Connect with us

Technology

DNS Changer Virus: FBI Removal Tips & How To Check If You’ve Got Malware

Published

on

DNS Changer Virus Removal

People are starting to pay attention to the information about the DNSChanger Virus that has infected hundreds of thousands of systems in the United States and around the world. There could be up to 4 million infected hosts throughout the world.

On July 9th, 2012 if you haven’t checked your system for the DNS Changer Virus and you have it, you will not be able to use the Internet. The effected systems are Windows or Mac systems. This means that if you access the Internet from an iOS device, Linux or from an Android OS device you’re good to go and are not infected.

So why won’t your computer be able to access the Internet if you have the DNS Changer Malware? Your DNS settings are changed by the virus rerouting you to hijacked servers that serve ads from the hackers that have amassed millions in ad dollars. The FBI took over these hijacked servers and have started making people’s computers infected by the virus go to destinations without ads.

The government can’t afford to continue to operate all of these servers so they’re turning them off on July 9th, 2012 and at that point infected computers will be trying to access a server that doesn’t exist.

So let’s get the DNS Changer Virus removed from your system. We have provided some videos below to walk you through how to get it removed from your system as well as resources from the FBI Removal page that describes what actions you can take.

The information on the FBI page that is called Check To See if Your Computer is Using a Rogue DNS states:

“The FBI is seeking information from individuals, corporate entities, and Internet Services Providers who believe that they have been victimized by malicious software (“malware”) related to the defendants. This malware modifies a computer’s Domain Name Service (DNS) settings and thereby directs the computers to receive potentially improper results from rogue DNS servers hosted by the defendants.

If you believe you have been victimized in this case, please type your DNS information into the search box below.

Information on how to determine your DNS settings, along with other technical details about DNSChanger, can be found at www.fbi.gov/news/stories/2011/november/malware_110911/dns-changer-malware.pdf.”

The easiest way to check if you’ve got the DNSChanger Malware is to go to:

http://www.dns-ok.us

If you see a screen that looks like our above graphic you are good to go. You should still probably get some anti-virus software and malware removal software to remove any spy programs or hidden trojans on your PC. When issues like the DNS Changer virus come up it’s always a good reminder to make sure you’re protected and your computer is safe from hackers.

There are popular products that will protect your computer all the time from viruses, trojans, spy programs and a lot more. Some of the best rated products are created by companies like Kaspersky and Norton. Kaspersky Internet Security 2012 and Norton Internet Security 2012 are quick to download and will provide you with premium protection from just about anything you might run into.

We’ve also provided a video below of how to remove the DNSChanger Virus with free software and removal tools:

How to Remove The Trojan.DNSChanger Virus?

This video provides instruction on how to remove the Trojan.DNSChanger virus.

A popular comment on this video also mentioned this: “I use Spybot – search and destroy, it’s free and i haven’t had any problems because it takes care of any spyware/malware that infects my computer without me knowing. (Microsoft security Essentials is also an excellent free antivirus)”

Click to comment

0 Comments

  1. Thomas

    April 25, 2012 at 10:59 pm

    Now remember mal-warebytes does not prevent mal-ware or spyware, it just helps to detect it and delete what it can detect. So try to run it at least once a week. All anti-viruses are not 100% fail-safe so just be careful what sites you go to and what ads you choose to click on. Another way for these evil people to get you to download their crap is they will put a pop up on your computer about anything; they will have it configured so that the X on the top right hand of that window is actually a confirm button. So when you click on it you are actually telling your computer that you are authorizing that page to download what ever it wants to. So the best thing to do when you see a pop up window is to just shut restart the computer. Also remember that a free anti-virus is free for a reason. Don’t trust you security to free unless you are not afraid to lose that information.
    Office Depot= free pc check up and tune up.

  2. Derek

    April 25, 2012 at 8:46 pm

    Well, well… thank you! This article actually helped me out. Apparently I did have the DNSChanger virus crap on my computer. I was able to see by referencing the site you guys listed above. I did use the video you listed to get it removed but got confused at first. After I cleaned this junk off my computer I went and bought some good anti-virus software, this won’t happen to me again. I am still really confused how I got this virus on my computer in the first place. Probably my stupid brother!!!!

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Mozilla Will Roll Out A Feature That Would Alert Users If They Passwords Were Compromised

The new feature is expected to rolled out with Firefox 70.

Published

on

Photo: Mozilla Website

In the age where the majority of human life is centered around the internet, passwords are one of the most important things to secure, especially that data breaches and system infiltrations seem to become a commonplace. In order to protect user passwords, Firefox is launching a feature that would alert the user who saves their passwords in the browser whenever those passwords have been compromised in a breach.

Last year, teach giant, Mozilla Firefox have collaborated with Hunt to develop a built-in password monitoring feature that would alert users if their passwords were part of a publicly disclosed breach. Furthermore, the Monitor tool from Firefox would send users notifications to users whenever the saved data in their system has the potential to be compromised aside from running a scan retroactively.

