New Windows 10 Upgrade message is as bad as some malware’

New Windows 10 Upgrade message is as bad as some malware’

Windows 10 Upgrade Screen Shot

Microsoft have been slammed by some technology experts in the latest attempt to persuade Windows 7 & 8 user’s to upgrade to Windows 10. Some critics have gone as far as comparing Microsoft’s tactics to those used by cybercriminals.

This outrage was triggered by the new upgrade message that has started to appear on Windows 7 & 8 PCs that suggests users have no choice but to upgrade. Under the heading ‘Upgrade to Windows 10’ there are two buttons giving users only two options ‘Upgrade Now’ or ‘Upgrade Tonight’.

At first glance, users might think they have no option but to upgrade by the end of the day. However, you can simply ignore the message and close it by clicking on the cross in the top right corner. Microsoft knows not many users will realise they can simply ignore and dismiss the message by simply clicking on the cross, so they will be forced to upgrade even if they don’t want to.

An angry user in Reddits’s Windows 10 forum has likened it to a ‘salesmen’s tactic’. He wrote “Assume the deal is closed and offer them the car in red or blue’.

Microsoft has also used another salesman-like ploy in some of there messages saying that ‘Upgrading to Windows 10 will be free for a limited time’ but the message fails to state just when the offer will end, even though Microsoft has announced that this will be 28 July 2016.

By doing this Microsoft hope it will coax many users into upgrading straight away, and they will not realise they still have over 6 months to decide.

Microsoft is ‘lying to its users’

Critics have said the message should contain a ‘no thanks’ or ‘not now’ button. One tech blogger has said ‘Microsoft’s marketing is ‘more reminiscent of malware than a leading technology company’, Gordon Kelly, accused Microsoft of “selling its users a lie” on

This is not the first time Microsoft has used this sort of tactic and am quite sure it will not be the last. An earlier message asked users to ‘Upgrade no’ or ‘Start download, upgrade later’.

Microsoft has defended its aggressive marking of Windows 10. In a statement to the Inquire website, Microsoft said: “the average user….. wants to make sure they have got the most secure and always up-to date version of Windows, and the feedback we get is that people want that to be as simple and seamless as possible”.

But this is unlikely to convince the rising number of Windows 7 & 8.1 users who are becoming increasingly angry by Microsoft attempts to force them to upgrade.


‘Upgrade now’ or ‘Upgrade tonight’: what kind of choice is that? Yes, there is a small cross you can click to close the message, but Microsoft is not stupid. They know thousands of PC users, are conditioned to click the ‘Upgrade now’ button. Microsoft marketing department may have approved of this upgrade trap, but is could have done lasting damage to the reputation of their new operating system. Many won’t stick with Windows 10 if they feel they have been tricked into upgrading.

Share Button

Switched You Phone Off? Hackers Can Still Spy On You

Switched You Phone Off? Hackers Can Still Spy On You


Security experts have detected a type of Android malware that is tricking people in to thinking they have turned off their phone.

When you press the ‘Power off’ button the malware will show you a fake box designed to look like the real Android ‘Power off’ Menu.

The phone then shows a black screen, and looks like it has been switched off. You won’t see any notifications or get any alert sounds.

However the phone is still switched on. The malware has actually inserted a line of code into the Android’s shutting down process that lets the hackers remotely access the devices, theoretically allowing them to do what ever they wanted to your device.

They could for example, make calls and send text messages to a premium-rate number, which could cost you a small fortune. In effect, your phone becomes a device the hackers can use to spy on you.

The malware which has yet to be named was discovered by security researchers at AVG. In a blog post they said it originated in an unofficial Android app store in China, infecting devices when users downloaded the malicious apps. AVG said the malware has already infected 10,000 devices worldwide, all of them running Android KitKat (4.4) or earlier, but they did not reveal which apps contain the malware.

The best way to stay safe is make sure you only install apps from the Google Play Store.

AVG said that its free ‘Antivirus for Android’ app will find and remove the malware. Other security experts have said the only way to be completely sure your phone is off it to remove the battery but this is not always possible on the new smart phones.

