that threaten the submarine cables that manage most of the Internet traffic. One other possible danger comes from us, the humanity that has worked to set them up in the first place. Of course, a country wouldn’t go and try to intentionally damage or destroy the submarine cables that it has established but another country might indeed do that. Also, it wouldn’t really take much. The locations of all those thousands of seafloor cables isn’t exactly unknown, just have a look at </span><a href="https://www.submarinecablemap.com"><span style="font-weight: 400;">this website</span></a><span style="font-weight: 400;"> if you aren’t convinced. Despite the significant depth of the seafloor where those cables lie, it should still be relatively easy for a someone with enough money to locate and damage them. It doesn’t even need to be a country that seeks to gain something out of such an nefarious action. There are hundreds of organizations with shady agendas and dishonest goals that can easily find a way to disrupt the Internet as we know it and as we already mentioned, any major malfunction in that field can have severe and unforeseen consequences that would affect not only single countries bot potentially whole continents as well.</span></span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1651" src="http://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-1.jpg" alt="" width="480" height="358" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-1.jpg 480w, https://malwarecomplaints.info/wp-content/uploads/2017/12/Capture-1-300x224.jpg 300w" sizes="auto, (max-width: 480px) 100vw, 480px" /></span></strong></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Not only destruction, but also espionage</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Although such a scenario is generally less threatening as the methods for gaining higher levels of privacy online have been greatly improved upon throughout the last decade, it is still possible for certain government organizations from different countries to tap into those submarine cables and gain secret intelligence through them. The potential damage that can come from this might not be as dreadful since most Internet communications are currently encrypted, yet it is still a real possibility that should not be disregarded.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">The future?</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Unfortunately, currently the focus of the world isn’t really shifted towards the problems that might come from the medium used to spread the Internet. So far, cables have worked fine and maybe this is the reason why few are actually concerned with their future. However, if measures do not get taken soon, a lot of what was said throughout this article might become reality and then it would be much more difficult to handle the problems which might occur.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/the-vulnerability-of-the-internet/">The vulnerability of the Internet</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/the-vulnerability-of-the-internet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware through 2017 &#8211; what you need to know</title>
		<link>https://malwarecomplaints.info/ransomware-2017-need-know/</link>
					<comments>https://malwarecomplaints.info/ransomware-2017-need-know/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 13:00:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1632</guid>

					<description><![CDATA[<p>Throughout the past few years the notorious Ransomware type of malware has become one of the worst cyber-threats and, as the time passes, it only seems to be gaining more momentum. 2017 has been a year marked by a number of big Ransomware outbreaks with businesses, schools, hospitals, subway systems and even government bodies as [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/ransomware-2017-need-know/">Ransomware through 2017 &#8211; what you need to know</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Throughout the past few years the notorious Ransomware type of malware has become one of the worst cyber-threats and, as the time passes, it only seems to be gaining more momentum. 2017 has been a year marked by a number of big Ransomware outbreaks with businesses, schools, hospitals, subway systems and even government bodies as well as millions of users falling prey to different variants of this family of malicious programs. In this article, I will review the most important and momentous examples of Ransomware outbreaks that have occurred throughout the current year as well as elaborate upon the current trends and the potential future of this malware category according to the information provided by security researchers in that field.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">But first…</span></p>
<p><span style="font-size: 14pt;"><strong><span style="font-family: helvetica, arial, sans-serif;">What is a Ransomware?</span></strong></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><i><span style="font-weight: 400;">If you are already aware of what this malware category is all about, you can skip to the next paragraph and where I elaborate upon its trends and development throughout 2017.</span></i></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Nearing the end of 2017, more and more users seem to be getting acquainted (in one way or another) with the Ransomware virus category. Some are lucky enough to simply read an article like this one and safely acquire the information that they might need regarding this form of malware while others, not so fortunate individuals, get a more hands-on experience with Ransomware by actually landing one such noxious program on their computers. If you do not belong to the latter group, consider yourself lucky as this is truly one of the nastiest possible forms of malicious software that you can get your system attacked by, especially if you keep important and valuable data on your hard-drives.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> So, what is a Ransomware? The most general description of a program which belongs to this category would be that a Ransomware is any malicious piece of software that seeks to extort money from its victim by demanding a certain ransom payment. In most cases, the virus blocks a certain component/s of the user’s system and keeps it locked until the payment is made. There are couple of separate Ransomware types:</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><strong>Lockscreen Ransomware</strong> &#8211; noxious programs that of this type are normally regarded as less advanced in comparison to the other forms of Ransomware. A lockscreen virus normally seeks to display a big banner on the targeted device’s screen hiding everything such as the desktop, programs, folders, etc. behind it thus making the user unable to use their device. The ransom demand is stated within the lockscreen banner along with instructions regarding the payment method. In the past, this type of Ransomware was highly-effective but now there are a lot of guides out there that can easily allow anyone to manually disable such a malware piece. Still, though, lockscreen viruses are still highly popular and widely spread, especially among Android users.