Over 1 million tech questions and answers.

Cloud data security still a challenge

Q: Cloud data security still a challenge

Cloud data security still a challenge;
Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive data in the cloud.
These are just a few findings a Ponemon Institute study titled ?The 2016 Global Cloud Data Security Study,? commissioned by Gemalto. The study surveyed more than 3 400 IT and IT security practitioners worldwide to gain a better understanding of key trends in data governance and security practices for cloud-based services.

According to 73% of respondents, cloud-based services and platforms are considered important to their organisation?s operations and 81% said they will be more so over the next two years. In fact, 36% of respondents said their companies? total IT and data processing needs were met using cloud resources today and that they expected this to increase to 45% over the next two years.
Although cloud-based resources are becoming more important to companies? IT operations and business strategies, 54% of respondents did not agree their companies have a proactive approach to managing security and complying with privacy and data protection regulations in cloud environments. This is despite the fact that 65% of respondents said their organisations are committed to protecting confidential or sensitive information in the cloud. Furthermore, 56% did not agree their organisation is careful about sharing sensitive information in the cloud with third parties such as business partners, contractors and vendors.

?Cloud security continues to be a challenge for companies, especially in dealing with the complexity of privacy and data protection regulations,? says Dr Larry Ponemon, chairman and founder of the Ponemon Institute. ?To ensure compliance, it is important for companies to consider deploying such technologies as encryption, tokenisation or other cryptographic solutions to secure sensitive data transferred and stored in the cloud.?
?Organisations have embraced the cloud with its benefits of cost and flexibility but they are still struggling with maintaining control of their data and compliance in virtual environments,? says Jason Hart, vice-resident and chief technology officer: data protection at Gemalto.
?It?s quite obvious security measures are not keeping pace because the cloud challenges traditional approaches of protecting data when it was just stored on the network. It is an issue that can only be solved with a data-centric approach in which IT organisations can uniformly protect customer and corporate information across the dozens of cloud-based services their employees and internal departments rely every day.?

Key findings of the study include:
* Cloud security is stormy because of shadow IT ? According to respondents, nearly half (49%) of cloud services are deployed by departments other than corporate IT, and an average of 47% of corporate data stored in cloud environments is not managed or controlled by the IT department. However, confidence in knowing all cloud computing services in use is increasing. Fifty-four percent of respondents are confident that the IT organisation knows all cloud computing applications, platform or infrastructure services in use ? a nine percent increase from 2014.

* Conventional security practices do not apply in the cloud ? In 2014, 60% of respondents felt it was more difficult to protect confidential or sensitive information when using cloud services. This year, 54% said the same. Difficulty in controlling or restricting end-user access increased from 48% in 2014 to 53% of respondents in 2016. The other major challenges that make security difficult include the inability to apply conventional information security in cloud environments (70% of respondents) and the inability to directly inspect cloud providers for security compliance (69% of respondents).

* More customer information is being stored in the cloud and is considered the data most at risk ? According to the survey, customer information, emails, consumer data, employee records and payment information are the types of data most often stored in the cloud. Since 2014, the storage of customer information in the cloud has increased the most, from 53% in 2014 to 62% of respondents saying their company was doing this today. Fifty-three percent also considered customer information the data most at risk in the cloud.

* Security departments left in the dark when it comes to buying cloud services ? Only 21% of respondents said members of the security team are involved in the decision-making process about using certain cloud application or platforms. The majority of respondents (64%) also said their organisations do not have a policy that requires use of security safeguards, such as encryption, as a condition to using certain cloud computing applications.

* Encryption is important but not yet pervasive in the cloud ? Seventy-two percent of respondents said the ability to encrypt or tokenise sensitive or confidential data is important, with 86% saying it will become more important over the next two years, up from 79% in 2014. While the importance of encryption is growing, it is not yet widely deployed in the cloud. For example, for SaaS, the most popular type of cloud-based service, only 34% of respondents say their organisation encrypts or tokenises sensitive or confidential data directly within cloud-based applications.

* Many companies still rely on passwords to secure user access to cloud services ? Sixty-seven percent of respondents said the management of user identities is more difficult in the cloud than on-premises. However, organisations are not adopting measures that are easy to implement and could increase cloud security. About half (45%) of companies are not using multi-factor authentication to secure employee and third-party access to applications and data in the cloud, which means many companies are still relying on just user names and passwords to validate identities. This puts more data at risk because 58% of respondents say their organisations have third-party users accessing their data and information in the cloud.

The new realities of cloud IT mean that IT organisations need to set comprehensive policies for data governance and compliance, create guidelines for the sourcing of cloud services, and establish rules for what data can and cannot be stored in the cloud.

RELEVANCY SCORE 200
Preferred Solution: Cloud data security still a challenge

I recommend trying the free service from Zip Cloud. It's currently our users' favorite backup and storage solution and will save you headaches down the line.

You can get it direct from this link http://goo.gl/rFYDxc. (This link will open the Zip Cloud homepage.)

A: Cloud data security still a challenge

Thanks for sharing

As a paranoid penguin, I never use cloud data storage
(I must also admit that I have no need to share data with other devices by cloud )

For some companies, I think it's safer to backup their data on their own "cloud".

Read other 5 answers
RELEVANCY SCORE 57.2

I have applied Microsoft security baseline to Windows 10 IoT.


Can anyone please provide a workaround or a solution to revert back the system to previous/original state?
(Any way which can basically revert the system + group policy + registry settings back to the way it was before applying security baselines)

PS: Microsoft compliance toolkit itself does not have this option which is why I have mention even a workaround would help if you know any.

Note: Just reversing GPO will not help. We will need to revert GPO + registry + (potential changes introduced by baseline).