“It can be hard to keep track of when your information has been stolen, so we’re going to help by launching Firefox Monitor, a free service that notifies people when they’ve been part of a data breach. After testing this summer, the results and positive attention gave us the confidence we needed to know this was a feature we wanted to give to all of our users,” reads a blog post from Mozilla.

Now, Mozilla Firefox is said to be in the works to integrate the feature to Lockwise password manager, a system that protects and encrypts users passwords. They are working on launching the new feature along with the new version of the browser, the Firefox 70.

The feature works with cross-referencing data with the popular data breach database, Have I Been Pwned. The integration will scan and detect all saved login credentials in both Locwise password manager as well as Mozilla Firefox browser and cross-referencing those entries to a massive database of data leaks reported by Have I Been Pwned, while simultaneously and continuously alerting users if a match has been made.

“Visit monitor.firefox.com and type in your email address. Through our partnership with Troy Hunt’s “Have I Been Pwned,” your email address will be scanned against a database that serves as a library of data breaches. We’ll let you know if your email address and/or personal info was involved in a publicly known past data breach. Once you know where your email address was compromised you should change your password and any other place where you’ve used that password,” explains Mozilla on how the Monitor works.

According to Mozilla, Firefox Monitor has already had 635,000 people have signed up for alerts, and they are expanding with Lockwise to increase this number and help people secure their passwords.

The notifications and alerts will be curated in the Firefox Monitor Dashboard. Through the breach dashboard, users will receive a quick summary of updates for all registered email accounts and passwords. They will be able to easily identify which emails and passwords are being monitored, how many known data breaches may have exposed their information, and specifically if any passwords have been leaked across those breaches.

“Being part of a data breach is not fun, but keeping track of and knowing where your private information may have been made public is one of the first steps in taking control of your online privacy,” Mozilla penned in a blog post.

However, for Locwise users, the monitoring will not work retroactively. That means that users have to manually check if their passwords were part of an older breach.

Nonetheless, the new feature has been updated to include more detailed stats will also be displayed on the extent of the impact on your account, including the number of email addresses affected, amount of breaches they are involved with, and the number of passwords exposed in the breaches.

For those who are wondering how Mozilla will be handling the submitted emails to their monitoring system, they said that they would do their best to protect the emails submitted for scanning.

“If you’re wondering about how we’re handling your email address, rest assured we will protect your email address when it’s scanned. We talked about the technical details on how that works when we first launched the experiment. This is all in keeping with our principles at Mozilla, where we’re always looking for features that will protect people’s privacy and give them greater control when they’re online.”

Firefox 70 is expected to be out in October.

Continue Reading

Technology

Study Finds Google And Facebook Trackers In Porn Sites

Google and Facebook are watching you watching porn.

Published

on

Photo: Gonçalo Nobre | Flickr | CC BY 2.0

The success of online advertising relies on the ability of advertisers to track the online behavior of their target market. And to do this; they have to clip in several trackers all around the internet to ping back a response that gauges a target customer’s online presence. However, a recent study suggests that these trackers are also present in porn sites that allow massive advertising platforms like Facebook, Google, and Oracle to track people’s pornographic behavior.

The study entitled “Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites” suggests that a massive number of porn sites available on the internet contain ad pixels that can be traced back to the three mentioned above companies. Researchers from Microsoft, Carnegie Mellon, and the University of Pennsylvania scanned 22,484 porn sites, and they found out that these sites are platforms for Facebook, Google, and Oracles to track people’s porn-viewing.

“Our analysis of 22,484 pornography websites indicated that 93% leak user data to a third party. Tracking on these sites are highly concentrated by a handful of major companies, which we identify. We successfully extracted privacy policies for 3,856 sites, 17% of the total. The policies were written such that one might need a two-year college education to understand them. Our content analysis of the sample’s domains indicated 44.97% of them expose or suggest a specific gender/sexual identity or interest likely to be linked to the user,” the study’s abstract stated.

The study reveals that out of the more than 22 thousand porn sites examined by the researches, 16,638 sites had Google trackers, 5,396 had Oracle trackers, and 2,248 Facebook trackers. Researchers warned that this information leak should be extremely worrying for many users: “The fact that the mechanism for adult site tracking is so similar to, say, online retail should be a huge red flag.”

“These porn sites need to think more about the data that they hold and how it’s just as sensitive as something like health information. Protecting this data is crucial to the safety of its visitors. And what we’ve seen suggests that these websites and platforms might not have thought all of this through like they should have,” said Elena Maris, a postdoctoral researcher at Microsoft and the study’s lead author.

According to the researchers, people generally think that the websites they visit are owned by one single entity. However, they are not aware that most of the sites on the internet have third parties installing their hidden codes. Such “third-party” code can allow companies to monitor the actions of users without their knowledge or consent and build detailed profiles of their habits and interests. Such profiles are often used for targeted advertising, for example, by showing ads for dog food to dog owners.