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><strong> Encryption-based Ransomware</strong> &#8211; for some time now, this has been the bane of the Internet. Encryption-based Ransomware programs also known as cryptoviruses are truly some of the most devastating and difficult to deal with forms of malware. The general way of functioning of those viruses is as follows: once the malware makes it into the victim’s PC system, it scans the HDD for certain file formats. Once all data that belongs to those file formats is accounted for, the malware goes on to use an advanced encryption process to render the targeted files inaccessible to the user. Once the process has been completed, the malware would generate a pop-up or a notepad message on the computer within which pop-up/message the ransom demand is stated. Additionally, the note also provides the user with details on how to execute the requested payment. The preferred ransom currency is typically BitCoin or some other cryptocurrency which would ensure that the attacker stays anonymous.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Master Boot Record (MRB) encrypting Ransomware &#8211; though this isn’t really a separate subcategory of Ransomware, it is worth saying a couple more words about it. MRB-encrypting Ransomware are viruses that not only mess with the files on the infected machine but also modify its Master Boot Record so that it doesn’t allow the computer to boot into Windows. If infected by this sort of malware, the user will not be able to use their PC whatsoever until the malicious program gets taken care of.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><strong> Leakware</strong> &#8211; this is a less common example of Ransomware viruses but for the sake of completeness, I will mention a few words regarding this subcategory. Instead of locking-up the device or encrypting files that are on it, Leakware versions threaten to publish sensitive user-related data online. Obviously, such attacks would only be effective if the victim actually has any sensitive information stored on their device to begin with which is likely why Leakware attacks are not as common.</span></p>
<p><span style="font-size: 14pt;"><strong><span style="font-family: helvetica, arial, sans-serif;">Ransomware throughout 2017</span></strong></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">As I already mentioned in the beginning of this article, 2017 has been an year during which the overall Ransomware threat drastically increased in scale. I won’t be going through each and every single virus released under this category as there are just way too many of them. Therefore, I will limit myself to only the most notable examples of Ransomware outbreaks.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">WannaCry</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">WannaCry (also known as WannaCrypt) virus marked one of the biggest Ransomware outbreaks ever and likely the largest one this year. In a very short amount of time (read couple of days) it managed to distribute itself and infect hundreds of thousands of machines all over the world. Aside from regular users who got infected, other victims of this virus were banks, schools, hospitals, infrastructure systems, airlines, etc. According to some researchers, the scale of this Ransomware outbreak was unprecedented with over 200 000 machines infected throughout 150 countries, the most affected of which were Russia, Ukraine, Taiwan and India. One of the main reasons why this virus was so effective was the way it got distributed &#8211; the hackers exploited a vulnerability in Microsoft’s Server Message Block (SMB) protocol which allowed the malware to be distributed without requiring the user to actually make a mistake and somehow download the malware.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">NotPetya</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">The NotPetya outbreak was the second large-scale Ransomware attack this year. This virus works similarly to the infamous Petya Ransomware &#8211; it encrypts the Master Boot Record of the PC thus preventing the user from booting into Windows. In just a few days, hundreds of thousands of PC’s got infected over 100 countries. Again, instead of relying on the end user making a mistake and loading the virus on the PC, the hackers behind Petya, too, exploited the SMB protocol vulnerability to deliver the malware.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">BadRabbit</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">This is a more recent example of Ransomware that, despite not becoming as widely spread as the previous two examples, still managed to cause serious damage during the time it was “alive”. Similarly to Petya and NotPetya, this malware program, apart from encrypting the user’s personal files, also modifies the MRB, locking the victim out of their computer. Initially, it was reported that this virus was got distributed through fake flash update pop-ups displayed on a number of hacked websites but it was later revealed that it had a secondary method of distribution. The malware was able to spread to other machines connected to the same network as the “patient zero” computer which allowed it to quickly infect a huge number of systems. Again, the BadRabbit Ransowmare had the most effect in countries from Eastern Europe (Ukraine, Russia, Bulgaria, Turkey).</span></p>
<p><span style="font-size: 14pt;"><strong><span style="font-family: helvetica, arial, sans-serif;">Tendencies and future predictions</span></strong></span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Distribution</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Despite security experts’ best efforts, a large portion of modern Ransomware versions are still left without a working solution that would allow the victim to recover from the attack without paying the ransom. In fact, the difficulty that most hackers face isn’t making their viruses so advanced that no one would be able to deal with them but making sure that they get distribute to enough systems.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> During the past two years, phishing and spam e-mails were enough to distribute a Ransomware but with the increasing popularity of this particular form of malware, more and more users started to become more aware and vigilant, which decreased the effectiveness of those distribution techniques. Therefore, the cyber criminals seem to have started seeking new alternatives which bypass the need for tricking the user into loading the malware on their PC. The WannaCry and NotPetya outbreaks are clear examples of one way this could happen and the scale and effectiveness of their attacks only shows that this is likely the future for a lot of the newer Ransomware versions. Although Microsoft has taken measures to eliminate the SMB protocol vulnerability that those two viruses exploit, there’s nothing to say that the online criminals won’t come up with some other similar method for spreading their malicious software to more and more victims.