Skip to content

Storage Beyond Passwords: Securely Save Files in NordPass

Ever been in that awful situation where you’re going through old emails or disorganized folders trying to find that one crucial document? The insurance form, an e-copy of your ID, or even a video detailing how to get into your new office? Wouldn’t it be a game-changer if you had all your important files right next to your passwords, credit card information, or secure notes?

Good news! Today, we are excited to introduce File Attachments — a new and improved way to manage important files with NordPass.

Best for large file attachments

Here’s a quick rundown of how it works. As a NordPass Premium user, you now have the ability to attach files to your saved items in NordPass. It’s not just about enhancing organization. This feature also provides an unmatched level of security. Forget the hassle of disorganized unsafe file storage. Any attached files or documents will be as secure as your passwords thanks to our encrypted storage.

But we didn’t stop at mere functionality. NordPass Premium now provides a whopping 3GB of encrypted storage per account, a giant leap forward. That’s not just more — it’s three times more than any other password manager out there! We’re offering you unrivaled storage and advanced security — and that’s certainly what we call more bang for your buck!

NordPass — The best password manager for large file attachments.

– Attila Tomaschek

CNET

No strings attached (except your files)

With NordPass Premium’s File Attachments, you have the freedom to store documents of any type to one of your existing items. Whether it’s a simple JPEG, PDF, MP4, or DOC file — NordPass supports them all.

Supported file types

The new feature allows for files up to 50MB in size and up to 50 attachments per single item. The only limit is your 3GB storage per user — and that’s a whole lot of space for your files.

While we aim at maximizing convenience, your security is always our top priority. To ensure maximum protection, we currently do not support attaching files to shared items or sharing items with files attached.

You can learn more about how to attach files to your NordPass items in our handy help center article.

Streamline your digital life with NordPass

In the digital age, we often juggle tons of files, documents, and data, and that can lead to a disorganized and chaotic personal digital space. With our new File Attachments feature, we look to help you take back control and streamline your digital life by allowing you to save documents in a quick and efficient way

With NordPass Premium, you can now attach important files to all your saved items. Store any file in one secure place with 3GB encrypted storage.

Instant access

When you’re in a hurry, having quick access to your important documents can make all the difference. That’s where File Attachments shine. Need to view a copy of your ID or an important receipt? No problem! With File Attachments, all your vital images or documents are just a few clicks away.

Effortless downloads

It’s not just about attaching and storing your files along with your passwords. It’s also about being able to retrieve them whenever necessary. Suppose you’ve stored financial documents that you need to share with your spouse. With File Attachments, you can quickly and effortlessly download these files directly from NordPass.

Unprecedented control

The File Attachments feature isn’t just about adding another functionality to NordPass. It’s about giving you greater control over your digital life. You get to decide what files to attach, what items those files are attached to, and when to download or delete them. You can also organize your vault in a way that best suits your personal or professional needs.

A single secure place for files and passwords

Take your password manager experience to the next level with NordPass Premium. Don’t just manage your passwords, manage your life. No more scrambling for documents, no more disorganized files, and certainly no more compromised security.

Your life. Your files. One secure place. Start your NordPass Premium journey today and make the most of our File Attachments feature.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

23.3.9 ‘Voyager’ released

Changes compared to 23.3.8

Bug Fixes

  • Fix an issue with macOS devices failing to log in with an ERR_UNKNOWN_DEVICE error
  • Fix an issue with the Recent Activity and Policies pages not loading correctly when hard-refreshed or loaded directly via URL
  • Fix an issue with Comet default branding not presenting correctly following a server upgrade

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

CyberLink FaceMe® facial recognition integrates with MediaTek’s Genio 700 IoT Platform to deliver a 6.5X performance boost

CyberLink (5203.TW), a leading manufacturer of AI facial recognition technologies, has strengthened its presence in the smart IoT market. The company has announced that its FaceMe® facial recognition engine has been integrated with MediaTek’s Genio 700 next-gen smart IoT platform, dramatically increasing AI performance.