Read other answers
RELEVANCY SCORE 55.2

Hi,

I am using Outloook 2010 and recently I have installed Business Contact Manager 2010. I have entered all my customer data and now I discovered that I made a some big mistakes:

I have modified the Business Contact form and filled the Company details in there and also the contacts belonging to the company. As a result of the modification I have many new fields (which is not a problem) and lost some important fields including email, address (i have replaced these for new fields that I created myself).

Of course, I should have kept the important fields such as address and email, etc. and I should have created an account for each company and fill in the details in the Account form. Then create a business contact and fill in the contact details in the Business Contact form and add these to the accounts.

I want to open each Business Contact Form and copy and paste the company details into a new created account via the Account form. Then I want to create a new business contact WITH THE STANDARD BUSINESS CONTACT FORM and copy paste the contact details from the MODIFIED BUSINESS CONTACT FORM into it.

My problem is: how can I have the standard business contact form and the modified business contact form at the same time? I could reset the modified form to get the standard form but then I lose the contact details before I pasted them into the standard form..

I hope someone knows a solution as I spent 60+ hours on this already.

I have attached a screenshot of the modifie... Read more

A:BCM 2010 data entry challenge

There is a wealth of information on using Business Contact Manager in the following link:
Business Contact Manager for Outlook 2010 - Outlook - Office.com

I hope you find an answer there.

Read other 3 answers
RELEVANCY SCORE 52.8

Ok, heres the problem...I have a laptop I received from a friend that wont boot into XP Pro. No matter what I do it BSOD, you name it does it...Safe Mode, Recovery Consule, etc...Im 90% sure it has a virus (he used kazaa alot with no protection) The BSOD error is Stop: 0x0000007B. The file system is NTFS and im having troubles getting into DOS to try a few commands. I am wondering if there is any way to salvage this comp without wiping the drive clean and reformatting? If there is no way to fix this, is there a way to recover the CD Key at all? (dummy lost it). Thanks for the help
 

A:I challenge you, security guru's!

Read other 11 answers
RELEVANCY SCORE 52.8

Hi Guys

I have question for G-Data security, is this the product use database cloud option??

Thanks
 

Read other answers
RELEVANCY SCORE 52.8

Hello guys, I am new here and I am wondering if someone could help me with the following:

I have been using my old windows live account to access both my Windows 8 desktop and laptop. So far everything has been working nicely.

As of late I have found my Metro menu to be somewhat too cluttered, and me being the control freak I wanted to start over and have all settings restored and get a feel how it all works but I got stuck down the road. Things keep coming back!

I want to reset my Windows 8 and use my live account and have the same desktop/metro as a person that did a fresh install of windows 8 and used a new live account. Is this even possible? There must be a way to clear/reset/wipe the information stored on my live account that relate to anything Windows 8 related (desktop/metro). Or is there an other way to tackle this?

Any input is appreciated, thanks!

A:Cloud data; how do I reset it?

Welcome.

You can 'reset' Windows 8 to defaults. Take a look at Reset Windows 8 for more information. As far as your 'Live' account is concerned, as far as I'm aware, there's nothing, specifically related to Windows 8, stored in the account, however, the email address used for logging on to Windows 8 is also your Windows Live ID.

Read other 2 answers
RELEVANCY SCORE 52

Quote:
What happens to data when your cloud provider evaporates?

There's no way to directly migrate data between service providers

By Lucas Mearian


cont on link

A:What happens to data when your cloud provider evaporates?

Evaporation process huh ?

Read other 6 answers
RELEVANCY SCORE 52

This maybe overly ambitious, but of late I've become interested Linux across cell phone. Laptop, and desktop. Integrating said devices via Cloud with Blue tooth, WIFI, and Internet. I'm a fan of open computing since my days with CP/M. It appears that soon Linux(Ubuntu) will be available on phones, and already has desktops, laptops, Cloud computing. It seems like it shouldn't be far away that synching data could be done across devices seamlessly. One OS to deal with no more loss data. In addition I read an article in Information Week about accessing 'Big Data' for accurate and current phone location coverage.

Thoughts?

Larry
 

Read other answers
RELEVANCY SCORE 51.6

Hi everyone, thanks in advance for any help. I'm running Vista Home Premium, version 6 on my laptop and got the above mentioned malware. Thanks to the removal info I found here I got it zapped (used malwarebytes) and all is well...except I can't use google or yahoo search (screen comes up "not found" like you had typed in an invalid url). I read that this malware kept you from using them so you couldn't get help, and am wondering if my glitch is a leftover from the malware attack...something that didn't quite get all the way removed. Subsequent scans show no malware so I'm feeling good about that, but am not sure where to go from here. I tried downloading firefox (yea, I was using IE) and when I try to install it it says I need the admin password, which I can't remember as I've never used that account (won't let me install on the normal account I use) which I don't remember having to do when I put firefox on my home computer...is that another possible suprise left over? Hope I was detailed enough and appreciate any ideas. Thanks, Kent

A:Vista Internet Security 2012 challenge

Sorry, just realized I put this in the wrong area.

Read other 3 answers
RELEVANCY SCORE 51.6

I am looking forward for some guidance on what is fully virtualized data center. I had some discussion with one of cloud service provider www.broadaxis.com they explained it very well to me but I am looking for some more views as well.

Read other answers
RELEVANCY SCORE 51.6

I was infected with Data Restore virus. Followed self-help steps and removed it, but browser redirects of FF, Chrome and IE remained. While trying to learn how to remove the browser redirect, I was hit with Open Cloud AV.

Malwarebytes will not run.TDSSkiller will not run. GMER ran a scan for about 20 or so minutes and shut down.

