Quantcast
Channel: Security and Privacy – 404 Tech Support
Browsing all 109 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Fake Firefox downloads are still running rampant

It seems 'Firefox' is still a dangerous keyword that malware authors like to target.

View Article


Image may be NSFW.
Clik here to view.

McAfee writes about Operation Tovar, taking a swipe at CryptoLocker and...

Law enforcement and the private sector, including McAfee, cooperated to dismantle the Gameover Zeus and CryptoLocker infrastructure, albeit temporarily.

View Article


Image may be NSFW.
Clik here to view.

Microsoft Interflow

Microsoft announced the private preview of Microsoft Interflow, a platform for exchanging security and threat information between cybersecurity analysts and researchers.

View Article

Image may be NSFW.
Clik here to view.

Microsoft takes down No-IP for passive role with malware

Microsoft took to the offense this week against malware, specifically Bladabindi (NJrat) and Jenxcus (NJw0rm) family of malware. In their sights to try to shut down this malware was another U.S.-based...

View Article

Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection giving Trojan.Webkit!html false positive

Symantec Endpoint Protection is flagging files called sh165.htm from people's Temporary Internet Files as a Trojan.Webkit!html.

View Article


Image may be NSFW.
Clik here to view.

Symantec report analyzes personal fitness trackers and security concerns

Symantec Security Response prepared a report on wearable fitness devices and found vulnerabilities with the devices and the model of data custodianship.

View Article

Image may be NSFW.
Clik here to view.

Internet Explorer will block out-of-date Java and other ActiveX controls

With an update today, Internet Explorer will block out-of-date ActiveX controls in 30 days. Old versions of Java will be the first control that will be blocked with others joining in the future.

View Article

Image may be NSFW.
Clik here to view.

Sprint hijacking NXDomain errors to search-error.com

I took my Android phone off of wireless and tried to browse to the subdomain on the cell network using Chrome for Android. Instead of reaching the page I intended, I got redirected to...

View Article


Image may be NSFW.
Clik here to view.

Symantec on ‘Shellshock’, the Bash Bug Vulnerability

Norton provided a write-up explaining on the Linux and Mac OS X vulnerability known as ‘Shellshock’ or the ‘Bash Bug’ works in an infographic and video.

View Article


Image may be NSFW.
Clik here to view.

Free e-book: Surviving on a Diet of Poisoned Fruit: Reducing the National...

Published in July by the Center for a New American Security, Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies by Richard J. Danzig describes...

View Article

Image may be NSFW.
Clik here to view.

October is National Cyber Security Awareness Month

October is National Cyber Security Awareness Month, coordinated by the Department of Homeland Security.

View Article

Image may be NSFW.
Clik here to view.

Keybase embraces social networks for cryptography

Keybase aims to help PKI by taking advantage of social networks, places where people are already pushing their identities.

View Article

Image may be NSFW.
Clik here to view.

Using CompTIA’s free IT Security Assessment Wizard

Last week, CompTIA announced a free-for-registered users IT Security Assessment Wizard in a press release. I decided to try it out and see if it would be of any value to evaluate my clients and...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Penetration Testing – A Hands-On Introduction to Hacking by...

Penetration Testing – A Hands-On Introduction to Hacking by Georgia Weidman is 528 pages long and was published by No Starch Press in June 2014. This book is a beginner’s guide to performing...

View Article

Image may be NSFW.
Clik here to view.

Avast updates free Windows and Mac clients to 2015

Avast has pushed out an update for the free antivirus clients, updating them to a 2015 version of the popular antivirus.

View Article


Archive.org launches The Malware Museum to preserve DOS viruses

The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation...

View Article

Pwn2Own gets revamped for 2016

Last Fall, TippingPoint was acquired by Trend Micro from Hewlett-Packard. As a major sponsor, this brought into question if Pwn2Own would continue. More details have been revealed to confirm that...

View Article


AV-Test announces 2015 antivirus product awards

AV-Test, an independent institute that evaluates antivirus products, has awarded their 2015 best product awards. Twelve awards were presented across different categories such as Protection,...

View Article

Malwarebytes refreshes logo, website and introduces Breach Remediation service

Malwarebytes has introduced a new logo for the company and also gave malwarebytes.org a redesign at the same time. The new logo makes the ‘M’ a single color, removes the shadowing, and reduces the...

View Article

Dell Security publishes 2016 Annual Threat Report

Dell Security published their Annual Threat Report. It looks back on cybercrime trends of 2015 and emerging risks for 2016. The report uses data collected by SonicWALL’s GRID network with feeds from...

View Article
Browsing all 109 articles
Browse latest View live