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Targets</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">As before, regular users are currently the largest group of Ransomware victims worldwide. However, throughout 2017, the number of businesses and companies targeted by this malware category has increased drastically. Hackers who use Ransomware are starting to turn their sights towards higher-value targets and it seems to be working out pretty well for them. One of the main reasons for that is the insufficient security level that a lot of companies operate under which allows for swift and devastating Ransomware attacks.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Ransom demands</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Likely as a direct consequence of the previous Ransomware tendency, the average demanded ransom sum has gone up quite substantially. Only during 2016, an over 250% percent increase in the average ransom demand (compared to 2015) was reported by Symantec.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> In 2017, only a small percentage of businesses have actually paid the hackers (below 5% according to a survey by Barkley). Out of those who have paid, 1 out of 5 were never given the decryption codes necessary for the unlocking of the encrypted data. This further comes to show just how unreliable making the ransom payment could be. As many experts have said times and times again, it is highly inadvisable to agree to the blackmailers’ terms and send them the money unless there’s no other potential alternative and only if the decryption of the data is highly important.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">The future of Ransomware</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">The tendencies from 2017 with regards to the Ransomware threat are likely to transfer into 2018 as well. The money demands would likely go up with more businesses getting targeted and the distribution methods of Ransomware will probably get more diverse due to the slowly but steadily improving of the users’ technical knowledge and understanding of how to avoid exposing their devices at malware risks. Still, though, nothing is for certain. Probably the most likely prediction that one can make is that Ransomware will be around for quite some time and won’t go away easily.</span></p>
<p>[ratings]<br />
&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/ransomware-2017-need-know/">Ransomware through 2017 &#8211; what you need to know</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/ransomware-2017-need-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity trends and the future of the virtual world</title>
		<link>https://malwarecomplaints.info/cybersecurity-trends-future-virtual-world/</link>
					<comments>https://malwarecomplaints.info/cybersecurity-trends-future-virtual-world/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Mon, 04 Dec 2017 12:55:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1630</guid>

					<description><![CDATA[<p>The beginning of the 21st century is undeniably a time of rapid development of technology. According to Moore’s law, every two years the number of transistors in dense integrated circuits doubles meaning that the we are getting more and more computing power at a very quick pace. Here, it needs to be mentioned that this [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/cybersecurity-trends-future-virtual-world/">Cybersecurity trends and the future of the virtual world</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The beginning of the 21</span><span style="font-weight: 400;">st</span><span style="font-weight: 400;"> century is undeniably a time of rapid development of technology. According to</span><a href="https://en.wikipedia.org/wiki/Moore%27s_law"> <span style="font-weight: 400;">Moore’s law</span></a><span style="font-weight: 400;">, every two years the number of transistors in dense integrated circuits doubles meaning that the we are getting more and more computing power at a very quick pace. Here, it needs to be mentioned that this rate of computing evolution is beginning to slow-down. Regardless, the integration of technology in our everyday lives is not going away anytime soon. Nowadays, it is very difficult to imagine living without a smartphone, a laptop, a desktop compute, a TV or some other form of technology that seems to have become a mandatory aspect of a person’s daily experience. Indeed, technology is now an integral part of our everyday routines and for a good reason. Tech makes life easier, more entertaining and more productive (provided that one knows how to utilize what they are given). That’s all good right? Well, there is a downside to everything and 21</span><span style="font-weight: 400;">st</span><span style="font-weight: 400;"> century’s tech is certainly no exception to that rule. Our over-dependence on technology might actually do us more harm than good and there are certain very realistic ways this could happen…</span></span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Enter Cybersecurity</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Cybersecurity is a term used to refer to all forms of protection of computer systems from illegal interference, digital theft, damage to the hardware or software components or any other kind of disruption of the functions that the computer is supposed to execute. As we already mentioned and as you surely know for yourself, or connection to technology is currently very strong and we are heavily reliant on our gadgets and devices on a global scale. The smarter and more advanced those devices become, the more useful they get but also, the need for their protection increases drastically as well. This leads us to the problem we are going to be focusing in this article &#8211; the importance of sufficient cybersecurity and its obvious lack in almost every aspect and area of technology.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">The current state of cybersecurity</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">With the advancement and the Integration of the Internet, it has become much easier for virtual criminals to hack into one’s device and carry out all sorts of malicious tasks in order to reach a certain goal. Most of the time such a goal would be, as you might have guessed, quick financial profit with minimum risk of getting caught for the cybercrime. Ten years ago, hackers would mostly target computers and laptops but now, with the increasing number of smart-technologies such as smartphones, tablets, phablets or even home-related smart-tech, the opportunity for technological havoc has increased drastically. The current state of things is basically this: the speed at which technology’s advancements and integration happens is much greater than the speed of improving the protection procedures and cybersecurity of the said technology. This leads to a very serious issue which, unfortunately, few are willing to address and pay attention.