iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to recover deleted contacts on iPhone

0
It is quite common to find yourself in need of recovering certain kinds of data like contacts after accidentally deleting or losing them for whatever reason. If you are one of such people and seek help with restoring deleted/lost contacts on your iPhone or some other iOS device, follow this guide with various ways to return the missing contacts to your device. Losing important contacts from your iPhone can be a frustrating experience, especially if you rely on your phone for communication with friends, family, or business associates. Whether it was an accidental deletion or a software malfunction, the thought of losing valuable phone numbers, email addresses, and other contact information can leave you feeling helpless. However, the good news is that recovering deleted contacts from your iPhone is possible, and there are several methods you can use to retrieve them. In this article, we will guide you through the step-by-step process of recovering deleted contacts from your iPhone, using both iTunes and iCloud backups, as well as third-party data recovery software. With these techniques, you can quickly and easily restore your lost contacts and get back to communicating with the important people in your life.

How to unlock iPhone without passcode

0
Forgetting your passcode to unlock your own device is never good news for many users. Sometimes it may be your friend or another person who decided to mock you and set up a passcode without letting you know. Unfortunately, if you see no chance of recalling your passcode and unlocking the iPhone as usual, the only way to bypass the lock screen is to reset your iPhone to factory settings. The outcome of this action will be a complete erase of data stored on the device. After this, you will have to restore the deleted data using backup storage like iCloud. Apple takes security very seriously and it is a good measure to keep your data protected from potentially unauthorized hands. Try to exhaust all log-in attempts before getting to the rest of your iPhone. You will have around 10 attempts until your iPhone becomes permanently locked and will require a rest. If no right passcode is matched, you will have to use one of our solutions below to reset your device, which will unlock it eventually. Use whichever fits you the most.

How to unlock from iPhone “Security Lockout” screen

0
If you see the "iPhone Unavailable" or Security Lockout message on your iPhone after repeatedly entering the wrong passcode, then this guide is for you. We will show you a couple of methods that will help you bypass the locked screen and get back to using your iPhone. Unfortunately, the truth is that unlocking your iOS device without a passcode requires resetting it to factory settings, which will entail a full erase of data stored on your phone. Unless you have the right passcode to unlock your phone, resetting is the only way out of this situation. Apple takes security very seriously, which makes a lot of sense to keep your data protected from potentially unauthorized hands. If all the attempts have been exhausted and your iPhone is now permanently blocked, use one of the ways to erase it and restore the deleted data using one of the backup methods – via iCloud, for instance. Use whichever fits you the most.

How to remove Nitz Ransomware and decrypt .nitz files

0
Nitz Ransomware is a large family of encryption viruses with over than a year of history. It has undergone multiple visual and technical modifications during the time. This article will describe the peculiar properties of the latest versions of this malware. Since the beginning of April 2023, STOP Ransomware started to add following extensions to encrypted files: .nitz. And after the name of the extension, it is called "Nitz Ransomware". Virus modifies the "hosts" file to block Windows updates, antivirus programs, and sites related to security news. The process of infection also looks like installing Windows updates, the malware generates a fake window and progress bar for this. This version of STOP Ransomware now uses the following e-mail addresses: support@freshmail.top and datarestorehelp@airmail.cc. STOP Ransomware creates ransom note file _readme.txt.

How to stop “SharePoint” e-mail spam

0
If you are reading this page, then the "SharePoint" e-mail is likely a scam message, which should be ignored or even deleted. Initially, SharePoint is a legitimate Microsoft tool used by many companies worldwide, however, some scammers impersonate its name and templates for promoting malicious links/buttons leading to fishing websites. The "SharePoint" e-mail spam has been observed to mimic company names and make recipients read some important information inside a fake PDF attachment. This attachment was reported to contain a link leading to a fake Microsoft website. Keep in mind that such websites are designed to trick users into providing sensitive information and let threat actors abuse it for stealing access to Microsoft 365 (Office) or other accounts likely registered with the same login credentials. It is always highly advised against clicking on links or downloading attachments from messages that seem suspicious. Some cybercriminals may abuse PDF, Word, Excel, RAR, ZIP, and other genuine files for setting up executable scripts that will install malware. Thus, always be careful with what you click or download from e-mail messages. "SharePoint" e-mail spam is only one of the countless other scam e-mails that target users each day. Beware of them and read our guide to get protection against them in the future.