DDS log:

.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_20
Run by dlhoste at 12:36:44 on 2011-10-03
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.1052 [GMT -5:00]
.
AV: AVG Anti-Virus Free *Enabled/Updated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
svchost.exe
svchost.exe
C:\WINDOWS\1939459691:2486265484.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uDefault_Page_URL = www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3061029
mDefault_Page_URL = hxxp://www.dell.com
mDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = hxxp://www.dell.com
uInternet Settings,ProxyOverride = ;*.local;<... Read more

A:Infected with Data Restore then Open Cloud AV

Attach.txt not included in origin post.

Sorry.

Read other 5 answers
RELEVANCY SCORE 51.6

When I bought my new laptop with Windows 8 preferred me to create a Microsoft Account and use it to sign each to access Windows. After doing some reading I understand it syncs things like personal settings such as wall paper, font etc. What else does it sync? For example it seems to automatically connect other Microsoft products to the Microsoft Account used to log in to Windows, for example it automatically signed in Onenote which now stores notes in the cloud.

Does signing through a Microsoft Account backup programs and data of other programs? For example if I installed Adobe Photoshop and created a image using it and had my laptop stolen, would it have automatically be saved to the cloud?
 

Read other answers
RELEVANCY SCORE 51.2

A password manager is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database. Some password managers store passwords on the user's computer, whereas others store data in the cloud. While the core functionality of a password manager is to securely store large collections of passwords, many provide additional features such as form filling and password generation.

I am using LastPass extension for Google Chrome and it saved me a lot of work and write. At the same time, I allow it to generate unique strong passwords with enough length, up and down cases, numbers and symbols.
For the sites like Facebook, Youtube, MalwareTips and others I visit often I have my own way of creating a strong password with a combination of those letters above.

Well, as you already know probably, LastPass has a nifty option to check your passwords, for duplicates, weaknesses, and if your accounts/passwords were included and leaked in some attacks, and became vulnerable, recommends changing the passwords for them.

All you need to do is :

Log in to your LastPass Account entering your email and your master password
Click on LastPass extension button
Click on Tools and then Security Check






Finally, click on Get Your Score. LastPass will ask you to enter your master pass... Read more

A:LastPass Users, Post Your Security Challenge Score

My score is 24.4%
My Rank 825,620th
LastPass Master Password Strength - 91% - Very Strong

 

Read other 45 answers
RELEVANCY SCORE 51.2

Hi all, I am a newbie to the forum and believe I am in the right forum.
I truly need your help on this one.
My computer is a sony vaio I refurbished 5 years ago. I use primarily for my business (QB's) and gaming and internet. Nothing has ever happened to my computer, ever. I have Verizon and chose fiber optics, along with Verizon security and firewall. I do not use Outlook and view my email online at Verizon.net.
A few months ago, this pesky pop-up (AIM (AOL) security message)relentlesly showed up every few minutes and I clicked it off. Just pesky and I could never seem to get rid of it and never opened it up; and my computer never showed signs of intervention.
Last night my 12 and 13 year old boys were checking out MY Space (for kids) and shut down the computer.
This morning when I started my computer, the Welcome to Sony page appeared. When I tried to start in Safe mode, the computer wanted a disk in the A/drive. ?????
I then proceeded without enabling the drive and it wanted to begin as though I had just purchased the computer and took me through the entire set-up process. Nothing is there. All my files are gone. All my programs have been deleted. What is going on and what happened? Can that virus do this? Or did someone hit a few buttons that made my system go back to "System Recovery"? Can anyone shed some light on what happened?
I truly appreciate your feedback.

A:Security challenge for me...hard drive wiped clean

This information won't help you, other than to confirm your findings. My daughter was at a relatives house & using myspace last week and their hard drive was completely wiped clean, same as what you experienced.

Yesterday she was on my computer - again, on myspace, and my hard drive was totally wiped. I lost EVERYTHING. 2 hard drives in 2 weeks, both after visiting myspace.

Anyone know anything about what is going on? Can I repartition this drive & use it, or is there a virus that will still reside on the drive & I should just junk it? We need help!

Read other 2 answers
RELEVANCY SCORE 51.2

I invite those of you who have 64-bit windows to test your ESET Smart Security.

download the Security Software Testing Suite 64(ssts64.7z) here http://www.matousec.com/downloads/

unpack the 7zip file to a specific folder. Name the folder as "ssts64" and save the entire folder into C drive.
edit "ssts64.conf" file(recommend using Notepad++ for editing) into the following - http://pastebin.com/pKfvaecL , assuming you are using default installation setting for your ESS or run "Configurator.exe" to generate the config.
now copy the config file and paste into Level-01, Level-02, Level-03......Level-11 folders.
hit "windows-key + r" type cmd to run command prompt. In the MS-DOS commands, keep typing "cd.." until u see C:\>
then type "cd ssts64", U will see C:\ssts64>
then "cd level-01"(now become C:\ssts64\level-01>)
then start running the test one by one, just type the program name, example autorun3 and see the result.
It is a proactive and IDS test, so AV is irrelevant here. Please test it with your daily ESS settings. My ESS setting is:-

ESET Smart Security 8.
HIPS - all enable, Filter mode - smart mode.
Firewall - interactive mode, IDS and botnet protection enable.
Third party sandboxie and VM - not installed. I intend to run the test as "real-world" as possible.​
So far, I tested level-01, my ESS passed all tests, 10/10. You can see test results by matousec - http://www.matousec.c... Read more

Read other answers
RELEVANCY SCORE 49.6

My computer has the Open Cloud Security virus. I followed the steps to get rid of it, but they have failed.
1. I started my computer in safemode with networking
2. I checked the internet options but the box was not checked to begin with so skipped that step
3. Downloaded and ran r-kill. It got rid of the dialog boxes for Open Cloud
4. Ran Malwarebytes antimalware. Tried to run Quick scan and Full scan. Both failed after a few seconds and then cannot open Malwarebytes anymore.
It shows Error message reading: Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item.
If i resintall the program, it will open again and then fail the same way.