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Each year, the number and the seriousness of hacker attacks increases if some time ago most victims were regular users, today, more and more virtual criminals are turning their eyes towards big targets such as large businesses, worldwide companies and even governments. According to a diagram from hackmageddon, in 2016 28% of the cyber-attack targets were industries and 21% were individual users. The implications of this tendency are rather dreadful and, as we said, too few are willing to put in the effort, time, and resources into ensuring that their computer/IoT network won’t get easily hacked.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Still, a positive tendency is present as well &#8211; though slowly, people are starting to realize the importance of having good virtual protection. Investments into cybersecurity have been increasing throughout the past few years but the bad news is that there are still too many businesses out there that have insufficient (if any) cyber protection leaving millions upon millions of devices open to direct malware attacks. The only ones who truly seem to have taken it upon themselves to fortify their virtual security are some big companies who would lose a lot if a hacker was able to infiltrate their networks (not that there’s a shortage of examples of this happening).</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">User knowledge</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">The thing about successful cyber attacks is that even if the whole network or individual system has been thoroughly secured, there is still one factor that hackers can always attempt to exploit which most usually ensures the success of the attack. This factor is none other than the individual user. It is much more difficult, skill-requiring and time-consuming for a hacker to create come up with a malware that can automatically infect a system leaving out the middleman. On the other hand, if the user makes a mistake, even the simplest or least advanced form of malware can cause some serious damage in the wrong hands. Unfortunately, many regular users and company employees tend to lack the knowledge or vigilance so as to avoid potential cyber attacks. This is also why malware infection methods such as malvertising and phishing are so commonly used by hackers &#8211; many would easily fall for those without even thinking about whether or not this pop-ups that offered a free iPhone or that sketchy banner who said you need a software update looked suspicious or questionable.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> With that said, there is still an improvement &#8211; users, though slowly, are getting better educated on the Internet dangers out there and are starting to recognize the potential hazards before actually interacting with them. In fact, this has lead to some hackers trying to come up with new methods for malware distribution where the user interaction would be left out of the equation. Two prominent and recent examples are the WannaCry and NotPetya Ransowmare outbreaks which used a Microsoft vulnerability to automatically infect targeted machines instead of waiting for the user to make a mistake.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">The future?</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">No one can say for sure what the future holds in terms of cybersecurity. Sadly, however, there are a lot of bleak possibilities and the fact that currently the overall levels of cybersecurity are almost entirely insufficient on a global scale doesn’t make things any better. There are numerous examples of what might happen if a skilled enough team of hackers manages to infiltrate an important computer or IoT network. For example, if a cyber terrorist manages to hack into the controls of an airline, they could easily misdirect the flying aircraft causing mass air collisions. Another possibility is if hackers infiltrate the systems of hospitals causing equipment malfunction leading to multiple casualties (in fact, there are already instances of Ransomware attacks on hospitals). Some more bizarre cases of malware attacks are also possible &#8211; one could hack and cause malfunction to devices such as home robots or even pacemakers! Furthermore, the more advanced the tech we use becomes and the more software we put into it, the more opportunities the hackers would have to exploit it. Therefore, high-level cybersecurity is an absolute must when looking towards our future or else, there could be a lot of grim and unforeseen consequences.</span></p>
<p>&nbsp;<br />
[ratings]</p>
<p>The post <a href="https://malwarecomplaints.info/cybersecurity-trends-future-virtual-world/">Cybersecurity trends and the future of the virtual world</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/cybersecurity-trends-future-virtual-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Flying cars within ten years? &#8211; Enter Uber Elevate!</title>
		<link>https://malwarecomplaints.info/flying-cars-uber-elevate/</link>
					<comments>https://malwarecomplaints.info/flying-cars-uber-elevate/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Wed, 08 Nov 2017 14:09:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1588</guid>

					<description><![CDATA[<p>Recently, the well-known transportation technology company Uber has made a deal with none other than the The National Aeronautics and Space Administration (NASA) regarding the Uber Air (Uber Elevate) project which revolves around flying urban civic transport. Last year, Uber announced that they are looking into offering their customers with as much options for transportation [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/flying-cars-uber-elevate/">Flying cars within ten years? &#8211; Enter Uber Elevate!</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Recently, the well-known transportation technology company Uber has made a deal with none other than the The National Aeronautics and Space Administration (NASA) regarding the Uber Air (Uber Elevate) project which revolves around flying urban civic transport.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"> Last year, Uber announced that they are looking into offering their customers with as much options for transportation as possible and utilizing the open air space seemed like an obvious next step. This has given birth to the Uber Elevate project. On the project’s site, Uber have posted a lengthy whitepaper which thoroughly describes the specifics of urban air transportation. </span><a href="https://www.uber.com/elevate.pdf"><span style="font-weight: 400;">Here is a link</span></a><span style="font-weight: 400;"> where you can download the whitepaper if you wish to obtain more detailed information regarding Uber Elevate.</span></span></p>
