Hook, line, and sinker
Posted on January 29th, 2015 at 3:46 pm by editor
Phishing is one of the most prevalent scams nowadays, and you should take specific steps to guard yourself from this malicious practice.
Phishing, unlike malware or viruses, is something you can prevent yourself. Most phishing scams rely on the greed of the recipient by offering (when looking at it from the outside) ridiculously get rich quick promos and such.
The solution is simply to keep a check on yourself whenever you read messages like this. We understand that some unsolicited emails may be important (although mostly no), so you have to check, but if it’s too good to be true, then it probably is. Check websites to see if they are secure, as many Phishing sites pretend to be legit ones. Guard your personal information and only divulge it to trustworthy sites – it’s all for your protection.
FBI Biometrics Database
Posted on January 22nd, 2015 at 2:53 pm by Avatar
United States law enforcement agencies have long used the centralized database systems for storing information on criminals and other law breaking activities for inter-agency cooperation. The FBI has proposed a new system which would also contain more biometric information included with the old photos, rap sheets and biographical information in hopes to boost the capability of crime prevention and investigation units in getting information. The said plan gets many critics due to many problems that are foreseen to come with a new system such as the fact that the agency’s network and computers are some of the most attacked computers on earth. The transmission of all information regarding an investigation is to be sent to the FBI first before all other agencies, which raises questions on the transmission security of the said information. The system in place that has been modified for Homeland Security has a lot of flaws wherein many people with misdemeanors get arrested as “terrorists”. There is no contesting the fact that there is a need for such a system but further testing and development should be done as many experts see the plan. The security and reliability of the government should be prioritized and developed to the full capability of current technology for it to remain acceptable and adaptable for the times to come.
Black Hat – Dark Tangent Hired By US Government
Posted on January 15th, 2015 at 2:45 pm by Grace
In a move that signifies that the US government may finally be taking cyber-security seriously, they have enlisted the help of the black hat/hacker aka. Dark Tangent, that has been responsible for some of the world’s most prolific viruses a few years back. Hiring a hacker to counter hackers may be the best way to go as there are not many options in the world of hackers where anybody can be anybody. These people are considered to be the scourge of the internet, responsible for some of the most damaging viruses, worms and other forms of attacks that exacts millions of dollars of economic damage each and every year. (Read the rest of this story.)
PDF’s now Propagation Method of Trojans
Posted on January 8th, 2015 at 2:25 pm by Avatar
Posted on January 1st, 2015 at 1:07 pm by Grace
by Andrea Mella
WhiteHat Security is the leading supplier of website security services. WhiteHat has been bringing out a statement with the intention of examining the condition of website security for the past years. All through, the business has seen numerous and group of website assaults which keep on increasing and positioning receptive personal information as well as social security and credit card numbers, in addition to monetary and health check records at jeopardy. Besides to the standard list of vulnerabilities that continually create the top 10 record, WhiteHat foresees Cross-Site Request Forgery (CSRF) that will connect the analysis in the near future.
Twitter Login Verification Feature Now Available
Posted on December 25th, 2014 at 11:50 am by Hannah
Last month, we reported that Twitter was stepping up their game to put new security measures in place.
As expected, Twitter took the two-factor authentication approach with their new login verification feature. The feature, which is optional, can be set up on the account settings page. You need to add your phone number to the account, after which Twitter will always send a six-digit verification code to that phone that you will be required to enter every time you try to sign into your Twitter account. You may turn off login verification anytime, but as long as it is on, you won’t be able to sign in on any computer without your phone on hand.
For those that access Twitter via an app on their phone, Twitter warns that it may not work with some cell phone providers because the current release of login verification “is built on top of Twitter via SMS, so we need to be able to send a text to your phone before you can enroll in login verification.”
Symantec Releases Threat Analysis for 2007 (Part 1)
Posted on December 18th, 2014 at 8:20 am by Avatar
Symantec Inc., one of the industry’s leaders in virus and internet protection software has released their analyses of malware activities that wanted to steal personal information for the year 2007. It shows that from Jan to Jun last year, there were almost 7,000 incidents of attacks on the internet and systems their software are protecting while almost double for the next half year. This trend is quite alarming for cyber attacks have grown considerably that more and more people are falling victim to such attacks. The company conducts their own hacker communications analyses and other intelligence by analyzing information they set in honey-pots (purposely set traps to track hacker activities) and the results their software sends in to them for analyses.
Symantec Releases Threat Analysis for 2007 (Part 2)
Posted on December 11th, 2014 at 6:38 am by Avatar
They also report that the amount of malware has increased significantly with them growing ever complex making it harder for industry to cope unless there is mass infections. The initial detection of a threat mobilizes emergency centers that these software company’s have who work against the clock to provide updates to their many registered subscribers which they send updates to once they have the cure. They also send out updates to virus signature databases which allows the anti-virus, Intrusion detection and Prevention Systems to counter attacks by letting them recognize them hopefully in time to prevent mass infection.
Mock Penetration Attacks a Must for Federal Agencies
Posted on December 4th, 2014 at 5:58 am by Avatar
The NIST, has come out with a recommendation for all Federal government agencies to mount mock attacks to see the robustness and effectivity of security and penetration prevention measures/countermeasures that are employed. This due to alarming events that have happened to the British Government�s Tax Offices of junior government people getting hold and rights to download supposedly secure data from government servers. The US Government IT branch recommends that it be done on undisclosed schedules and employ rotating modes of attack to see if all the security in place is doing its job of protecting the information it is supposed to protect.
Posted on November 27th, 2014 at 5:03 am by Kitch
PC World recently placed Kaspersky 2012 on the 4th spot in the roundup of security suites. It is developed by Kaspersky Lab and works with Microsoft Windows. This software is an all in one computer protection. It keeps you safe from malware and phishing websites while you’re online – shopping, banking and social networking. For a reasonable $80, this will cover a whole year of protection of up to three PCs. You can also protect your family. You can control access to the internet, games and websites. You will have full control at all times! There are back up and restore features to protect any photos, videos or files that are important to you. In case of loss or theft, or crash of hard drives there will be no need for panic. You can put your own password to avoid any paranoia. The speed and efficiency of your computer won’t be compromised.