Search

You searched for the word(s): userid:2248
Page 1 of 339 (3387 items) 1 2 3 4 5 Next > ... Last »
  • Heartbleed – Arrest made in Canada for hacking tax agency records

    This is likely someone capitalizing on use of the exploit itself (not original developer) http://money.cnn.com/2014/04/16/technology/security/canada-heartbleed/index.html QUOTE: Canadian mounties have arrested a teenager who, they say, used the Heartbleed Internet bug to hack into the country's tax agency. Shortly after the Internet bug was revealed to the world last week, the Canada Revenue Agency suffered a data breach that leaked the Social Insurance Numbers of about 900 taxpayers. The agency
  • HeartBleed - List of Major sites where passwords should be changed

    A "zero day" attack for this Open SSL flaw has been undetected for two or more years. The changing of static passwords at least annually is always a beneficial best practice. Some of the MAJOR impacted sites are listed below: IMPACTED SITES YOU SHOULD SHOULD CHANGE PASSWORDS FOR: Yahoo, Flickr, Tumblr, Blogger/Blogspot, Dropbox, Facebook, Electronic Frontier Foundation, Etsy, Google, Imgur, Instagram, Netflix, Pinterest, Stack Overflow, Twitter, Wikipedia, Woot, Wordpress.com/Wordpress
  • HEARTBLEED Malware - Open SSL vulnerability discovered

    The ISC has escalated to rare YELLOW ALERT status and it is important for administrators to patch expediently and for users to change passwords for email, banking, and other sites that may have been affected. https://isc.sans.edu/forums/diary/+Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921 http://www.f-secure.com/weblog/archives/00002694.html http://www.komando.com/blog/247387/super-bug-exposes-your-information-on-tons-of-websites http://heartbleed.com/ QUOTE : The Heartbleed Bug is a serious vulnerability
  • Malwarebytes v2.0 - Documentation and additional resources

    Additional information shared by fellow security professionals is noted below on how to use the product and the new features effectively: The online guide is available here: http://www.malwarebytes.org/support/guides/mbam/ PDF version available here: http://static-cdn.malwarebytes.org/assets/userguides/2014-03-10/MalwarebytesAntiMalwareUserGuide.pdf Quick Scan --> Threat Scan -- Threat Scan is the primary scan to choose because in almost all cases it catches all malware that a "Full Scan"
  • Malwarebytes v2.0 - FAQs and Press announcement

    More details on this great new product release: http://blog.malwarebytes.org/news/2014/03/malwarebytes-anti-malware-2-0/ QUOTE: We have also built in and improved our Anti-Rootkit and Chameleon self-protection technologies , which have been in beta for the past year. Additionally, we’ve rewritten Malicious Website Blocking and improved native x64 support . Most importantly, our detection and removal engine was significantly improved under the hood and kicks even more malware butt! With the
  • Hardware - Advantages and Disadvantages of physically shutting down PC

    Interesting & updated article below from Kim Komando on pros/cons of physically powering off desktops or laptops when not in use. I usually have always done that without major issues. One key advantage is that Windows Updates are often installed during the power off process. Also, when there is a potential for T-Storms everything gets physically unplugged including DSL. Conversely, there are benefits in performing overnight defrags, AV scans, or other maintenance functions. Leaving a system on
  • Microsoft – System Development Lifecycle story to implement TWC

    An excellent historical recap of how security was strategically integrated into Microsoft's development process. http://www.microsoft.com/security/sdl/story/ QUOTE: Across thousands of developers and millions of lines of code, one company learns to build secure software in an increasingly insecure world. It was 2 a.m. on Saturday, July 13, 2001, when Microsoft’s then head of security response, Steve Lipner, awoke to a call from cybersecurity specialist Russ Cooper. Lipner was told a nasty
  • Facebook - DeepFace software improves Facial recognition in photos

    Facebook has introduced new software to improve facial recognition http://www.huffingtonpost.com/2014/03/18/facebook-deepface-facial-recognition_n_4985925.html http://facecrooks.com/Internet-Safety-Privacy/Facebook-Announces-%e2%80%9cDeepFace%e2%80%9d-Photo-Matching-Technology.html/ QUOTE: Facebook owns the world's largest photo library, and it now has the technology to match almost all the faces within it. Facebook announced last week that it has developed a program called " DeepFace ,"
  • Facebook - Spam controls for newly installed applications

    When special Facebook applications are installed they may email friends and contacts excessively. These links provide helpful controls: http://www.businessinsider.com/prevent-apps-from-updating-on-facebook-2014-3 http://facecrooks.com/Internet-Safety-Privacy/How-Stop-Your-Facebook-Apps-From-Spamming-Your-Friends.html/ QUOTE: That’s why Business Insider published a valuable blog post this week telling readers how they can stop their Facebook apps from spamming their friends . First, open your
  • Malwarebytes version 2.0 - improved GUI & features

    PC Magazine reviews Malwarebytes version 2.0, which is excellent tool with improved user interface, built-in rootkit detection, and thorough malware scanning capabilities. http://securitywatch.pcmag.com/security-software/322084-malwarebytes-2-0-still-tough-on-malware-now-with-a-pretty-face FULL REVIEW - Malwarebytes Anti-Malware 2.0 (Editor's Choice - free product) http://www.pcmag.com/article2/0,2817,2455505,00.asp QUOTE: After ten years of version 1.x, Malwarebytes has finally released version
Page 1 of 339 (3387 items) 1 2 3 4 5 Next > ... Last »