Wednesday, February 24, 2016
Do you like paying Ransom?
No?
Then don't become a victim of Ransomware.
Here is a simple article that shows the common ways users get tricked
http://it.wvu.edu/security/defend-your-data/ransomware
Simple and easy - Password protection suggestion
Security folks know this.
For ordinary folks , this might help.
http://www.cnbc.com/2016/02/24/8-ways-to-protect-your-passwords-from-identity-theft-online.html
Tuesday, February 23, 2016
If you use Firefox - This article should help you to better secure the browser
I always liked Firefox and I use a bunch of add-ons.
For those who want to securely use Firefox, the following page will be very helpful
https://vikingvpn.com/cybersecurity-wiki/browser-security/guide-hardening-mozilla-firefox-for-privacy-and-security
Tuesday, February 16, 2016
PC/Laptop Boot Failure - Free Poster with a detailed flowchart
Wednesday, February 10, 2016
Wednesday, February 3, 2016
Do you use Chromodo Browser - if so you need to read this
I don't use it but I am still shocked
From the article:
“Chromodo is described as ‘highest levels of speed, security and privacy,’ but actually disables all web security. Let me repeat that, they ***disable the same origin policy***…. ?!?..” Ormandy wrote in an advisory published Tuesday by Google’s Project Zero research team.
“They also hijack DNS settings, among other shady practices,” Ormandy wrote.
Chromodo browser installed with Comodo Internet Security disables the same-origin policy by default.
The same-origin policy is a fundamental tenet of web security, ensuring that scripts access data from a second webpage only if the two pages have the same origin.
For More Info
https://threatpost.com/chromodo-browser-disables-same-origin-policy/116131/
Tuesday, February 2, 2016
How would you feel if someone stole your money and you don't even know it
I am pretty sure "ignores is bliss" may not work in this scenario
According the article:
Attackers have begun sending spam emails with poisoned attachments to customers at 14 different Japanese banks, according to Limor Kessem, a cybersecurity evangelist with IBM
(here is the interesting part)
After making off with a victim’s money, in some instances, URLZone hides the transaction line with HTML injections, making it appear like no money was taken.
For More Info:
https://threatpost.com/urlzone-back-targeting-banks-in-japan/116107/
According the article:
Attackers have begun sending spam emails with poisoned attachments to customers at 14 different Japanese banks, according to Limor Kessem, a cybersecurity evangelist with IBM
(here is the interesting part)
After making off with a victim’s money, in some instances, URLZone hides the transaction line with HTML injections, making it appear like no money was taken.
For More Info:
https://threatpost.com/urlzone-back-targeting-banks-in-japan/116107/
Subscribe to:
Posts (Atom)