This list of logon types and status/substatus for Event ID 4625 comes from Microsoft documentation for threat-protection auditing, and is beneficial for analysts and people that are curious about what is going on in their PC. Logon type Logon title Description 2 Interactive A user logged on to this computer. Read more…
We all hate slow computers, so this tutorial will show you how to speed up your Windows PC.
Disk Cleanup Tool
Programs→Accessories→System Tools→Disk Cleanup.
Go ahead and tick everything in the disk cleanup window. Wait for the program to finish and click the delete files button.
Start menu -> Type Disk Cleanup
It will take about 5-10 seconds to come to the main window, and it will ask which files you want to delete. Select all files and click ‘Clean up system files.’ (more…)
I often hear people say that they don’t understand why a hacker would be interested in their computer and subsequent life. When you consider how much you do on your computer, it becomes clear that the value of your computer lies in the life you have built over your lifetime. This image shows you what a hacker can do with your computer. (more…)
Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen.
NATURE OF THE BREACH
Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information from approximately July 25, 2017, to July 28, 2017. Briggs became aware of this incident on July 25, 2017, and took extreme steps to both contain and thoroughly investigate the attack. Although Briggs has no evidence of misuse of the stolen information, they notified individuals out of an abundance of caution. The malware, by its nature, could have allowed a third party to access, use, and disclose individuals’ account-related, human resources, and health plan information as listed on the sample copy of the notice enclosed, the public letter says. (more…)
Signs You’ve Been Hacked
In today’s threat landscape it is a matter of when hackers will gain access to your computer or cell phone, not if. Proper layers of security keep most of the malware out of your system and when malware does make it on your system the impact is reduced by containment, but none of us live in an ideal world. The indicators that a hacker has gained access are not always apparent and may seem like an annoyance or trivial, but if your computer closely matches the following signs, you might have been hacked. (more…)