web analytics

Expert discovered online data belonging to the trading firm AMP

April 29, 2017  By Pierluigi Paganini   Security expert Chris Vickery reported a data breach at online trading firm AMP that exposed customer credit reports, and Social Security numbers.                                  The popular security expert Chris Vickery has discovered a new data breach that affected the AMP… Continue reading Expert discovered online data belonging to the trading firm AMP

Linux Mint-using terror nerd awaits sentence for training Islamic State

Paranoid fella hid operating system, weapons manuals in USB drive cufflinks, no less                                      28 Apr 2017 at 17:54, Gareth Corfield   A paranoid Welsh Muslim who wore gloves while typing on his laptop, admitted being part of Islamic State, and, gasp, harbored a copy of… Continue reading Linux Mint-using terror nerd awaits sentence for training Islamic State

Chrome Will Tag HTTP Websites as ‘Not Secure’ in Address Bar Whenever User Enter Details

28th April 2017   By Zara Ali                                             Google is working on making its Chrome browser safer for users. The tech giant had been warning websites on using HTTPS instead of HTTP since January this year. Taking another step ahead for security, Chrome has announced that… Continue reading Chrome Will Tag HTTP Websites as ‘Not Secure’ in Address Bar Whenever User Enter Details

Apache OpenOffice: Not dead yet, you’ll just have to wait until mid-May for mystery security fixes

Despite doubts, open source suite will soon be updated                               28 Apr 2017 at 19:33, Thomas Claburn   Apache OpenOffice, sized for euthanasia by one of its own last year, still lives and should see an update before the end of May, we’re told.   The open source productivity suite has been referred… Continue reading Apache OpenOffice: Not dead yet, you’ll just have to wait until mid-May for mystery security fixes

New OSX.Dok malware intercepts web traffic

April 28, 2017 by Thomas Reed                                         Most Mac malware tends to be unsophisticated. Although it has some rather unpolished and awkward aspects, a new piece of Mac malware, dubbed OSX.Dok, breaks out of that typical mold. OSX.Dok, which was discovered by Check Point, uses sophisticated means to monitor—and potentially alter—all… Continue reading New OSX.Dok malware intercepts web traffic

Open Ports Create Backdoors in Millions of Smartphones

Applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan.   Open ports are a well-known threat vector on servers, where administrators deploy security software with the primary purpose of shutting down or alerting the owner every time an unauthorized port… Continue reading Open Ports Create Backdoors in Millions of Smartphones

Virginia State Police shut down its email system to combat malware threat

A variation on the old “It looked like a legitimate email, so I opened it” excuse. Full story here:   http://www.richmond.com/news/virginia/government-politics/virginia-state-police-shut-down-its-email-system-to-combat/article_1c62060d-5812-51ae-acf3-8c86aa1249b0.html Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Cloud Security and Traditional IT Should Go Hand in Hand

Cloud security is the order of the day, the trend and the need of our times. Enterprises today spend much on cloud antivirus and cloud security, but with many enterprises finding the right balance between cloud security and traditional IT continues to be an issue. Ask any security expert or trade analyst and you’d be… Continue reading Cloud Security and Traditional IT Should Go Hand in Hand

Blind Trust in Email Could Cost You Your Home

27th April 2017   The process of buying or selling a home can be extremely stressful and complex, but imagine the stress that would boil up if — at settlement — your money was wired to scammers in another country instead of to the settlement firm or escrow company. Here’s the story about a phishing email… Continue reading Blind Trust in Email Could Cost You Your Home

Attack Method Highlights Weaknesses in Microsoft CFG

By Tom Spring April 27, 2017                                                 Researchers at Endgame have been evaluating an exploitation technique called Counterfeit Object-Oriented Programming (COOP) to bypass Control Flow Integrity (CFI) implementations such as that used by Microsoft to harden the defenses of Windows 10.   Microsoft added its mitigation, called… Continue reading Attack Method Highlights Weaknesses in Microsoft CFG