Ran dds and gmer.

gmer fails a 20 seconds in and gets the same error as Malwarebytes. I saved the log file before it failed.

.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 8.0.7600.16385
Run by Sarah and Steve at 16:36:46 on 2011-09-28
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\3788055388:2749117982.exe
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\ctfmon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\Explorer.exe
C: ... Read more

A:Open Cloud Security

Hello and welcome to Bleeping Computer! I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything. We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. To help Bleeping Computer better assist you please perform the following steps:*************************************************** In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/420949 <<< CLICK THIS LINK If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.*************************************************** If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lo... Read more

Read other 2 answers
RELEVANCY SCORE 49.6

Hello to all,

today saw a commercial about Kaspersky Security Cloud. Was thinking whaaaattt...??!!

So today reinstalled Windows 10 64bit clean on a new GPT EFI Dynamic Drive and must say, that thing is snappy.

Kaspersky Version 18.0.0.405(b)

The interface and features feel allot like the Internet Security 2017 but allot more smooth.

My Question to you all here in the Community is how do you think about it?

My Security config. changed again. Will post a new one soon.

Best regards
Val.
 

A:Kaspersky Security Cloud?

I'm waiting that Kaspersky releases it in Belgium to buy it ! But it looks very promising
 

Read other 0 answers
RELEVANCY SCORE 49.6

I'm a computer consultant and three of my clients have been infected with this virus in the last 2 weeks. One was so bad that I had to run a recovery back to the origin of the computer. On the other two computers I had removed Open Cloud from startup and then all the files it created manually. I was then able to run Malwarebytes on this computer and it found the malware and others. (I wasn't able to run any scans on the second computer, including McAfee.) But then I had further problems - either the computer was excruciatingly slow, or as on this computer, when you click on All Programs, only McAfee is listed! I also get some startup errors that I didn't get before. Then I found the post about TDSSKiller. I ran it and RKill (Explore.exe) on both computers and nothing changed. I gave up on the other computer and did a full recovery. I'm hoping I don't have to do that on this one. There are lots of files to backup and several programs to reinstall. I've attached the files you need to analyze the problem. Thanks, Leslie

A:Open Cloud Security/AV

Hello and welcome to Bleeping Computer! I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything. We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. To help Bleeping Computer better assist you please perform the following steps:*************************************************** In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/423685 <<< CLICK THIS LINK If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.*************************************************** If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lo... Read more

Read other 9 answers
RELEVANCY SCORE 49.6

Moving Security to the Cloud. (2 web pages)

Combining scanning approaches could keep PCs safe from viruses.

-- Tom
 

A:Moving Security to the Cloud

Cool article, Thanks for postint! it will be interesting to see how this theory plays out. It makes a lot of sense.
 

Read other 3 answers
RELEVANCY SCORE 49.6

Hello,
 
 I am currently doing a project on cloud computing security. I am trying argue about how secure the cloud is and am doing researcher to that end. I am reaching out to any cloud security professionals or anyone that has any information on cloud security. If you just want to give your opinion on cloud security, that is fine too. I want to know what people think about the security of the cloud. 

A:Cloud Computing Security

Are you doing data security in the "cloud"? Or Security as a service (cloud security)?

Read other 2 answers
RELEVANCY SCORE 49.6

Partly Cloudy With a Chance of Data Compromise: Cloud Security Quiz

I got 16/20
all the best
 

A:cloud security quiz

Interesting to freshen up your knowledge, got 16/20 where visiting on forum and reading articles should really help you out to learn and not take it as granted.
 

Read other 0 answers
RELEVANCY SCORE 49.6

Hello, I have open cloud security taking over my computer. PLEEEEEEASE HELP.
Here is my Hijack this logfile.
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Real\RealPlayer\Update\realsched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Citrix\ICA Client\concentr.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Citrix\ICA Client\wfcrun32.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Internet Explorer\iexplore.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = ... Read more

A:Open Cloud Security

Hello and welcome to Bleeping Computer! I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything. We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. To help Bleeping Computer better assist you please perform the following steps:*************************************************** In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/420173 <<< CLICK THIS LINK If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.*************************************************** If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lo... Read more

Read other 2 answers
RELEVANCY SCORE 49.2

What is the best cloud storage company?
 

A:Cloud Storage in terms of Security?

Probably should add in what you're comparing (price points, speed, free stroage etc) so what we know what you're looking for.
 

Read other 6 answers
RELEVANCY SCORE 49.2

Your Security? Not Our Problem, Say Cloud Providers.
So, apparently from a cloud provider perspective, it is the cloud computing users' fault that cloud providers aren't making cloud security a high priority. If their customers don't demand it, cloud providers say they aren't going to provide it.

But this belief seems to be undercut by the result of the survey: "... [while] 69 percent of cloud providers see the cloud user as most responsible for security, ... only 35 percent of users believe they are most responsible for ensuring security."

This leads to a situation, the survey notes, where "... neither the company that provides the services nor the company that uses cloud computing seem willing to assume responsibility for security in the cloud."

Hackers must be laughing all the way to the bank. However, as a customer of those companies using cloud computing services, I don't like particularly being put at risk because of the discord.
...
Words of advice to potential cloud customers: Caveat emptor.

For customers of companies using clouds: Check your credit score often.Click to expand...