While it continues to integrate with numerous other IoT platforms, CyberLink FaceMe® has significantly improved performance on MediaTek’s latest Genio 700 processors. Running on a Genio 700, the FaceMe® engine is accelerated by MediaTek’s AI Processing Unit (APU). Performance tests show that, in comparison to running exclusively via CPU processing, the APU hardware / software integration increases performance by 6.5X, with a 24% reduction in CPU usage.

The new MediaTek processor provides faster, more efficient and reliable AI facial recognition processing, meeting the complex, high-speed edge computing needs of smart retail and smart security and access control operations. “The strong alliance between CyberLink and MediaTek, with its Genio IoT products, will provide FaceMe® users with faster, more convenient, and powerful facial recognition edge computing products,” said Jau Huang, Chairman and CEO of CyberLink, “enhancing the security and dependability of deployed facial recognition services.”

MediaTek’s Genio 700 is a high-performance AI computing IoT platform. This system-on-chip (SoC) provides powerful CPU, GPU and AI modules, designed for smart home, smart retail and industrial IoT devices. By integrating the latest AI cores and accelerators, the Genio 700 greatly enhances the smart computing power of edge devices, and significantly increases the number of image frames that can be processed per second. MediaTek’s platform can also support real-time AI facial recognition from multiple simultaneous video streams, improving the identification efficiency for implementation scenarios such as smart retail, and access control.

CyberLink FaceMe® not only recognizes faces but can also identify gender, age, and emotions. These features enable the turnkey FaceMe® Smart Retail customer analytics solution to obtain insight into guest demographics, behaviours, and trends. FaceMe® Security strengthens on-site security, with a more complete intelligent security control system.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

ESET Research reveals new analysis of AceCryptor: used by crimeware, it hits computers 10,000 times every month

  • ESET researchers publish details about a prevalent cryptor malware, AceCryptor, which operates as a cryptor-as-a-service used by tens of malware families.
  • AceCryptor samples are very prevalent worldwide because multiple threat actors are actively using the cryptor malware to spread packed malware in their campaigns.
  • During 2021 and 2022, ESET protected more than 80,000 customers affected by malware packed by AceCryptor.
  • Altogether, there have been 240,000 detections, including the same sample detected at multiple computers, and one computer being protected multiple times by ESET software. This amounts to over 10,000 hits every month.
  • Among the malware families found that used AceCryptor, one of the most prevalent was RedLine Stealer – malware used to steal credit card credentials and sensitive data, upload and download files, and even steal cryptocurrency.
  • AceCryptor is heavily obfuscated and has multiple variants, and throughout the years, has incorporated many techniques to avoid detection.

BRATISLAVA — May 25, 2023 — ESET researchers revealed today details about a prevalent cryptor malware, AceCryptor, which operates as a cryptor-as-a-service used by tens of malware families. This threat has been around since 2016, and has been distributed worldwide, with multiple threat actors actively using it to spread packed malware in their campaigns. During 2021 and 2022, ESET telemetry detected over 240,000 detection hits of this malware, which amounts to over 10,000 hits every month. It is likely sold on dark web or underground forums, and tens of different malware families have used the services of this malware. Many rely on this cryptor as their main protection against static detections.

“For malware authors, protecting their creations against detection is challenging. Cryptors are the first layer of defense for malware that gets distributed. Even though threat actors can create and maintain their own custom cryptors, for crimeware threat actors, it often may be time-consuming or technically difficult to maintain their cryptor in a fully undetectable state. Demand for such protection has created multiple cryptor-as-a-service options that pack malware,” says ESET researcher Jakub Kaloč, who analyzed AceCryptor.

Among the malware families found that used AceCryptor, one of the most prevalent was RedLine Stealer – malware available for purchase on underground forums and used to steal credit card credentials and other sensitive data, upload and download files, and even steal cryptocurrency. RedLine Stealer was first seen in Q1 2022; distributors have used AceCryptor since then, and continue to do so. “Thus, being able to reliably detect AceCryptor not only helps us with visibility into new emerging threats, but also with monitoring the activities of threat actors,” explains Kaloč.