Unlike the criminals behind ransomware, these devious hackers don’t want you to know your device is infected, because the longer you remain oblivious, the more money they can steal off you. It is relatively easy to stay safe, Rather than just removing your battery at the end of every night, which is not always possible, simply restrict your app downloads to the Goole Play Store. Hackers are now finding it a lot harder to smuggle malicious apps past Googles Security.

Share Button

How to Spot a Fake App

How to Spot a Fake App


We all need to be careful as the next app we download could be a dangerous Trojan. Below I will explain how to spot fake or malicious apps for your phone or tablet.

Android malware is on the rise. Kasperkys (in partnership with Interpol) latest Mobile Cyber Threats Survey found there were six times the amount of malicious apps in July 2014 than in August 2013.

You can see the attraction of targeting Android devices from a hacker’s point of view. Your Android devices contains things like your personal details, logins and passwords, private notes, messages and of cause your photos, it could even be linked to your bank account or credit card too.

Hackers simply have to create a Trojan and disguise it as something you might want and they can then get their hands on all that valuable data. Facebook fakes, video apps and too-good-to-be-true antivirus apps are circulating in there thousands right now, just waiting for you to download and install them.

Hackers, like all conmen, give themselves away by making simple mistakes.

Its ‘Facebook’ but not as you know it

Genuine social apps never ask for 'device administrator' permissions

Genuine social apps never ask for ‘device administrator’ permissions

Mobile malware makers love Facebook. According to Cheetah Mobile the makers of Clean Master, no fewer than 15,000 fake social networking and messaging Android apps have appeared between January and August 2014, More than half of these were dodgy Facebook clones. Thousands more are pretending to be WhatsApp, Twitter and Instagram.

Hackers use the apps to steal your username and password, which they assume you are probably going to use the same details on other accounts to.

Malicious clones often have really poor spelling and badly reproduced branding, but you might not always notice this until its to late and you have downloaded the app and entered your password and username. By that time its to late as the app has done its job.

There are a few ways to check and see if a big-name app is the real thing before downloading it. First, see how many people have downloaded if from the Google Play Store. At the time of writing this the real Facebook app for Android has been downloaded almost 23 million times. If you are looking at a ‘Facebook’ app that has only been downloaded 200 times or only has a few “user” reviews its not the real deal.

You need to be wary of believing everything you read in the Play Store reviews. It’s very easy for app developers to buy fake reviews and ratings from feed back touts like App Reviews Mart, and get 5 star reviews from BestReviewApp. If in doubt its always best to click on the reviews name and see what else they have reviewed. If all there reviews are worded exactly the same or sound suspiciously generic (“Great App, Just what I needed”), take them with a large pinch of salt. You can report apps, reviews or comments that you think are suspicious to Google.

Lots of generic, short reviews may be a sign of a fake app

Lots of generic, short reviews may be a sign of a fake app

It’s not in the Google Play Store

If you are not sure that the brilliantly reviewed, but badly spelled app is legitimate, bookmark the Play Store page and then come back to it a few days latter. Fake apps don’t last long in the Play Store. Those that are not blocked instantly by Google’s app-scanning tool, Bouncer are usually removed within a few days according to F-Secure latest Mobile Threat Report.

Google can’t police the entire Internet; so bogus apps always find other ways to get distributed, like Facebook comments, emails, online adverts or an independent Android app website like AppBrain. All the fake apps identified by Cheetah, were downloaded from outside they Play Store.

Never download apps via adverts or links in Facebook Comments

Never download apps via adverts or links in Facebook Comments

Independent Android sites are not always dangerous, but please bare in mind they don’t scan the apps as thoroughly as Google. Earlier this year security firm Opswat found a third of all Android apps outside the Plat Store were infected with malware.

Similarly, if you are using an iPad you should only download apps from the App Store and iTunes (not that you get much choice). The tightly controlled nature of iOS tends to prohibit third party app markets and this helps keep hackers at bay, which I think is a good thing.