<h2 id="the-real-difficulty-with-uber-air"><strong><span style="font-family: helvetica, arial, sans-serif;">The real difficulty with Uber air</span></strong></h2>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Apparently, we already have the necessary advancements in technology that would soon allow us to have flying cars according to many researchers. This is good new for Uber Elevate and their aspiration to have VTOL (vertical takeoff and landing) aircraft flying around the cities of the world and allowing people to access a much faster and much more effective means of transport from one place to another.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> However, there is a major setback and it isn’t what one would think it to be. Uber has a history of regulatory issues all over the world regarding its services offered by the Uber application. Different countries have different laws and it isn’t always possible to meet all requirements at once. That said, taking things up in the air is bound to cause even more regulatory difficulties. Birmingham professor David Dunn has pointed out that it would be a challenge to come regulate transportation aircraft flying around the open spaces above cities. For instance, how would such means of transportation would be licensed, insured or what would the police services look like for aircraft transport. There are a lot more similar questions to be answered before Uber Elevate could take off into the skies.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> One thing to mention here is that Uber air wouldn’t be responsible for the actual manufacturing of the aircraft but rather for the software that would be used to manage them similarly to how the Uber app is currently used by customers to call for a taxi. This is also why the deal with NASA was struck.</span></p>
<p><iframe loading="lazy" src="https://www.youtube.com/embed/nuFSh7N0Nhw" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<h1><span style="font-family: helvetica, arial, sans-serif;">Enter Uber Elevate!</span></h1>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Uber Elevate is certainly a bold project and now with its next step involving NASA, the future where we have flying cars seems to be closer than ever before. The possibilities that such a means of transport would open are endless. It has been reported that there are plans to begin Uber Elevate tests as early as 2020 in the cities of Dubai and Dallas. </span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Talking about futuristic sci-fi technology such as the Uber air project, recently we also learned that Waymo, a company that develops self-driving cars, has already started to invite regular people to take test rides in their fully-automated minivans. If you want to learn more about this, <a href="http://malwarecomplaints.info/waymo-google-self-driving-cars/">here is an article</a> where we have covered that topic.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/flying-cars-uber-elevate/">Flying cars within ten years? &#8211; Enter Uber Elevate!</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/flying-cars-uber-elevate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The future has arrived &#8211; Waymo / Google self-driving cars are now a reality</title>
		<link>https://malwarecomplaints.info/waymo-google-self-driving-cars/</link>
					<comments>https://malwarecomplaints.info/waymo-google-self-driving-cars/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 22:26:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[self-driving]]></category>
		<category><![CDATA[Waymo]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1582</guid>

					<description><![CDATA[<p>Since the the middle of the last month the autonomous company Waymo, the vehicle section of Alphabet (Google’s parent company), has been running tests with automated, self-driving minivans around the roads of Arizona. Many of you might have already heard about this Waymo project under the label of Google cars. This is an important achievement [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/waymo-google-self-driving-cars/">The future has arrived &#8211; Waymo / Google self-driving cars are now a reality</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Since the the middle of the last month the autonomous company Waymo, the vehicle section of Alphabet (Google’s parent company), has been running tests with automated, self-driving minivans around the roads of Arizona. Many of you might have already heard about this Waymo project under the label of Google cars. This is an important achievement for the company as it will likely forever change the urban and countryside traffic as we know it. During the test, there were no safety-drivers inside the vehicles. In fact, there were no humans inside whatsoever. However, soon this will change as the company plans on allowing people to take rides in their automated minivans as the first step towards introducing the automated vehicles to the public.</span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">So far, there has already been an instance of regular people getting inside Waymo’s minivans for a ride &#8211; a group of reporters was invited to Castle, a testing facility in California where the Google self-driving cars have been “trained” and tested so that the journalists had the opportunity to experience first hand the feeling of going for a ride within a automobile that had no human driver whatsoever. Here is a promotional <a href="https://www.youtube.com/watch?v=aaOB-ErYq6Y" target="_blank" rel="noopener">YouTube video</a> from regarding self-driving car Waymo project.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Security measures</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Although the developers behind the automated vehicles a.k.a. “Google cars” are confident in their creation, there will still be safety-drivers next to the regular people who will be some of the first to ever experience this new height of technology. Additionally, the driving will be done within a segregated area near Phoenix that is about 100 square miles big. However, there are plans for expanding the testing area to a wider radius which would allow the cars to collect more information that would later be used for improvements.