As many CryptoPrevent users may be aware, “vssadmin.exe” is a setting automatically enabled with the “default” protection plan, which blocks any usage of this file. This setting prevents launch of the vssadmin.exe file via SRP (aka Software Restriction Policies) a built-in Windows mechanism of controlling what is and is not allowed on a PC, although it is only […]
v220.127.116.11 (January 17th, 2017) User Interface Updated-adds additional explanation on features and functionality as well as streamlines options Maintenance options have been added which are powered by d7x technology (manually running maintenance is available under the Free and Premium versions, scheduling automated maintenance is a premium feature only) FolderWatch HoneyPot and the Quick Access tray […]
v18.104.22.168 (October 5th, 2017) Performance increases for save/load of Bulk/White-Label configurations Performance increases in the application of Bulk/White-Label settings at time of install Performance increases on application startup Several other minor performance improvements Corrected issue where blacklist command line option may have whitelisted in some cases Bulk registration data is now handled entirely via HTTPS […]
We put CryptoPrevent’s HoneyPot Detection protection up against the latest WannaCry Ransomware (also known as WanaCrypt0r and WCry using .WCRY extension). Plus this time we show it off on WINDOWS XP!!!!!! Get CryptoPrevent Premium to take advantage of this protection here: CryptoPrevent Malware Prevention It was able to block and kill the ransomware quickly where […]
We put CryptoPrevent’s HoneyPot Detection protection up against the latest WannaCry Ransomware (also known as WanaCrypt0r and WCry using the .WCRY extension). It was able to block and kill the ransomware quickly where only two honeypot files were encrypted and no legitimate files on the system were affected. It was also able to kill the […]
While we feel CryptoPrevent is one of the best antivirus supplements on the market, we don’t want to provide the illusion that it’s all you need to protect yourself. There are many other methods you must employ to protect yourself and your data from infections. Having several defenses provides the most protections against all of […]
This was posted on Slashdot.org today: itwbennett writes: Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor,’ writes Lucian Constantin. ‘Those keys have been uploaded to Kaspersky’s ransomware decrypt or service that was originally set up […]
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline […]
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every […]
Join us for live tech chat, product questions, support, and technical training right here!
Customer or not, you are welcome to drop in and discuss anything ‘tech’ with us!