It’s too Good to be True

Hackers know that we can all be slaves to our desires, so if they promise to give you exactly what you want, you are less likely to trust your better instincts.

In June of last year, Ransomeware on Android arrived in the shape of Simlocker Trojan; it was packaged as a porn-video app. Not long after that, hacker’s striked again this time exploiting political fervor by spreading spyware among Hong Kong protesters, who thought they were downloading a pro-democracy app.

The Angry Birds Transformers app contained a "vandal' Trojan that destroyed data

The Angry Birds Transformers app contained a “vandal’ Trojan that destroyed data

You also need to be on the lookout for apparent collaborations, because in September last year, there was a new Angry Birds app called Angry Birds Transformers in the Google Play Store, which turned out to contain the Elite Trojan. Security researchers at Dr Web discovered the Trojan in October Last year and they categorized the Trojan as a “Vandal Program” as it destroys the victim’s data. When you launched the app for the 1st time it would ask for ‘device administrator’ permissions (These are normally only needed by apps that let you lock or wipe your phone remotely) and then immediately format your SD card if you have one installed, and block all of your messaging apps.

If an app ever says it can remove all of the manufactured pre-installed software with out you having to root you device or reveal who is looking at your Facebook profile, its lying!!


You Have Never Heard of it

New apps from companies you have never heard of that promise the earth are very unlikely to be what they seam. According to Kaspersky, fake antivirus apps are a big problem.

April Last Year, an antivirus app, called Virus Shield by the developer Deviant Solutions managed to sneak through Google’s app scanner and it was downloaded 30,000 times, and cost £2.38 the app its self was not malicious but it was totally useless (expect to its developer who became quite rich from it). When the scam was found Google was forced to refund all of the 30,000 customers who had purchased it.

Don’t be tempted by ‘novel’ antivirus apps. Most of the big antivirus companies out there make safe reliable tools to help protect your devices from malware and fake apps; they are also regularly updated to help keep your devices safe from the latest treats.

So be aware of the apps you are downloading are what they say they are. Stay safe and keep alert for the scammers, all they want is your money and to cause as much trouble as they can!!!!

Share Button

Are Scam Downloads Getting Harder to Spot?

Are Scam Downloads Getting Harder to Spot?

Scam Alert

Malwarebytes have revealed the latest strategy’s that are being used by scammers, which has worryingly shown that the scams are getting harder to stop.

You might have decided you need a new antivirus program from a trustworthy company like AVG, Malwarebytes, Norton or McAfee. It downloads without any problems, you accept the terms and conditions and the familiar installer starts, all seems to be going fine until half way through the installation when you get an error message that advises you to ring a phone number. You could easily think this is the antivirus helpline.

But you would be wrong! In fact this is the latest trick used by scammers to steal your money. The software is fake and if you call the number in the error message, you will get through to an Indian call center where they will tell you your computer is crawling with viruses and that they will clean if for a fee. Of course this is a lie.

This type of scam is easy to fall for, but what is worse is that fraudsters are starting to hack genuine security programs so that you pay them instead of the software company. Malwarebytes have detected criminals doing this. Senior security researcher Jerome segura, said: “A few weeks ago we documented a US-based company using our software against our Terms and Conditions. They were charging four times the price and worst of all the license keys were all pirated.”

Its not difficult for criminals to build fake programs that mimic legal ones. Egemen Tas, Comodo’s Vice President of Engineering said that Scammers don’t need to create a fake antivirus from scratch, instead they can “simply take a genuine AV product, modify it and distribute it”.

So how can you protect yourself? You should only download programs from the developers’ official site, or from a reputable site like CNet, TechSpot, or FileHippo. You also need to be cautious when using the Windows Store on Windows 8, as it was recently reported by technology site How to Geek as being filled with fake software.

Malwarebytes, which highlighted these scams on its blog, says that a fake version of genuine software will be flagged by Windows before you download it with the following message: ‘The publisher could not be verified’ or ‘driver have been altered’. These warnings mean the download has not been digitally signed by the programs developer, most reputable software should all be signed. You should click Cancel, not Run, and leave the box ‘Always ask before opening this file’’ ticked.