And advertising is where platforms like Facebook and Google earns much of its revenue. “Many websites and apps have revenue-sharing agreements with third-party advertising networks and gain direct monetary benefit from including third-party code,” the study suggests.

However, in a statement, a Google spokesperson denied that they allow their advertisers to run ads in sexually explicit websites and porn sites. “We don’t allow Google Ads on websites with adult content, and we prohibit personalized advertising and advertising profiles based on a user’s sexual interests or related activities online. Additionally, tags for our ad services are never allowed to transmit personally identifiable information to Google.”

Similarly, Facebook also echoed the same statement saying that the company’s ad Community Guidelines does not allow running Facebook trackers on adult websites and pornographic hubs. Facebook’s pixel tracker is, however, can easily be installed on any website, but Facebook claims not to track data collected from pornography websites.

Nonetheless, the researchers said that the results of their study suggest that there are indeed tracking codes in the porn sites they have scanned. Moreover, they said that their results have opened to different implications. Most of these implications revolve around the risk of tracking pornographic behavior as well as to the process of giving out consent to being tracked.

“We identify three core implications of the quantitative results: 1) the unique/elevated risks of porn data leakage versus other types of data, 2) the particular risks/impact for vulnerable populations, and 3) the complications of providing consent for porn site users and the need for affirmative consent in these online sexual interactions,” they concluded.

Continue Reading

Technology

FaceApp And The Double Standards Against Tech Startups — An Opinion

FaceApp is crucified for doing the exact same thing as other photo-sharing platforms like Facebook and Instagram.

Published

on

Photo: charlene mcbride | Flickr | CC BY 2.0

There’s much speculating about how the popular photo-manipulation app, FaceApp, would use the data it collected from users who used the platform to take a sneak-peek of how they would look like in the future.

Following the success of the small-time Russian app on social media platforms like Facebook, Instagram, and Twitter; many have raised concerns regarding how the app could potentially be a privacy and security risk for users. After the news broke out, major news outlets shared their opinions of how the app has gained access to a dataset of photos from millions of people and how the app can use the materials without the owner’s concern — which is clearly stated in the app’s terms and conditions.

By submitting your photo to the app, you “grant FaceApp a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable sub-licensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, publicly perform and display your User Content and any name, username or likeness provided in connection with your User Content in all media formats and channels now known or later developed, without compensation to you.”

The issue of FaceApp being blown out of proportions highlights the fact that people don’t really care about their online security and privacy. Many of the app’s users responded with a blunt “I don’t care” to the news that FaceApp could potentially compromise their data.

Double standards vs. FaceApp

However, one of the most untalked elements of the issue is how it highlights the double standard that people impose on small-time developers and tech startups, as compared to tech superpowers like Facebook, Google, and Youtube.

In the get-go, it is clear that there is a potential security risk involving FaceApp and the fact that it is connected to a Russian company. However, these risks are also present in models of massive tech companies, especially social media and photo-sharing platforms like Facebook and Instagram.

Facebook and Instagram, as platforms where users freely “upload” and share photos (and other data) of themselves, process millions of terabytes of data every day. These two platforms have access to a much more significant database of photos that can be compromised at any time.

If you come to think of it, the risk in sharing your photo on Facebook and Instagram is much damning than when you use FaceApp. But we have not heard the media calling out Facebook and warning people not to upload their photos on Instagram.

The risk is the same.

The difference between Facebook and FaceApp is that Facebook (and Google) has a history of selling your data to third parties. Last year, Facebook faced the US government for allegedly selling US citizens’ data to Cambridge Analytica, a British PR firm accused of helping the Russians and Donald Trump influence public opinion through fake news, and a series of anti-Hillary campaigns.

Another argument used against FaceApp is that it asks a series of permission, including access to a user’s camera roll. They stipulate that once given this access; the app would have the capability to gain unauthorized access to all the photos saved on the user’s device.

In a statement, FaceApp clarifies that the permission was necessary for them to gain access to the photo selected by their users. FaceApp added that the app “performs most of the photo processing in the cloud, upload a photo selected by a user for editing, and never transfer any other images from the phone to the cloud.”

While this is indeed a sketchy practice, it is also worthy to note that Facebook and Instagram also ask for this permission. Meaning, they too have access to the plethora of photos (embarrassing or not) saved in a user’s phone. And again, we don’t hear media and experts telling us not to upload pictures on Facebook and Instagram, nor are they stopping us from giving that permission to those social media giants.

This is a reality for small-time developers and tech start-ups. Often, when they release innovation, people quickly become too skeptical and raise concerns about their new product.

But this does not go to show that we should stop criticizing technology. At all cost, we should. The only problem with the reality right now is that we burden budding technology with so many things to prove while we let established tech companies get away with the exact same thing.

The bottom line is that if we are going to tell people to be vigilant of FaceApp, we should not single the app out. Instead, we should tell people to be watchful of the risks that come with all technology — including those that are produced by large tech companies.

Continue Reading

Trending