-- Tom
 

Read other answers
RELEVANCY SCORE 49.2

I have tried everything to get rid of Open Cloud Security, and am having no luck.I got rid of the annoying popups, but some random exe file (3571092410.exe) continues to start every time except when I launch Safe Mode WITH Alternate Shell/Command Prompt.The random exe is blocking programs such as my Anti-Virus, Anti-Spyware, Regedit, etc. from executing as needed. I also suspect it may be spoofing certain programs, b/c when I run rkill it immediately closes but then opens again and finds nothing to kill here.Please help!Hi there,I am working with a nasty little virus.More details at this thread:http://www.bleepingcomputer.com/forums/topic421299.htmlBascially, I have tried everything. The DDS log is attached. Although I can find't the attached.txt that is suppose to be zipped. The random exe files in the root are renamed versions of rkill. However, I can't explain the random ones in the Windows directory.Gmer throws an error that it found system modifications and wants to run a full scan. But doing so causes it to crash. Image attached.Please help. Thanks.Merged topics then posts. ~ OB

A:Open Cloud Security Not Removing

Ok... I think I finally got rid entirely rid of it. I kind of winged it myself without any 3rd party tools, but have notes if you would like me to share them.

Can I get confirmation that my system is ENTIRELY clean based off these logs? I mean it runs fine now, but I want to be sure some I didn't leave some key logger or something hiding in there...

I have 2 concerns:
1) The GMER log mentions something about the file system and keyboard driver.
2) I see "Error 1012: There was an error while attempting to read the local hosts file" in Component Services (although I have no problems access the web).

Thanks go to this forum for all the tips and strategies!

-Brett

Read other 6 answers
RELEVANCY SCORE 49.2

More info:

KS: 18.0.0.222 - Kaspersky Lab Forum
 

A:Kaspersky Security Cloud KS: 18.0.0.222 beta

who got license for K total security 17 will get update ?
 

Read other 0 answers
RELEVANCY SCORE 49.2

.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_23
Run by Aaron and Tracey at 21:38:29 on 2011-09-30
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.402 [GMT -4:00]
.
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Firewall *Enabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe
C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Aaron and Tracey\My Documents\Downloads\Defogger.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://search.yahoo.com/se... Read more

A:Open Cloud Security Removal

Hello and welcome to Bleeping Computer! I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything. We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. To help Bleeping Computer better assist you please perform the following steps:*************************************************** In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/421411 <<< CLICK THIS LINK If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.*************************************************** If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lo... Read more

Read other 2 answers
RELEVANCY SCORE 49.2

Hi everyone on this helpful websiteFirst i must apologize for my language since I am not a native english speaker and I just try my best to write gramatically correct english hoping you guys can understand me and may give me a helping hand.Back to the theme:I've read the guide teaching how to remove OpenCloud Security on this site.http://www.bleepingcomputer.com/virus-removal/remove-opencloud-securityI have followed every step however I have not succeeded The problem shows at step 14 while running Malwarebyes' Anti-malwareI did run RKill, but Malwarebyes' Anti-malware just still cannot run the scan.Everytime I start scanning , it is shut down very soon, maybe a few secs after starting.I guess it's probably interrupted and terminated by Open Cloud Security.So I wonder if RKill did not succesfully do its job?After the black window closed, notepad pops out with only the below"This log file is located at C:\rkill.log. Please post this only if requested to by the person helping you. Otherwise you can close this log when you wish. Rkill was run on 09/2011 Sunday at 20:03:51. Operating System: Windows 7 Ultimate Processes terminated by Rkill or while it was running: Rkill completed on 09/2011 Sunday at 20:03:53. "Other than Malwarebyes' Anti-malware, I tried Spy Doctor, Trojan Killer, HijackThis.And they result in the same, being shut down very shortly after starting scanning.The softwares are unable to be opened again after they are shut down. (de... Read more

A:Need help on Open Cloud security removal

Ronarch,The information provided shows the characteristics of the ZeroAccess Rootkit.First, let's take care of this file:C:\Windows\4241468026:2236952579.exeIt throws a wrench in the works, and programs will not run successfully...Please download DummyCreator.zipUnzip the folder:Right-click and select: Extract allFollow the prompts to extractOpen the new folder that appears on the Desktop:Double-click DummyCreator/DummyMaker to run the tool.Now, copy/paste the following into the blank area:C:\Windows\4241468026Press the Create button. Save the content of the Result.txt to your Desktop, and post it in your reply.Next, restart the computer!Please do not run any malware removal programs while we are in the process of malware repairs. Doing so may just make matters worse, and that, you do not want!Thanks!

Read other 1 answers
RELEVANCY SCORE 49.2

Don't believe anyone who says cloud computing is just a buzzword, doomed to become the next failed, overhyped industry former technology darling. Cloud computing is already here, and if you don't learn to secure it, you won't have much of a job to cling to in the not-too-distant future. Think of the information security version of a Cobol programmer.



Link -
Learn cloud security before it&#039;s too late | Security Central - InfoWorld

Read other answers
RELEVANCY SCORE 49.2

Has anyone had/got any experience with Kaspersky Endpoint Security Cloud? Trying it out, seems very good.
 