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Level 4 autonomy</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">The industry of self-driving vehicles is rapidly growing and evolving towards the so-called Level 4 autonomy. What Level 4 autonomy basically means is vehicles that are capable of driving themselves through most conditions and roads (that would allow for normal driving anyway) without the assistance of a human operator whatsoever. Currently, Waymo seems to be on the right way towards this ultimate goal with its latest advancement in the field of self-driving automated vehicles. Only the future will show whether they would be the first to mass-produce and distribute this sort of technology. At this moment, most other companies that aim towards developing self-driving automobiles are rather cautious with their tests and plan on leaving a safety-driver behind the steering wheel up until at least 2020. However, Waymo apparently has other plans and so far they also seem to have the technology to back them up.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">When the self-driving cars get introduced to the masses</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">The potential for using automated vehicles is endless. For example, anyone would be able to access such a vehicle just like we use taxis today. Also, people who are unable to drive would still have the opportunity to travel from one place to another with their own car without the need for somebody else to drive the vehicle. This can also be useful for people who are having a night out and aren’t in the condition to drive a vehicle at the given moment. The possibilities are endless and the future in this area seems to be just around the corner. Whether automated cars would truly become a part of our everyday life as soon as it seems just like in some futuristic sci-fi movie is yet to be determined.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/waymo-google-self-driving-cars/">The future has arrived &#8211; Waymo / Google self-driving cars are now a reality</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/waymo-google-self-driving-cars/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to setup and use Amazon Alexa app for Android</title>
		<link>https://malwarecomplaints.info/setup-use-amazon-alexa-app-android/</link>
					<comments>https://malwarecomplaints.info/setup-use-amazon-alexa-app-android/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 13:31:57 +0000</pubDate>
				<category><![CDATA[How To:]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alexa]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[HTC U11]]></category>
		<category><![CDATA[Huawei Mate 9]]></category>
		<category><![CDATA[smartphone]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1572</guid>

					<description><![CDATA[<p>In the article we explain How to setup and use Amazon Alexa app for Android. Alexa is an AI assistant similar to Apple’s Siri and Microsoft’s Cortana. It is integrated within several devices such as the Amazon Echo which allows the user to give voice command that Alexa would recognize and execute. For example, you [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/setup-use-amazon-alexa-app-android/">How to setup and use Amazon Alexa app for Android</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">In the article we explain How to setup and use Amazon Alexa app for Android. Alexa is an AI assistant similar to Apple’s Siri and Microsoft’s Cortana. It is integrated within several devices such as the Amazon Echo which allows the user to give voice command that Alexa would recognize and execute. For example, you can tell the assistant to play music, issue commands to any of your home’s smart-devices, make online searches, order purchases online and many more. Тhere are dedicated devices that use Alexa such as the Amazon Echo but one can also download an the Android application Amazon Alexa and use that to control the assistant.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Currently, there are a couple of Android smartphones that have Alexa integrated within them so that the user can make voice command to their smartphone that Alexa would recognize and execute. The models that we are referring to are </span><b>HTC U11</b><span style="font-weight: 400;"> and </span><b>Huawei Mate 9</b><span style="font-weight: 400;">. However, the Amazon Alexa application can be downloaded and used on any modern Android device. Down below, we will go over the main functions of the application and we will show a tutorial on how you can set it up and use it to order commands to the Alexa assistant.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>Getting started</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Of course, before you do anything else, you’d need to download the actual app from the Google Play Store. </span><a href="https://play.google.com/store/apps/details?id=com.amazon.dee.app&amp;hl=en"><span style="font-weight: 400;">Here is a link</span></a><span style="font-weight: 400;"> that you can use to do that.</span></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"> Once you download the app and open it, the first thing that you’d need to do is fill-in your Amazon account’s username and password. If you don’t have an account yet, go ahead and make one. You will need to allow the application the required access permissions before you can use it so give your agreement so that you can open the app.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The next thing that you might want to do is take a look at the options available to you and get to know the application’s interface. Tap on the main menu (three lines, top-left) and you will see several options: </span><b>Music, Video and Books</b><span style="font-weight: 400;">; </span><b>Lists</b><span style="font-weight: 400;">; </span><b>All Skills</b><span style="font-weight: 400;">; </span><b>Smart Home</b><span style="font-weight: 400;">; </span><b>Settings</b><span style="font-weight: 400;">. Here is an overview of the main options available on Alexa and what you can do through them.</span></span></p>
<p><em><span style="font-family: helvetica, arial, sans-serif;"><b>Music, Video and Books</b></span></em></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">This where you can choose which music/video/e-book services to sign into or out of. However, one thing to note is that music services do not work for HTC U11 and Huawei Mate 9 so keep that in mind.</span></p>
<p><em><span style="font-family: helvetica, arial, sans-serif;"><b>Lists</b></span></em></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"> In </span>Lists<span style="font-weight: 400;"> you can see your shopping and to-do-lists with the entries that you have added through voice command (for HTC U11 and Huawei Mate 9) or manually with any other Android smartphone. There you can add, change or remove any of the list entries.</span></span></p>
<p><em><span style="font-family: helvetica, arial, sans-serif;"><b>All Skills</b></span></em></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The </span>All Skills<b> </b><span style="font-weight: 400;">section handles the third-party apps connected to Alexa. There are hundreds if not thousands of different applications that you can connect in order to add more functionality to the AI assistant. There is an </span><strong>All Skills</strong><b> </b><span style="font-weight: 400;">button at the top-right corner &#8211; tap on it in order to see what third-party applications you have installed.</span></span></p>
