Martin's selection of few interesting IT Security, Privacy, and free tools from the Net

Tuesday, June 27, 2017

Malware , Virus , Bots - Simple solution PATCH (you have heard this many times but it is true),, non-admin account and Think before you click



We have had two Ransomware worms in the last few weeks.

Both exploiting vulnerabilities that were patched a couple of months back

Simple solutions
1. Patch your systems
2. Do not use accounts with Admin privileges (when not needed)
3. Think before you Click


http://www.darkreading.com/attacks-breaches/petya-or-not-global-ransomware-outbreak-hits-europes-industrial-sector-thousands-more/d/d-id/1329231?_mc=sm_dr&hootPostID=e0a945bbd8c7eef97924b654b8032fcc
Posted by MVJBlogger at 3:00 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Ransomware, Worm

Tuesday, June 13, 2017

Dangers of Social Media - New SANS Poster



Get it now and

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201507_en.pdf

Posted by MVJBlogger at 10:29 AM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Poster, Security, Social Network
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Search This Blog

Translate

About Me

MVJBlogger
View my complete profile

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments

Popular Posts

  • New Pen Test Poster from SANS
    Get it here. http://counterhack.net/Poster_PenTest_2015.pdf
  • Good news - Firefox (v58 - Jan 2018) will add a new feature - BLOCK canvas-browser-fingerprinting
    Mozilla is testing a new feature in the upcoming version of its Firefox web browser that will grant users the ability to block canvas f...
  • Serverless Architectures - We can't add any endpoint protection (firewall,HIPS,EDR) so, what can we do?
    No magic bullet here - Serverless computing forces software architects and developers to approach security the way it should've been a...
  • Useful Add-On - For Symantec DLP - for better dashboard with Real-time Data. (if you have extra money to spend)
    This might help those who need real-time data According to the article:-  MetriX provides those within security with an unprecedented...
  • njRat (not New Jersey Rat) Malware - infect 24K computers, and is used by 487 groups.
    This is the downside of (evil)code that can easily be ported or shared. According to the article:- "Symantec analysed 72...
  • I was not aware of this - Google DNS was hijacked for 22 minutes on March 16
    It does not seem to be Google's fault but the ISP  According to the article:-  Google's Public DNS servers are used...
  • You are not safe any more - Malvertising hits websites such as YouTube, Amazon and Yahoo
    If three of the most popular sites are being targeted by Malware how, can a common man survive. If you have not done this before , ...
  • Six examples - How employee accounts could be compromised.
    Everyone knows compromised accounts are hard (not impossible) to detect.  One of the problem is that employees don't like it when...
  • With negligent admins , hackers don't have to work hard - A hacker managed to obtain the sensitive documents (U.S. Military Drone Documents) by gaining access to a Netgear router that was using the default FTP login settings for file sharing.
    The authentication vulnerability in Netgear routers that hacker exploits to access the sensitive military data was initially discovered tw...
  • Value of a hacked PC in Pictures
    From: http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