Read other answers
RELEVANCY SCORE 49.2

I looked Open Cloud Security up on bleepingcomputer.com and I tried to follow the instructions. I'm using Windows XP, and i'm not savvy with regedit so I tried the antimalware route via safe mode. When I tried to open any form of safe mode i got the blue screen of death with some sort of memory dump notice at the bottom. So i started in my regular mode, used RKill (renamed iexplorer) to stop the rogue processes which allowed me to run antimalwarebytes. It took forever, and finally logged some things as killed, but open cloud security was still there. So in a fit of desperation I took to deleting what appeared to be folders which were definately not there before the infections. Files named with loooong numbers, as well as the files associated with open cloud security. Several clone shortcuts were found, but no program files. I went to the registry and deleted the only file i could find in the registry that has been linked to this virus. Then I restored last known good settings, but now I can't open a single program. The notice says to restore the file association in folder options in the control panel. But I don't even know how to do that. Does anyone know what happened? I'm not backed up in any way, and I will lose things which i would be very sad to lose, but I'm not against starting from scratch. It doesn't look like I have the virus anymore, but regardless, my computer is completely devastated. Is it possible that I deleted something that... Read more

Read other answers
RELEVANCY SCORE 49.2

DNS Cloud Security Services Arrive.

OpenDNS offers new subscription-based secure DNS service; other vendors' DNS services to follow

-- Tom
 

Read other answers
RELEVANCY SCORE 49.2

Hi there, I am based in Australia, and work with a contractor in the Philippines, she is in her home office. We are both working on stand alone PC's connected to our own private internet. We access cloud software to work on the same file. I believe the cloud software is secure. What I was wondering was is there any cyber risk involved if my contractor is working with confidential information in Phillippines on a secure cloud platform ie xero? If not, is there any online system (network or other) that will make the data flow more secure? I need to be 100% sure that my clients data would be secure, and I am just not sure how to do this in a cost effective way. Any suggestions?? Many thanks, Jodie.
 

Read other answers
RELEVANCY SCORE 49.2

Hi, I've had the open cloud security problem for about 2 weeks now, at first it kept popping up over and over again telling me I had all kinds of threats etc., I Googled it and followed the instructions for removal with the malwarebytes' malware removal kit, and it would find some infected files, and then the scan would stop just before it finished saying it experienced some kind of error. I also ran AVG and found some infected files, put them in the virus vault, and then emptied the vault. I put the open cloud security link from my desktop into the trash can and then emptied it, and the pop-ups about me being infected stopped, but I'm assuming it's still on here because I didn't really do anything, so I came on here, I read the preparation guide for removing the malware, and I downloaded the recommended files and ran the scans, and I'm attaching them below. I'm not very good with any of this, and I would really appreciate any help with removing it. Thank you.
 opencloudsecurity.log   6.06KB
  0 downloads
 DDS-opencloudsecurity.txt   23.79KB
  1 downloads
 Attach-opencloudsecurity.txt   8.58KB
  0 downloads

A:trying to remove open cloud security

Hello, Welcome to BleepingComputer.I'm nasdaq and will be helping you.If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.===Please download AntiZeroAccess by Webroot to your DesktopDouble-click antizeroaccess.exe to run the program.NOTE: If running Vista or Windows 7, make sure to Right-click on it and select Run as an Administrator.
At the black window, type y and then press Enter.Once AntiZeroAccess has finished scanning, a report AntiZeroAccess_Log.txt will be created in the same location as the program.Please post the contents of the report in your next reply, and let me know how your system is running now. :thumbup:---Download http://public.avast.com/~gmerek/aswMBR.exe (aswMBR.exe) ( 511KB ) to your desktop. Double click the aswMBR.exe to run it Click the "Scan" button to start scan. Upon completion of the scan, click Save log, and save it to your desktop. (Note - do not select any Fix at this time) <- IMPORTANTPlease post the contents of that log in your next reply.There shall also be a file on your desktop named MBR.dat. Right click that file and select Send To>Compressed (zipped) folder. Please attach that zipped file in your next reply.===Please DownloadTDSSKiller.zip>>> Double-click on TDSSKiller.exe to run the application.Click on the Start Scan button and wait for the scan and disinfection process to be over.If an infected file is detected, the defaul... Read more

Read other 5 answers
RELEVANCY SCORE 48.4

Hello,
I am working on a use case where we are using Oracle Fusion Cloud which is hosting few of ERP apps. These apps are currently authenticated via Okta.
We are planning to deploy Microsoft Cloud App Security (CASB) in the environment. Now, we know that MCAS does not have API connector for Oracle Fusion Cloud, so we wanted to leverage Session Policies via Conditional Access App Control.
Is it possible, and if yes, then do we need to change the federation of the apps currently hosted on Oracle Fusion Cloud from Okta to Azure AD?

Read other answers
RELEVANCY SCORE 48.4

The cloud's an increasingly risky place, and people are trusting their personal information to systems they have no control over, security researchers warn



Read more -
Security experts advise self defense in the cloud | Cloud Computing - InfoWorld

Read other answers
RELEVANCY SCORE 48.4

'Mafiaboy': Cloud Computing Will Cause Internet Security Meltdown.

Notorious black-hat hacker warns that cloud-based computing will be "extremely dangerous," and explains how he got into hacking at age 15

-- Tom
 

A:Cloud Computing Will Cause Internet Security Meltdown

Good Grief
 

Read other 3 answers
RELEVANCY SCORE 48.4

Referred from here: http://www.bleepingcomputer.com/forums/topic420705.html/ ~ OBBroni directed me here as the problem I had never went away. Here is the original post describing my problem:"It seems as if I've been hit at once by 2 different things. Not sure how it happened but it first started with the random redirecting which was blocked mostly by AVG, then after a few days all of a sudden Open Cloud Security hit me. After I used MBAM or CCleaner, I don't remember which one to try to stop the redirect, upon restarting Open Cloud appeared. It applies to both Firefox and Internet Explorer, not one by the way. I've looked up many different ways as to how to fix this but so far nothing, so I'm here.I have did the whole ipconfig/flushdns thing and that seems to stop the redirect temporarily until I restart and it's back at it. As for the Open Cloud Security rogueware - MBAM and CCleaner always detect things, but after clearing it all out and rebooting in non-safe mode, it always comes back.Hopefully someone can help me. I see many people have this redirect problem, but I seem to have gotten screwed further with this Open Cloud thing on top of it all."Now whenever I try to start Windows normally it blue screens. Here is what it says: http://i52.tinypic.com/oh6yvl.jpg Before it would only blue screen after I tried to start a program to get rid of it, such as MBAM or RKILL. I followed that guide before posting in this section and it says only do the G... Read more