How to remove Niwm Ransomware and decrypt .niwm files

0
If you landed on this article, you most likely got hit by Niwm Ransomware, that encrypted your files and modified their extensions to .niwm. The name Niwm is only given to this malware to help users find the removal and decryption solution, and according to the suffix it appends. In fact, this is just the 681-th version of STOP Ransomware (sometimes called Djvu Ransomware), that has been active for more than 5 years and became one of the most widespread ransomware families. Niwm was released in the first days of April 2023. Unfortunately, there are low chances for 100% decryption now as it uses strong encryption algorithms, however, with instructions below you will be able to recover some files. uses the combination of RSA and AES encryption algorithms to encrypt the victim's files. The RSA algorithm is used to encrypt the AES key, and the AES algorithm is used to encrypt the victim's files. The AES key is generated randomly for each victim and is stored on the attacker's server. But first you need to remove ransomware files and kill its processes. Below is an example of Niwm Ransomware ransom note, that it leaves on the desktop (_readme.txt). It's quite typical and remains almost the same with minor changes for several years.

How to remove Cylance Ransomware and decrypt .Cylance files

0
Cylance is the name of a ransomware infection that targets Windows and Linux users. Users infected with this type of malware will no longer be able to access their data due to encryption. In addition, victims will also see the affected files modified with the .Cylance extension. After this, they will be no longer accessible and victims will have to follow decryption instructions in the generated ransom note (named CYLANCE_README.txt). Please note that Cylance Ransomware has nothing to do with Cylance by BlackBerry – legitimate enterprise cybersecurity solutions. In general, the ransom note says the victim's data has been encrypted and cybercriminals are the only holders of private keys that are able to decrypt it. To obtain this key and presumably software for running decryption, victims are instructed to contact the swindlers via e-mail and transfer money to them. The price is undisclosed and most likely calculated for each victim separately. Additionally, cybercriminals also offer to test decryption for free by sending one encrypted file. No matter how trustworthy cybercriminals seem, it is always advised against collaborating with them and paying the ransom. Many victims end up fooled and do not receive promised decryption tools. While this has not been reported to be the case with Cylance Ransomware, the risk exists nonetheless.

How to remove Nifr Ransomware and decrypt .nifr files

0
Nifr Ransomware, being a part of STOP Ransomware (DjVu Ransomware) family, is an elaborate encryptor virus, that encrypts user's files and makes them inaccessible. Malware uses an unbreakable AES (Salsa20) encryption algorithm, and decryption is only possible in 2-3% of cases. It first generates a unique AES-256 encryption key for each file it encrypts, which is used to encrypt the file's contents. This process is known as symmetric encryption, as the same key is used to encrypt and decrypt the file. After encrypting the file with the AES-256 key, Nifr Ransomware then encrypts the AES-256 key with an RSA-1024 public key, which is included in the ransomware's code. This process is known as asymmetric encryption, as it uses different keys for encryption and decryption.Recent version of STOP Ransomware adds following suffix or extension: .nifr. Corresponding virus variation received names: Nifr Ransomware. After encrypting, the ransomware creates _readme.txt file, that specialists call "ransom note", and below you can get acquainted with the contents of this file. The note contains instructions on how to contact the ransomware operators and pay the ransom in order to receive the decryption key. The ransomware is typically distributed through spam emails, fake software updates, and software cracks/keygens. It is important to note that paying the ransom is not recommended, as it encourages the criminals and there is no guarantee that the decryption key will be provided.