Categories

  • 3rd party
  • 3rd Party Risk
  • abuse
  • Active Directory
  • Add-On
  • admin error
  • advisory
  • AI
  • AMAZON
  • Android
  • App Security
  • Apple
  • APT
  • ATM
  • attack
  • Authentication
  • automation
  • automobiles
  • Availability
  • backdoor
  • Bad Programming
  • Bad Security
  • Banks
  • Basics
  • bec
  • best practice
  • Big Brother
  • Big Data
  • biology
  • Biometrics
  • BLOCKCHAIN
  • Botnet
  • browser
  • Bureaucracy
  • Business
  • buzzword
  • BYOD
  • c
  • certificate
  • checklist
  • child privacy
  • children
  • chrome
  • Cloud
  • Communication
  • COMPLIANCE
  • Compromise
  • confidentiality
  • Consumer Goods
  • containers
  • Contrarian View
  • COVID-19
  • creative
  • credentials
  • Credit Card
  • Credit Card Privacy
  • cryptocurrency
  • cryptomining
  • Cyber Insurance
  • CyberAttack
  • Cyberespionage
  • CyberSecurity
  • Dangerous
  • Dashboard
  • Data Breach
  • data collection
  • Data exposed
  • Data Loss
  • database
  • DDoS
  • Defense-In-Depth
  • Denials
  • discovery
  • dishonesty
  • DLP
  • DNS
  • do-it-yourself
  • doubbt
  • double-standards
  • Dumb
  • email
  • encryption
  • end of life
  • endpoint
  • EOL
  • ERP
  • Exfiltration
  • exploit
  • exposed
  • extortion
  • extra
  • Fact-is-stranger-than-fiction
  • fake
  • fingerprinting
  • Fix
  • Flaw
  • Forensic tool
  • Forensics
  • Fraud
  • Free book
  • Free Courses
  • free poster
  • Free Software
  • free tools
  • Funny
  • Future Tech
  • Gadgets
  • GDPR
  • General
  • General Knowledge
  • Geo-Tracking
  • gone with the wind
  • Good News
  • Good Reads
  • Google
  • gov
  • Government
  • GRC
  • Guidelines
  • Habits
  • Hack Tools
  • hacked
  • Hacking
  • Hacktivism
  • Hall Of Shame
  • hardware bug
  • health
  • HealthCare
  • Hijack
  • HIPAA
  • History
  • HOW-TO
  • HP
  • Human Nature
  • human vulnerability
  • Hypocricy
  • IAM
  • Identification
  • identity theft
  • illiterate
  • Incident Response
  • Industry News
  • infection
  • Insider Threat
  • inspiring
  • interesting
  • internal theft
  • Invention
  • IoT
  • iPhone
  • Ir-responsible
  • ISACA
  • ISP
  • Jargon
  • Law
  • Layered Security
  • laz
  • laziness
  • lazy coding
  • Legal
  • LIES
  • LIFE
  • Linux
  • mail
  • Malware
  • Management
  • Marketing
  • Medical
  • Mergers and Takeovers
  • Metadata
  • Methodology
  • Metrics
  • mfa
  • Microsoft
  • misinformation
  • mistakes
  • Mobile
  • Mobile App
  • Money
  • Monitoring
  • Multi-Factor
  • Myths
  • Nature
  • Negative Report
  • networking
  • new feature
  • nice
  • no-confidence
  • non-profit
  • Open Source
  • OS
  • Outdated
  • OutSourced
  • password
  • patches
  • PDF
  • Pen Test
  • Penalty
  • Philosophy
  • Phishing
  • PII
  • PKI
  • Policies
  • Poster
  • Predictions
  • Privacy
  • process failure
  • product knowledge
  • Programming
  • Protection
  • Public Incidents
  • Questions
  • QUIZ
  • Quotes
  • Ransomware
  • RAT
  • Repeated Failures
  • Report
  • Research
  • Risk
  • ROI
  • RSA
  • SANS
  • SANS top 20
  • scams
  • scareware
  • Science
  • Scientists
  • screw-up
  • Security
  • Security Analytics
  • security awareness
  • Security Breach
  • Security Ignorance Syndrome
  • Security Mistakes
  • serious
  • serverless
  • SIEM
  • SIS
  • smart devices
  • smart home
  • smart phones
  • SmartHome
  • SOAR
  • Social Network
  • Software
  • spyware
  • State Sponsored
  • Storage
  • Strange
  • supply chain
  • surveillance
  • Survey
  • Symantec
  • Synergy
  • Technology
  • Terminology
  • testing
  • Theft
  • third party
  • third party insecurity
  • Threat
  • tips
  • tracking
  • training
  • traking
  • Trojan
  • Trust
  • tutorial
  • unethical
  • Universe
  • USB
  • useful
  • Victims
  • Video
  • virtualization
  • Vmware
  • VPN
  • Vulnerability
  • Watchout
  • wearable tech
  • Web
  • web attack
  • White Papers
  • WiFi
  • windows
  • Wireless
  • Wisdom
  • Worm
  • XP
  • zero trust
  • zero-day

Blog Archive

  • ►  2020 (71)
    • ►  July (8)
    • ►  June (6)
    • ►  May (10)
    • ►  April (8)
    • ►  March (16)
    • ►  February (12)
    • ►  January (11)
  • ►  2019 (145)
    • ►  December (10)
    • ►  November (9)
    • ►  October (11)
    • ►  September (10)
    • ►  August (22)
    • ►  July (8)
    • ►  April (10)
    • ►  March (17)
    • ►  February (24)
    • ►  January (24)
  • ►  2018 (352)
    • ►  December (18)
    • ►  November (30)
    • ►  October (25)
    • ►  September (19)
    • ►  August (37)
    • ►  July (43)
    • ►  June (49)
    • ►  May (36)
    • ►  April (26)
    • ►  March (22)
    • ►  February (9)
    • ►  January (38)
  • ▼  2017 (155)
    • ►  December (30)
    • ►  November (29)
    • ►  October (35)
    • ►  September (14)
    • ►  August (5)
    • ►  July (14)
    • ▼  June (2)
      • Malware , Virus , Bots - Simple solution PATCH (yo...
      • Dangers of Social Media - New SANS Poster
    • ►  May (8)
    • ►  April (6)
    • ►  March (6)
    • ►  February (4)
    • ►  January (2)
  • ►  2016 (64)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  July (7)
    • ►  June (3)
    • ►  May (7)
    • ►  April (19)
    • ►  March (6)
    • ►  February (8)
    • ►  January (8)
  • ►  2015 (127)
    • ►  October (16)
    • ►  September (18)
    • ►  August (20)
    • ►  July (21)
    • ►  June (23)
    • ►  May (22)
    • ►  April (3)
    • ►  March (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2014 (411)
    • ►  December (7)
    • ►  November (1)
    • ►  October (6)
    • ►  September (4)
    • ►  August (20)
    • ►  July (27)
    • ►  June (8)
    • ►  May (33)
    • ►  April (68)
    • ►  March (191)
    • ►  February (46)
Simple theme. Powered by Blogger.