<p><em><span style="font-family: helvetica, arial, sans-serif;"><b>Smart Home</b></span></em></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Through </span>Smart Home<span style="font-weight: 400;">, you can manage the smart devices that are in your home &#8211; anything from your TV and security cameras to the vacuum cleaner and the lightbulbs (provided that they employ the smart technology). If you want to set up new devices and connect them to Alexa, tap on the </span><b>Discover </b><span style="font-weight: 400;">button. You can also organize the different devices into separate groups for easier control.</span></span></p>
<p><em><span style="font-family: helvetica, arial, sans-serif;"><b>Settings</b></span></em></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Settings<b> </b><span style="font-weight: 400;">allows you to alter other general Alexa options such as time zones, location, measurement system, etc.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>Conclusion</b></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">This is most of what the Android application for Amazon Alexa would offer you as functionality. However, if you are using either one of the two smartphone models that we mentioned above, there are some extra features that you’d get through the app. As we already mentioned, the most notable one are the voice commands. </span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">That being said, the functionality of the application is still limited when compared to the Alexa Echo speaker. For instance, the app cannot set reminders or be used for alarms. Also, as was noted earlier, the music services are limited for the two smartphone models that support Alexa voice-recognition. Still, though, it is a useful tool that would make integrating Alexa in your life even more effective.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/setup-use-amazon-alexa-app-android/">How to setup and use Amazon Alexa app for Android</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/setup-use-amazon-alexa-app-android/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Firefox 57 will add full Tracking Protection</title>
		<link>https://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/</link>
					<comments>https://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 13:28:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Mozilla Firefox 57]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tracking Protection]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1577</guid>

					<description><![CDATA[<p>Online privacy is quickly becoming more and more important as currently the methods of gathering personally-identifiable data are more than ever before. Browser tracking is one such method through which websites and web services can obtain private telemetry data regarding the user’s online activities and Internet habits. Though most of the time this wouldn’t really [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/">Firefox 57 will add full Tracking Protection</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">Online privacy is quickly becoming more and more important as currently the methods of gathering personally-identifiable data are more than ever before. Browser tracking is one such method through which websites and web services can obtain private telemetry data regarding the user’s online activities and Internet habits. Though most of the time this wouldn’t really affect one’s regular life, telemetry data collection is still considered to be a violation of one’s privacy (and rightfully so). Therefore, different software have been coming up with new ways to make their customers’ virtual life more secure and less exposed to data collection by third parties. One good example of this is the Mozilla Firefox browser &#8211; though there are many other browser programs out there that offer greater privacy, Firefox is still a good option for anyone who wants the functionality of a versatile and all-around browser while still having their personal space protected.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Firefox Tracking Protection</span></strong></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">As we already mentioned, many sites and online services try to obtain information related to your browsing habits and what you do online. This data is normally used for advertising purposes as this sort of information is highly valued by advertising distributors as it allows them to create targeted ads. Still though, having a browser that can protect you from unwanted collection of such information is always a good thing and Firefox is one of the browsers capable of doing it. The Privacy Protection feature blocks most trackers that try to keep tabs on your online activity which improves your overall privacy when on the Internet. While this feature isn’t flawless and doesn’t stop all forms of privacy intrusion, it is still good to have it in your arsenal.</span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">Firefox 57</span></strong></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The Tracking Protection feature for Mozilla Firefox isn’t anything new &#8211; it has been around for about three years as it was added to the program back in 2014. However, up until Firefox 57 &#8211; the upcoming update for the browser, the feature was only enabled by default for the Incognito Mode browsing. Although it was still technically possible to enable it for regular browsing, most users didn’t know about that option as the feature didn’t have a corresponding UI (User Interface) setting. With the release of the next version of the browser, Firefox 57, this is going to change as there will be three separate options for the Tracking Protection feature within the browser’s settings. The first one is labeled </span><b>Always </b><span style="font-weight: 400;">which will keep the Tracking Protection enabled for the whole browser, the second one is </span><b>Only in private windows </b><span style="font-weight: 400;">(Incognito Mode) and the third one is </span><b>Never</b><span style="font-weight: 400;">, meaning that the feature would be disabled if the user chooses that.</span></span></p>
