web analytics

Hey, turn Bluetooth off when you’re not using it

    You intuitively know why you should bolt your doors when you leave the house, and add some sort of authentication for your smartphone. But there are lots of digital entrances that you leave open all the time, like Wi-Fi and your cell connection. It’s a calculated risk, and the benefits generally make it worthwhile. That… Continue reading Hey, turn Bluetooth off when you’re not using it

‘Crash Override’: The Malware That Took Down a Power Grid

September 12th, 2017   By  Andy Greenberg   At midnight, a week before last Christmas, hackers struck an electric transmission station north of the city of Kiev, blacking out a portion of the Ukrainian capital equivalent to a fifth of its total power capacity. The outage lasted about an hour—hardly a catastrophe. But now cybersecurity researchers… Continue reading ‘Crash Override’: The Malware That Took Down a Power Grid

‘Secure’ BlackBerry Priv smartphone isn’t getting any Android updates

So that’s not that secure then, is it?   September 12th, 2017   By  Graham Cluley     Back in 2015, I mocked a cringeworthy product demo by BlackBerry’s CEO of the Priv, the company’s first Android-powered device.   Judging by the feedback I received on YouTube, BlackBerry fanboys hated my mickey-taking of the Priv, but… Continue reading ‘Secure’ BlackBerry Priv smartphone isn’t getting any Android updates

Businesses Fail to Properly Secure, Assess SSH: ISACA

September 13th, 2017   By  Kelly Sheridan   Frequently used but underappreciated, Secure Shell is rarely secured, assessed, documented, or managed in a systematic way, researchers report.   Most businesses use the Secure Shell (SSH) technology, a cryptographic protocol designed to enable secure file transfers and remote communications. However, it’s rare they appropriately secure, document, routinely… Continue reading Businesses Fail to Properly Secure, Assess SSH: ISACA

5 Real Security Dangers of Downloading Pirated Games

September 13th, 2017   By Ben Stegner   Awesome video games are coming out all the time — in fact, so far 2017 has been one of the best years for gaming in recent memory. But new games are expensive, and nobody can afford to buy every new release.   So you might think of turning… Continue reading 5 Real Security Dangers of Downloading Pirated Games

Microsoft Security Update Minor Revisions Issued: September 12, 2017

—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256   ******************************************************************** Title: Microsoft Security Update Minor Revisions Issued: September 12, 2017 ********************************************************************   Summary =======   The following CVEs have been revised in the September 2017 Security Updates.   * CVE-2017-8686 * CVE-2017-8707 * CVE-2017-8708 * CVE-2017-8710 * CVE-2017-8714 * CVE-2017-8750 * CVE-2017-8759     Revision Information: =====================… Continue reading Microsoft Security Update Minor Revisions Issued: September 12, 2017

Sysinternals Update September 12th, 2017

Sysinternals Update: Sysmon v6.1, Process Monitor v3.4, Autoruns v13.8, AccessChk v6.11   Mark Russinovich  September 12, 2017   Full Article. Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Adobe Patches Security Bugs in Flash Player, ColdFusion, RoboHelp

September 12th, 2017  By Catalin Cimpanu     Adobe just released its monthly security updates and this month the company patched vulnerabilities in three products — Adobe Flash Player, Adobe ColdFusion, and Adobe RoboHelp, the company’s lesser known help authoring tool (HAT), used for the creation of online or offline documentation and help files.  … Continue reading Adobe Patches Security Bugs in Flash Player, ColdFusion, RoboHelp

Linux Malware Could Run Undetected on Windows: Researchers

By Ionut Arghire on September 12, 2017   A new Windows 10 feature that makes the popular Linux bash terminal available for Microsoft’s operating system could allow for more malware families to target the operating system, Check Point researchers claim.   Called Windows Subsystem for Linux (WSL), the feature exited beta a couple of months… Continue reading Linux Malware Could Run Undetected on Windows: Researchers

Beware the Kedi RAT pretending to be a Citrix file that Gmails home

September 12th, 2017  By Bill Brenner     Researchers have discovered a new remote-access Trojan (RAT) called Kedi, which can snoop on infected systems, steal data and evade security scanners. It was attached to a spear phishing campaign when it was first discovered last week.   The attacks appear to be targeted rather than widespread… Continue reading Beware the Kedi RAT pretending to be a Citrix file that Gmails home