Stream

Join this community to post or comment

Ashley Smith

Security  - 
 
What will be our next security challenge in the coming decades? Without the shadow of any doubt, it will be the confidentiality and integrity of our online data. But that begs the question of how, and the answer is #ENCRYPTION!
Use the best encryption software to protect your sensitive data on the internet from intruders and third-party spy agencies.
1
1
Ace KC's profile photopritam bhansali's profile photo
Ace KC
 
The answer is not only encryption but usability and automation of encryption without complex passwords user do not want to to memorize in order to access all their data on different devices simultaneously.
Add a comment...

David Bisson

Security  - 
 
A toy maker's website is unwittingly serving up ransomware that encrypts visitors' files.

via +Tripwire, Inc.
A toy maker's website is unwittingly serving up ransomware that encrypts visitors' files.
1
Add a comment...
 
Mark Zuckerberg hints that you'll be able to chat with 'bots' on Messenger 
1
Add a comment...
 
Crooks are using a new #phishing scheme to trick users into handing over their Facebook credentials, and this time around, they're taking advantage of Facebook's own website to carry out their attacks.
The crooks are utilizing Facebook's Apps platform to host malicious content inside the #Facebook site itself. The attackers are registering Facebook apps, and they're using the platform's free range powers to load malicious Web pages via iframes.
The iframes load content from the crooks' server, which is displayed inside the Facebook app, shown on the Facebook website.
Beware of Facebook apps asking for your login details
3
Add a comment...

Identacor

Security  - 
 
How to know when you are hacked?

Cybercriminals are no ordinary criminals. They are smart and they are actively using different ways of hacking into people's accounts or systems. The worst part is, most hacks are detected weeks and months after. But if you are vigilant enough, you can detect these hacks early and minimize loss. Here's how to know when you are being hacked.
This infographic serves as a guide for cyber citizens to help them identify and know if and when they are hacked.
3
5
Technology in Business's profile photoFirble hx's profile photo
Add a comment...
 
security news analyzed - resorting 1-10 today 04/27 http://oversitesentry.com/security-news-reviewed/ … #cybersecurity #infosec
1
Add a comment...
 
The American public utility Lansing Board of Water & Light has posted on Facebook and Twitter that the company has become the victim of ransomware. It's unknown which type of ransomware infected the network but the malware did its job after someone opened an email attachment.
The American public utility Lansing Board of Water & Light has posted on Facebook and Twitter that the company has become the victim of ransomware. It's unknown which type of ransomware infected the network but the malware did its job after someone opened an email attachment.
2
4
Bill Buchanan's profile photoMarcus Zillman's profile photo
Add a comment...

David Bisson

Security  - 
 
Shopware has patched a 'critical' remote code execution bug that affects the functions of both the shop and the overall system.

via +Tripwire, Inc.
Shopware has patched a 'critical' remote code execution bug that affects the functions of both the shop and the overall system.
1
Add a comment...
 
Adobe's Flash Player took every position of the Top 10 of most attacked vulnerabilities through exploit kits, according to the security department of the NTT Group, the largest Japanese telecom provider.
1
Add a comment...

Ashley Smith

Security  - 
 
What will be our next security challenge in the coming decades? Without the shadow of any doubt, it will be the confidentiality and integrity of our online data. But that begs the question of how, and the answer is #ENCRYPTION!
Use the best encryption software to protect your sensitive data on the internet from intruders and third-party spy agencies.
2
1
Chris Harpner (CSharpner)'s profile photoTechnology in Business's profile photo
 
I strongly recommend against BitLocker. Snowden documents reveal that they have successfully attacked BitLocker via the TPM chip. Also, if you encrypt your Windows 10 drive with Windows provided encryption, Microsoft is storing your keys on THEIR servers. Avoid Microsoft encryption at all costs. I recommend VeraCrypt. It's free, open source, has passed security audits, and YOU are in control of the keys.
Add a comment...
 
Older article but a good read if you missed it
1
Aaron Darkwood's profile photo
 
Great read

ELAINE DEWAR

Security  - 
 
I am old, as you can see, which means I am slow to adopt. When Windows 10 came into my life, because I hit the wrong button, I did not know what to make of the rearrangement of my screen. Imagine my surprise at the appearanc...
3
1
ELAINE DEWAR's profile photo
Add a comment...
 
When your device is held hostage!
In 2015 753.684 users arround the world were infected by #Ransomware.
6
Add a comment...

David Bisson

Security  - 
 
I explain how you can protect your Yahoo! account from hackers with two-step verification.

via +Graham Cluley
David Bisson explains how you can protect your Yahoo! account from hackers and password thieves with 2SV.
4
1
SoraWisdom's profile photoTechnology in Business's profile photo
 
People still use yahoo?
Add a comment...

David Bisson

Security  - 
 
Researchers have developed a utility that allows victims affected by CryptXXX ransomware to decrypt their files for free.

via +Tripwire, Inc.
Researchers have developed a utility that allows victims affected by CryptXXX ransomware to decrypt their files for free.
4
2
Abak Hoben's profile photoHajjam Driss's profile photo
Add a comment...
 
How to beat CrytXXX ransomware
#Ransomware is mostly the end-user problem. However, businesses get hit too, and hit hard, especially the smaller ones. Now we´ve got a #decryptor for those infected with #CryptXXXhttps://kas.pr/bmM9
3
Tiếp thị Trực tuyến's profile photo
 
How to beat CrytXXX Full tường nhé+Kaspersky Lab Germany
 ·  Translate
Add a comment...

Ashley Smith

Security  - 
 
Anyone can fall victim, ANYONE! All it takes is a stray click on a harmful link, a prompt to download a file on your system or entering your credentials on a seemingly legit site and there you have it. You have just fallen victim to a phishing scam. It is not only devastating, but most of the ...
1
Add a comment...
 
Next Steps in Security - What is New AND Good? http://oversitesentry.com/next-steps-in-security-what-is-new-and-good/ … What are #cybersecurity red team challenges?
1
Add a comment...
 
How Microsoft, Adobe, and Sony's DRM has not only hurt consumers, but has also hurt corporate productivity... It's an information security matter.


-------------------

It’s a real bummer when people spend a lot of their money on AAA PC games, only to not be able to play them. Major publishers like EA, Activision, and Ubisoft are pushing their own online services, requiring their PC and console games to connect to their servers for any sort of functionality whatsoever. That includes single-player games.

Those publishers never seem to have sufficient server capacity to handle the traffic from millions of players executing their games soon after the launch of immensely popular titles. It leads to millions of customers becoming frustrated that they can’t play the games they paid for, many of which were preordered.

Developers and publishers say that the “always online” requirement of their new games is to enhance functionality that gamers should appreciate. Maybe so, but demanding constant connectivity to their servers is mainly a DRM measure, a sloppy way of combating piracy. But that sort of a system penalizes paying consumers a lot more than it inconveniences pirates...

#Microsoft #Adobe #Sony #infosec #cybersecurity #itsecurity #tech
It’s a real bummer when people spend a lot of their money on AAA PC games, only to not be able to play them. Major publi…
1
Add a comment...