So despite the increasing deviousness of the scammers you can still shield yourself from their attack, Thankfully, it’s not impossible to spot them, but its definitely getting harder. So stay alert and above all keep safe from these scammers!!!!!

Share Button

Fix Your PC With a USB Stick

Fix Your PC With a USB Stick

PC Help

Do your family and friends always turn to you when their computers go wrong? Below I will tell you how you can fix a PC with a few good portable programs on a USB Stick.

If you are having problems with your computer you will properly turn to a trusted suite of programs, like CCleaner or CPU-Z ,and your antivirus software. But what do you do if the problem is on a friends PC or a laptop with precious little RAM? Easy, Just run your trusted suite of programs from a USB stick. CCleaner is a well-established Desktop program that can also be run from a storage device like a USB stick. Simply plug in your USB stick in to any computer and double-click on the program’s EXE (.exe) file to run the program.
That way there is nothing to install, and now junk will be left behind. Skype, LibreOffice and Firefox all have a portable version, but it’s the PC-fixing tools I am most excited about. While running Skype from a USB can be handy, running CCleaner from a USB could bring a friends PC back to life.

Find and kill viruses

The first step in troubleshooting a computer is to check for viruses and malware. McAfee Stinger is a free portable (standalone) antivirus from the same people that make McAfee Internet Security. Stinger’s tabbed window contains as many tools as you would find on any dedicated antivirus suite. You can scan a specific file or folder like the Registry or even the USB stick it’s located on. If Stinger does find any dubious files, you can kill them or quarantine them just like the full version of McAfee.

Panda Cloud Cleaner Portable (click the second blue Download button) will also let you specify directories to scan and clean. It’s not as powerful as Stinger but it will verifie the results in the clould to help avoid false positives. Trend Micro’s Portable bug identifier HijackThis will look for any unauthorized settings or modifications, as they can be evidence of malware, and log them in a report. It can also scan for data, like metadata that is embedded in files, and not visible in Windows Explorer, this can often get missed by other malware scanners.

Just keep in mind that sometimes-portable programs can be flagged as malware by some antivirus suites. The irony is that portable programs are often more secure as you can run them with out having to connect to the Internet or installing files hackers could exploit.

Diagnose the problem

cpu-z-01-557x535After you have ruled out viruses or malware, you can use CPU-Z portable to get real-time information about any computer its run on, like temperature to the status of any drivers (click Tools, then “Check for Driver Updates’), you can save the report as a text file (simply click ‘Save Report as .TXT from the tools menu) or print it if you need to go shopping for new parts. You could even give a copy to the owners of the PC for their own reference.

When you are on the CPU-Z download page, make sure you only click on the purple “Download Now!’ button as everything else is an advert. Once downloaded, extract the Zip then double click on the 32but or 64bit EXE (depending on the system you are running it on) to run the program.
The portable version of Speccy will generate a less comprehensive but easier to follow report then CPU-Z, and the latest version will now let you see the computers MAC Address.

The new USB auto-installer version of Memtest86+ is a tiny program that can check PC’s RAM. It’s extremely easy to run but it’s a little more complicated to set up than Speccy or CPU-Z. The EXE file is actually the installer, and it will only install the program on a USB stick. You will want to make sure you have a USB stick plugged in before you double-click on the EXE file, when the installer runs you will want to ‘Select your USB Flash Drive’, then click on Create to install Memtest on the USB stick.

Remove hidden junk

CCleanerA hard drive clogged with software is one of the most common causes of PC performance problems. So you will want to completely remove stubborn programs and make sure there are no left overs and the prortable version of CCleaner will help. When you first run CCleaner it will offer to scan ‘intelligtly’ for cookies that you want to keep (this is a good thing if you want to clear out the cashes and other browser related junk but keep your logins.)

If you find you ever accidently delete any important files when clearing out junk or accidently deleted a load of family photos the Recuva is the program you need. Its especially useful for recovering files from a computer that won’t let you install software on its hard drive.

Share Button