During 2021 and 2022, ESET protected more than 80,000 customers affected by malware packed by AceCryptor. Altogether, there have been 240,000 detections, including the same sample detected at multiple computers, and one computer being protected multiple times by ESET software. AceCryptor is heavily obfuscated and has incorporated many techniques to avoid detection throughout the years. “Even though we don’t know the exact pricing of this service, with this number of detections, we assume that the gains to the AceCryptor authors aren’t negligible,” theorizes Kaloč.

Because AceCryptor is used by multiple threat actors, malware packed by it is distributed in multiple ways. According to ESET telemetry, devices were exposed to AceCryptor-packed malware mainly via trojanized installers of pirated software, or spam emails containing malicious attachments. Another way someone may be exposed is via other malware that downloaded new malware protected by AceCryptor. An example is the Amadey botnet, which we have observed downloading an AceCryptor-packed RedLine Stealer.

Since many threat actors use the malware, anyone can be affected. Because of the diversity of packed malware, it is difficult to estimate how severe the consequences are for a compromised victim. AceCryptor may have been dropped by other malware, already running on a victim’s machine, or, if the victim got directly afflicted by, for example, opening a malicious email attachment, any malware inside might have downloaded additional malware; thus, many malware families may be present simultaneously. AceCryptor has multiple variants and currently uses a multistage, three-layer architecture.

Even though attribution of AceCryptor to a particular threat actor is not possible for now, ESET Research expects that AceCryptor will continue to be widely used. Closer monitoring will help prevent and discover new campaigns of malware families packed with this cryptor.

For more technical information about AceCryptor, check out the blogpost “Shedding light on AceCryptor and its operation” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

Heatmap of countries affected by AceCryptor according to ESET telemetry

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The ultimate step-by-step guide for removing a troublesome patch

Are you feeling frustrated by crashes, errors, or other issues caused by a so-called bug fix? Trust us, you’re not alone. While patches are aimed at correcting malfunctioning code in software, or making an application more secure, these fixes can sometimes go wrong, leading to unpleasant experiences when using the technologies we know and typically love. If you’re trying to remove a troublesome patch, then the good news is that you’re in the right place. In this post, we will provide a step-by-step guide that you can follow in order to identify the problematic patch, check for alternative solutions, uninstall said patch, and prevent it from being reinstalled. In short, you can rest assured that your technology will be back to normal in no time.

What is patch management?

Patch management is the process of acquiring, testing, deploying, and managing software patches and updates on computer systems, applications, and other various software components. It is a critical aspect of maintaining the security, stability, and performance of any IT environment.  

Why a patch may become troublesome

In the world of IT, a “patch” refers to a modification made to a program in order to improve its performance, security, or other feature that’s due for an update or change. You also might have heard of patches being referred to as “bug fixes” – that’s because patches are created with the purpose of smoothing over code imperfections which may be discovered by an app’s users or developers. In order to make edits, developers harness the power of debugging software, or automated patch management—with the goal of creating patches that can be either permanent or temporary. So where can this process go wrong? Well, it turns out that creating and executing patches is not always foolproof. Some patches can end up causing unforeseen negative effects on performance, or cause a ripple effect that ends up interrupting other features, even if the patch managed to successfully solve the original issue.

Removing a troublesome patch with Atera

The Patch Management Software that will ease your IT life!

 

The step-by-step guide for removing a troublesome patch

Step 1: Identify the Problematic Patch

Sometimes, IT departments or software managers roll out multiple patches at once. So how do you know which one is causing the problem? It’s important to stay up-to-date on patches that aren’t highly rated across all devices so that you can avoid installing them in the first place – or find an automated solution that can do so for you. But if you’ve already installed the patch (or a series of patches), the first step will be identifying which patch you need to remove to ensure you’re not creating additional problems by accidently uninstalling the wrong one.  