A:Open Cloud Security and Google Redirect

.
DDS (Ver_2011-08-26.01) - NTFSAMD64 NETWORK
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_21
Run by Mark at 12:06:26 on 2011-09-28
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.4084.3078 [GMT -4:00]
.
AV: AVG Internet Security *Enabled/Updated* {5A2746B1-DEE9-F85A-FBCD-ADB11639C5F0}
SP: AVG Internet Security *Enabled/Updated* {E146A755-F8D3-F7D4-C17D-96C36DBE8F4D}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\windows\system32\wininit.exe
C:\windows\system32\lsm.exe
C:\windows\system32\svchost.exe -k DcomLaunch
C:\windows\system32\svchost.exe -k RPCSS
C:\windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\windows\system32\svchost.exe -k netsvcs
C:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted
C:\windows\system32\svchost.exe -k LocalService
C:\windows\system32\svchost.exe -k NetworkService
C:\windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\windows\Explorer.EXE
C:\windows\system32\ctfmon.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\windows\SysWOW64\ping.exe
C:\windows\system32\conhost.exe
C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\windows\SysWOW64 ... Read more

Read other 58 answers
RELEVANCY SCORE 48.4

This past week my fianc? got a rogue antivirus on her PC ? Open Cloud Security ? while searching DeviantArt and listening to Pandora. Though I wasn?t present to observe, it appeared to be a drive-by installation (AFAIK, she didn?t click on any suspicious items).

Her PC stats:
What I know: Win XP Pro 32-bit, Ad-Aware free running constantly, router/hardware firewall, IE 8, EVGA GTX 460 @ 1024 MB, no virtual drive installed

What I can?t remember specifically offhand: Quad-core Intel, 2.5+ GB RAM, Mobo?(Asus ETS2 Energy Saver?)

I have searched numerous forums and sites for advice, and found many helpful tips ? but nothing has worked.

(NOTE: This post does not contain DDS and GMER logs, because I downloaded and transferred those programs to her computer with a flash drive and experienced problems, noted below:

DDS: began to run, but seemed to freeze up the machine?after 2 hours, the ?bar of asterisks? had not moved past ? of the way or so?I had to hard restart, and it took several tries on the initial BIOS screen, along with pulling the power cord out and letting the mobo power drain, before the BIOS would find the HD?s and continue the boot process.

GMER: Started and ran successfully, run overnight. In the morning, I tried to ?Save? a log for submittal, but received an error that there were ?not enough resources to complete the process? in My Documents or something similar, and then the computer froze?could move the mouse but not click anything, or pull up Task Manager?h... Read more

A:Open Cloud Security problem need advice

Hello, Welcome to BleepingComputer.I'm nasdaq and will be helping you.If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.===Your logs indicate that a ZeroAccess infection is present on your computer:Please download DummyCreator.zip and unzip it.Run the tool.Copy and paste the following into the edit box:

C:\WINDOWS\2478689085
Press Create button and post the content of the Result.txt.

Important: Restart the computer.===See if you can now run the DDS tool and include the log in your next reply.

Read other 1 answers
RELEVANCY SCORE 48.4

After a beta period with over 30,000 downloads from more than 130 countries, we are happy to announce that Panda Cloud Antivirus 3.0 is now available for download.

Get Panda Cloud Antivirus 3.0 here!

The new version includes important improvements in both its FREE & Pro Edition versions:
Entirely new look and feel. More modern, more intuitive. Easier than ever before.
Scheduled scans. One of the most demanded features from our Community. And now it?s available in the FREE & Pro versions!
Rescue Kit. Extremely useful in emergency situations caused by malware infections.
Automatic USB vaccination. This feature, which was only available to Pro users in previous versions, is now available for free!
New Wi-Fi Monitor (only available in the Pro Edition). Find out if someone is stealing your Wi-Fi. The new Panda Cloud Antivirus 3.0 incorporates a Wi-Fi monitor that shows a list of all the devices currently connected to your network, helping you find out if there is an intruder on your Wi-Fi network.
New Panda Account. An exclusive area where you?ll be able to download your products, manage your services, obtain documentation, get technical support through the new Technical Support Forum and, only for Pro users, receive personal VIP support via an online form. Additionally, you will be able to manage all of your Panda Consumer products from this area, as well as your Android devices if they are protected with Panda Mobile Security.
Performance improvements to make Pan... Read more

A:Panda Cloud Antivirus 3.0 Internet Security here!

Thank you for sharing this iyah.
 

Read other 9 answers
RELEVANCY SCORE 48.4

So today Norton Security picked up something weird while my computer was idle. 
 
Infected file: BIT1D2E.tmp
Location: C:\Windows\Temp\BIT1D2E.tmp
Threat name: Suspicious.Cloud.9.B
Threat type: Heuristic virus
 
 
That's really all I have, but I saw it again in the same folder(how the heck did it get redownloaded?) a few minutes later and uploaded it to VirusTotal:
https://www.virustotal.com/nb/file/a965bef89c8d92f79e5a98602bb09d92aba25659e03b57f34aa32b90508191b6/analysis/1448399271/
 
 
Malwarebytes and SUPERAntiSpyware comes out clean, and now Norton Securtiy also returns clean.
 