<p><strong><span style="font-family: helvetica, arial, sans-serif;">How to enable it</span></strong></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Before Firefox 57, the user would need to execute several different tasks before they could enable the Tracking Protection for regular browsing and most customers didn’t know how to do it as it was certainly not intuitive and there wasn’t an actual button to do it from the settings menu. However, not all this will be made much easier when 57 gets released, all you’d have to do to enable the option is go to </span><b><i>about:preferences#privacy </i></b><span style="font-weight: 400;">(type it in the URL bar) and select the </span><b>Always </b><span style="font-weight: 400;">button to have the protection enabled at all times.</span></span></p>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/">Firefox 57 will add full Tracking Protection</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/firefox-57-will-add-full-tracking-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Watchdogs Free Licence for PC to Uplay clients</title>
		<link>https://malwarecomplaints.info/watchdogs-free-pc-uplay/</link>
					<comments>https://malwarecomplaints.info/watchdogs-free-pc-uplay/#respond</comments>
		
		<dc:creator><![CDATA[Boris]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 09:38:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[giveaway]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Ubisoft]]></category>
		<category><![CDATA[Uplay]]></category>
		<category><![CDATA[Watchdogs]]></category>
		<guid isPermaLink="false">http://malwarecomplaints.info/?p=1561</guid>

					<description><![CDATA[<p>Ubisoft has issued a Watchdogs free giveaway for PC and anyone who wants the game would be able to get it as long as they use Ubisoft&#8217;s Uplay client From 7th to 13th November. Regardless whether you are a hardcore gamer or just a casual user who likes to play video games every once in [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/watchdogs-free-pc-uplay/">Watchdogs Free Licence for PC to Uplay clients</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Ubisoft has issued a Watchdogs free giveaway for PC and anyone who wants the game would be able to get it as long as they use Ubisoft&#8217;s Uplay client From 7th to 13th November. </span></p>
<p><span style="font-weight: 400;">Regardless whether you are a hardcore gamer or just a casual user who likes to play video games every once in awhile, you have surely heard about the popular game called Watchdogs. In case you haven’t, the game revolves around a revenge-seeking hacker named Aiden Pearce who uses his advanced hacking skills to avenge the death of his niece. The game is rather unique as it incorporates some interesting mechanics allowing the player to hack different technology around the city of Chicago and use it to advance with the game. For instance, you can hijack cars, remotely control streetlights or hack into security systems to achieve your goal. Overall, it is an action-oriented game but it also requires some thinking and planning if you are to have success at completing it.</span></p>
<p><span style="font-weight: 400;"> Overall, the game had good reception and most players and critics gave it positive reviews. However, there have also been certain complaints regarding glitches within the game as well as certain graphics-related issues. Nonetheless, if you are into third-person, action-adventure games but also want to experience something different, then this game might be the right for you and there’s no better moment to give it a try than now.</span></p>
<h1><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1575" src="http://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2.jpg" alt="" width="1286" height="617" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2.jpg 1286w, https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2-800x384.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2-300x144.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2-768x368.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2-1024x491.jpg 1024w, https://malwarecomplaints.info/wp-content/uploads/2017/11/Capture-2-810x389.jpg 810w" sizes="auto, (max-width: 1286px) 100vw, 1286px" /></span></h1>
<h1><span style="font-family: helvetica, arial, sans-serif;">Watchdogs Free Licence</span></h1>
<p><span style="font-weight: 400;">The game’s developers, Ubisoft, announced that they would make a giveaway of Watchdogs licenses. Normally, the game costs 29.99 USD. However, from 7</span><span style="font-weight: 400;">th</span><span style="font-weight: 400;"> to 13</span><span style="font-weight: 400;">th</span><span style="font-weight: 400;"> November, Watchdogs will be available for free for anyone who wants to download it and play it. The only thing that is required in order to get Watchdogs free is to use Ubisoft Uplay. In order to get the game for free, you’d need to go to this </span><a href="https://freetrial.ubisoft.com/promotions/watch-dogs-1/8/"><span style="font-weight: 400;">page</span></a><span style="font-weight: 400;"> on Ubisoft’s site and register &#8211; you will get a free license for the game that you’d later be able to use while playing it through Uplay. After you have completed the registration, the game will get added to your Uplay library. With all that said, if you feel like trying it out, we advise you to hurry up and get the game while the Watchdogs free giveaway still lasts as it will be over in a week.</span></p>
<p><strong>Requirements</strong></p>
<p><span style="font-weight: 400;">For those of you who are wondering whether their PC could run Watchdogs, here are the system requirements for the game:</span></p>
<p><em><strong>Minimum system requirements</strong></em></p>
<ul>
<li><em><span style="font-weight: 400;">Processor: Intel Core 2 Quad Q8400 @ 2.66Ghz or AMD Phenom II X4 940 @ 3.0Ghz</span></em></li>
<li><em><span style="font-weight: 400;">Virtual Memory: 6 GB</span></em></li>
<li><em><span style="font-weight: 400;">Operating System: Windows Vista (SP2), Windows 7 (SP1) or Windows 8 (64 bit only)</span></em></li>
<li><em><span style="font-weight: 400;">Graphics Card: DirectX 11 graphics card with 1 GB Video RAM &#8211; Nvidia Geforce GTX 460 or AMD Radeon HD 5770 / Intel Iris Pro HD 5200</span></em></li>
<li><em><span style="font-weight: 400;">Sound Card: Yes</span></em></li>
<li><em><span style="font-weight: 400;">Free HDD Space: 25 GB</span></em></li>
</ul>
<p><em><strong>Recommended system requirements</strong></em></p>
<ul>
<li><em><span style="font-weight: 400;">Processor: Core i7 3770 @ 3.5Ghz or AMD FX-8350 @ 4.0Ghz</span></em></li>
<li><em><span style="font-weight: 400;">Virtual Memory: 8 GB</span></em></li>
<li><em><span style="font-weight: 400;">Operating System: Windows Vista (SP2), Windows 7 (SP1) or Windows 8 (64 bit only)</span></em></li>
<li><em><span style="font-weight: 400;">Graphics Card: DirectX 11 graphics card with 2 GB Video RAM &#8211; Nvidia Geforce GTX 560 ti or AMD Radeon HD 7850</span></em></li>
<li><em><span style="font-weight: 400;">Sound Card: Yes</span></em></li>
<li><em><span style="font-weight: 400;">Free HDD Space: 25 GB</span></em></li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://malwarecomplaints.info/watchdogs-free-pc-uplay/">Watchdogs Free Licence for PC to Uplay clients</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/watchdogs-free-pc-uplay/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
