Microsoft Computing Safety Index on Safer Internet Day [infographic]
Last week on Safer Internet Day, Microsoft promoted steps to take to improve safety on their personal computers and mobile devices. You can find the 2012 Microsoft Computing Safety Index from...
View Articled0x3d! a security card game
d0x3d! is a game designed to engage and educate people about computer security. By making it a competitive game, it changes ways of thinking and the implication of an adversary to your security is...
View ArticleCompromise of cPanel Support server leads to spread of Linux SSHd rootkit
A rootkit has been infecting a number of Linux servers through the month of February. An early trend indicated servers running RedHat/CentOS and CloudLinux as well as cPanel could be vulnerable to...
View ArticleAvast! 8 available with new features
Avast announced version 8 of its free and paid antivirus is now available. It includes a number of new features and modules to the software. Updates to malware search capabilities, better use of the...
View ArticleSurprise! Java updates to 6u43 and 7u17 as the latest
“Yet another Java update” seems to be a trending topic among the security professionals. While it is not surprising that more Java zero days have continued to pop up, it is a little surprising that...
View ArticleThe results of Pwn2Own 2013
Reporting on Pwn2Own results always proves to be a popular article and the topic is always interesting with the contest changing a little bit each year. This year’s contest is taking place over...
View ArticleUsing Avast’s free for Education EndPoint Protection
One of my clients qualify for the avast! Free for Education program. At my suggestion, they applied and were approved. While remaining license compliant with a free antivirus beforehand, as I would...
View ArticleFBI on the next generation cyber-threats
John Boles, Deputy Assistant Director of the FBI’s Cyber Division, gave a statement earlier this month to the House Committee on the Judiciary, subcommittee on Crime, Terrorism, and Homeland Security....
View ArticleLooking to government agencies for guidance on technical and security matters
If you feel like you are always winging it when it comes to IT, you might make time to invest in some solid reading from various government agencies. The National Security Agency, the National...
View ArticleMcAfee Phinds Phishers are Pheasting [infographic]
According to McAfee Labs, Spam is losing its appeal to cybercriminals. Cybercriminals made over $680 million in the first half of 2012 through phishing schemes. As a result, phishing sites increased...
View ArticleAdding two-factor authentication to your website
Last week, WordPress.com introduced two-step authentication as an optional feature for WordPress.com blogs. It utilizes the Google Authenticator app for iPhone, Android, or Blackberry smartphones. If...
View ArticleMalwarebytes false positive detects thousands of entries and renders...
A bad definition file affected Malwarebytes Anti-Malware yesterday. It detected scores of files as false positives and labeled them as Trojan.Downloader.ED. Processes, memory modules, files, and...
View ArticleIs a notepad a secure place to keep your passwords? Password Minder thought so
One that’s going around the web lately is poking fun at the Internet Password Minder infomercial. Infomercials are hardly known for their quality production and fair representation of their product...
View ArticleSecurity reports released from Microsoft, Symantec, and others
Microsoft, Symantec, Verizon, and Trend Micro have all released security reports recently. There must have been enough time since the last quarter ended or something else coordinating them. The...
View ArticleSocial engineering examples, methods, and stats [infographic]
Firewalls, antivirus programs, and other security measures protect our systems and data from unauthorized access. Unfortunately, there is still a means to access the data that requires no technical...
View ArticleBug Hunters [infographic]
Bug bounties have become a big part of the strategy for companies to get security researchers on their side. While there are many bugs out there that fetch a higher price in the shady back channels...
View ArticleUnderstanding the fine print in a Privacy Policy
Are you a compulsive liar? Do you consistently click ‘I Agree’ to having read the Terms of Service or Privacy Policy of a website or application even though you haven’t? The Zero Knowledge Privacy...
View ArticleFree security software tools from HBGary
HBGary was a technology security company that made more of a name for itself in its demise than its successes. The company was founded by Greg Hoglund, a security researcher and author of books on...
View ArticleLatest Global Phishing Survey released from Anti-Phishing Working Group
The APWG is a tax-exempted corporation to coordinate a coalition of members from around the world to have a unified response to cybercrime across different sectors. The organization offers public...
View ArticleOracle releases Java 7u25, no 6u51
Oracle released Java 7u25 on Tuesday. It is the first update where an update to Java 6 was not included despite February 2013 being the extended end of support for Java 6. Beyond February 2013, Java...
View Article