I'm confused. False positive or infected?

A:Norton Security, Suspicious.Cloud.9.B detection...

Hello,
 

Please download Rkill to your Desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/
 
§  Double-click on the Rkill desktop icon to run the tool.
§  If using Windows Vista, 7, 8 or 10 right-click on it and choose Run As Administrator.
§  A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
§  If not, delete the file, then download and use the one provided in Link 2.
§  Do not reboot until instructed.
§  If the tool does not run from any of the links provided, please let me know.
If normal mode still doesn't work, run the tool from Safe Mode.
When the scan is done Notepad will open with rKill log.
Post it in your next reply.
NOTE. rKill.txt log will also be present on your desktop.
-----
 
Kaspersky Virus Removal Tool
Please download Kaspersky Virus Removal Tool from here.
§  Right click on KVRT.exe and select Run as Administrator.
§ ... Read more

Read other 3 answers
RELEVANCY SCORE 48.4

Hi everyone,

Is there an affordable Cloud managed security solution?

Currently, I am trialing Kaspersky Security Cloud - I can manage 20 licenses directly via My Kaspersky account for Mac and Windows. But it is 99 a year.

Is there any other solution that is cheaper/better?

I am looking for a solution to manage the IT system of my charity.

Cheers for any help,

Fred
 

Read other answers
RELEVANCY SCORE 48.4

I've tried the 'Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help' and did the steps but was unable to do the gmer option because it wouldn't let me open it. Heres the DDS logs that I did get to do.

A:Open Cloud Security / Google redirect

Hello and welcome to Bleeping Computer! I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything. We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here. To help Bleeping Computer better assist you please perform the following steps:*************************************************** In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/421168 <<< CLICK THIS LINK If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.*************************************************** If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lo... Read more

Read other 2 answers
RELEVANCY SCORE 48.4

I try Kaspersky pure 3.0 which I post in my last post with pure 3.0 with firefox there alot of features you can not use . Kaspersky is good but I would go with just the internet security not the pure 3.0.I tried bitdefender which was good but I felt l lacked user controls it was more plug and play.I did just try Eset but the firewall the settings / automatic./policy mode /interavtice mode I keep playing with the settings and I keep trying sheilds UP all port open? ODD I got an firewall error on restart. So had to go into safe mode use the uninstaller  then reboot and reinstall and try and tryed all firewall setting this morning even whatched some you tube vids still SHIELDS UP all ports open??? I removed it. I my morning  researching on Av-test   it was more uptodate then others and some other too but av test most  eScan was rated 2014 ADVACED+ in file dection march/sept/Heuristis-behavioral Advance +/peromace standerd(runing full scan in custom high prioity right now can't tellmy pc Win 7 home Prem 4GRAM 500gb hard D.Real world protection was standerd. One thing Iike about escan all features work with firefox and and chrome.Virus Bulletin rated eScan 91.4% Suspicious 0/Extended WildList % 0/ False positives 0.
 
 
Anyone else use eScan

A:Going to give eScan total security with cloud a try.

I am familiar with MicroWorld eScan Anti-virus Toolkit (MWAV) which has been around for years but do not know anyone who has used their Anti-Virus or Internet Security Suite for primary protection.

Read other 3 answers
RELEVANCY SCORE 48.4

Partly Cloudy With a Chance of Data Compromise: Cloud Security Quiz

I got 16/20
all the best
 

A:Internet Cloud Security Quiz (External)

Interesting to freshen up your knowledge, got 16/20 where visiting on forum and reading articles should really help you out to learn and not take it as granted.
 

Read other 7 answers
RELEVANCY SCORE 48.4

It seems as if I've been hit at once by 2 different things. Not sure how it happened but it first started with the random redirecting which was blocked mostly by AVG, then after a few days all of a sudden Open Cloud Security hit me. After I used MBAM or CCleaner, I don't remember which one to try to stop the redirect, upon restarting Open Cloud appeared. It applies to both Firefox and Internet Explorer, not one by the way. I've looked up many different ways as to how to fix this but so far nothing, so I'm here.

I have did the whole ipconfig/flushdns thing and that seems to stop the redirect temporarily until I restart and it's back at it. As for the Open Cloud Security rogueware - MBAM and CCleaner always detect things, but after clearing it all out and rebooting in non-safe mode, it always comes back.

Hopefully someone can help me. I see many people have this redirect problem, but I seem to have gotten screwed further with this Open Cloud thing on top of it all.

A:Open Cloud Security and Google Redirect

Welcome aboard Download Security Check from HERE, and save it to your Desktop. * Double-click SecurityCheck.exe * Follow the onscreen instructions inside of the black box. * A Notepad document should open automatically called checkup.txt; please post the contents of that document.=============================================================================Please download MiniToolBox and run it.Checkmark following boxes:Report IE Proxy SettingsReport FF Proxy SettingsList content of HostsList IP configurationList last 10 Event Viewer logList Installed ProgramsList Users, Partitions and Memory sizeClick Go and post the result.=============================================================================Download Malwarebytes' Anti-Malware (aka MBAM): http://www.malwarebytes.org/products/malwarebytes_free to your desktop. * Double-click mbam-setup.exe and follow the prompts to install the program. * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish. * If an update is found, it will download and install the latest version. * Once the program has loaded, select Perform quick scan, then click Scan. * When the scan is complete, click OK, then Show Results to view the results. * Be sure that everything is checked, and click Remove Selected. * When completed, a log will open in Notepad. * Post the log back here.Be sure to restart the computer.The log c... Read more

Read other 22 answers