Step 2: Check for Alternative Solutions

Although initiating patch rollback is one effective way to handle a flawed patch, there are often more practical, time-efficient ways to solve the problem. For example, you could use a workaround, which is when a developer essentially creates a new patch to fix the problems created by the existing patch. Another solution could be uninstalling the software completely. If you have software that’s creating too many difficult issues while patching, you might want to consider a new, less problematic software solution instead. Alternately, you can accept whatever risk or issues an essential patch creates – this is essentially a process of weighing out benefits versus consequences.  

Step 3: Uninstall the Patch

If you need to uninstall the patch, you will have to perform a patch rollback. That process essentially reverts software to the last version installed on a device, undoing any changes caused during the patching process. The exact process of uninstalling a patch will depend on the tools you have on hand and the nature of the patch itself. You can use a script or powershell to manually uninstall a patch, but generally speaking, using a patch management tool will make the process much easier.  

Step 4: Prevent the Patch From Being Reinstalled

In order to make sure the pesky patch you just got rid of doesn’t get reinstalled, you’ll need to disable, block, or hide that patch after the fact. The exact language here will depend on what software you’re updating.   When you invest in an all-encompassing patch management solution, these tasks will often be much easier to do—and less time-consuming.  

Patching Tips You Need to Know

There are some best practices that you can use to ensure your patching routine goes as planned. First, it’s important to run patches on a schedule. You’ll want to ensure that you are applying patches at times when your network has few or no users present, to minimize any interruptions to their workflow. It’s also important to apply patches quickly for the sake of cybersecurity. You should also be certain that you have a complete and robust understanding of all of the devices and inventory on your network. You can’t patch effectively if you don’t know what you’re working with. Generally, automating your patch management is the best path toward saving time and money, minimizing stress—and ensuring your network stays safe and up-to-date.  

Conclusion

If you’ve struggled with troublesome patching before, you’re not the only one. Individual tech users and IT departments can often have issues in this area. Sometimes patches cause more issues than they’re worth. In which case you will need to remove a patch, or brainstorm an alternate solution. We hope this article provided useful information about how to deal with a troublesome patch. Be sure to save it for the future so that you can refer back anytime you need a reminder about what you should do, should you find yourself in a patchy situation.  

FAQs

 

What should I do if I accidentally remove a necessary patch?

If you accidentally remove a necessary patch, you should be able to reinstall it. Patches that you roll back are not removed from the system forever; they’re just temporarily uninstalled. If you realize a patch needs to be reinstalled, you can implement a workaround to fix whatever issue it may have caused.  

Can I prevent patches from being installed automatically?

You can go into your program’s settings and disable automatic updates to prevent patches from being automatically deployed. You can also prevent patches from being installed after you roll them back by disabling, hiding, or blocking them.  

Why do patches sometimes cause problems?

Patches are not perfect solutions, meaning that they sometimes cause problems even as they’re fixing others. That’s because patching isn’t a perfect science. They’re meant to quickly solve problems, which means that they’re not always compatible with every device interface.

Removing a troublesome patch with Atera

The Patch Management Software that will ease your IT life!

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Atera
Small and medium IT operators are the heroes behind the scenes supporting companies around the world. They care a lot for their clients (external or internal) and often work virtually 24/7. However, small and medium IT service providers have always been underserved.
Atera was built for exactly that. With the vision to simplify and streamline the work of Managed Service Providers and IT professionals. To create something that saves them time, energy, and money. To free them from needing to constantly put out fires.
That vision created the remote-first IT management software – enabling IT professionals to shift from reactive task takers to proactive problem solvers.
Now operating from our beautiful offices on Rothchild in Tel Aviv, Atera is currently used by thousands and thousands of IT professionals all over the world (105+ countries).
As we rapidly grow, our goal remains the same: to transform the IT industry with revolutionary technology, while creating one of the happiest and healthiest work environments in the world.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×