Search

You searched for the word(s): userid:2248
Page 1 of 339 (3389 items) 1 2 3 4 5 Next > ... Last »
  • EMAIL 419 SCAM - Free World Cup 2014 tickets

    A new variant of the 419 scam uses both monetary amounts and Free World Cup 2014 finals tickets to lure individuals in revealing bank account and other sensitive information. These spammed emails should be deleted. http://blog.malwarebytes.org/fraud-scam/2014/04/world-cup-2014-cash-prize-tickets-email-is-a-419-scam/ QUOTE ; From the spam traps: a World Cup 2014 419 missive, with a wonderfully enlightening subject line: “ gkxzhlfgjs ‏”. This is, of course, complete nonsense and if
  • HeartBleed Open SSL vulnerability – How to test using NMAP

    The ISC shares techniques for testing vulnerable Open SSL sites using NMAP, which is an excellent free PENTEST tool used in network vulnerability testing https://isc.sans.edu/forums/diary/Testing+your+website+for+the+heartbleed+vulnerability+with+nmap/17991 QUOTE: We have received reports by many readers about buggy tools to test for the heartbleed vulnerability. Today I want to show you how easy it is to check for this vulnerability using a reliable tool as nmap. You just need to trigger a version
  • Heartbleed – Arrest made in Canada for hacking tax agency records

    This is likely someone capitalizing on use of the exploit itself (not original developer) http://money.cnn.com/2014/04/16/technology/security/canada-heartbleed/index.html QUOTE: Canadian mounties have arrested a teenager who, they say, used the Heartbleed Internet bug to hack into the country's tax agency. Shortly after the Internet bug was revealed to the world last week, the Canada Revenue Agency suffered a data breach that leaked the Social Insurance Numbers of about 900 taxpayers. The agency
  • HeartBleed - List of Major sites where passwords should be changed

    A "zero day" attack for this Open SSL flaw has been undetected for two or more years. The changing of static passwords at least annually is always a beneficial best practice. Some of the MAJOR impacted sites are listed below: IMPACTED SITES YOU SHOULD SHOULD CHANGE PASSWORDS FOR: Yahoo, Flickr, Tumblr, Blogger/Blogspot, Dropbox, Facebook, Electronic Frontier Foundation, Etsy, Google, Imgur, Instagram, Netflix, Pinterest, Stack Overflow, Twitter, Wikipedia, Woot, Wordpress.com/Wordpress
  • HEARTBLEED Malware - Open SSL vulnerability discovered

    The ISC has escalated to rare YELLOW ALERT status and it is important for administrators to patch expediently and for users to change passwords for email, banking, and other sites that may have been affected. https://isc.sans.edu/forums/diary/+Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921 http://www.f-secure.com/weblog/archives/00002694.html http://www.komando.com/blog/247387/super-bug-exposes-your-information-on-tons-of-websites http://heartbleed.com/ QUOTE : The Heartbleed Bug is a serious vulnerability
  • Malwarebytes v2.0 - Documentation and additional resources

    Additional information shared by fellow security professionals is noted below on how to use the product and the new features effectively: The online guide is available here: http://www.malwarebytes.org/support/guides/mbam/ PDF version available here: http://static-cdn.malwarebytes.org/assets/userguides/2014-03-10/MalwarebytesAntiMalwareUserGuide.pdf Quick Scan --> Threat Scan -- Threat Scan is the primary scan to choose because in almost all cases it catches all malware that a "Full Scan"
  • Malwarebytes v2.0 - FAQs and Press announcement

    More details on this great new product release: http://blog.malwarebytes.org/news/2014/03/malwarebytes-anti-malware-2-0/ QUOTE: We have also built in and improved our Anti-Rootkit and Chameleon self-protection technologies , which have been in beta for the past year. Additionally, we’ve rewritten Malicious Website Blocking and improved native x64 support . Most importantly, our detection and removal engine was significantly improved under the hood and kicks even more malware butt! With the
  • Hardware - Advantages and Disadvantages of physically shutting down PC

    Interesting & updated article below from Kim Komando on pros/cons of physically powering off desktops or laptops when not in use. I usually have always done that without major issues. One key advantage is that Windows Updates are often installed during the power off process. Also, when there is a potential for T-Storms everything gets physically unplugged including DSL. Conversely, there are benefits in performing overnight defrags, AV scans, or other maintenance functions. Leaving a system on
  • Microsoft – System Development Lifecycle story to implement TWC

    An excellent historical recap of how security was strategically integrated into Microsoft's development process. http://www.microsoft.com/security/sdl/story/ QUOTE: Across thousands of developers and millions of lines of code, one company learns to build secure software in an increasingly insecure world. It was 2 a.m. on Saturday, July 13, 2001, when Microsoft’s then head of security response, Steve Lipner, awoke to a call from cybersecurity specialist Russ Cooper. Lipner was told a nasty
  • Facebook - DeepFace software improves Facial recognition in photos

    Facebook has introduced new software to improve facial recognition http://www.huffingtonpost.com/2014/03/18/facebook-deepface-facial-recognition_n_4985925.html http://facecrooks.com/Internet-Safety-Privacy/Facebook-Announces-%e2%80%9cDeepFace%e2%80%9d-Photo-Matching-Technology.html/ QUOTE: Facebook owns the world's largest photo library, and it now has the technology to match almost all the faces within it. Facebook announced last week that it has developed a program called " DeepFace ,"
Page 1 of 339 (3389 items) 1 2 3 4 5 Next > ... Last »