Blog
6.46 million LinkedIn passwords leaked online
By Zack Whittaker Summary: More than 6.4 million LinkedIn passwords have leaked to the Web after an apparent hack. Though some login details are encrypted, users are advised to change their passwords immediately. A user on a Russian forum has claimed to have...
Windows Updates – a bumper crop
Today was a big day for Windows Updates - one of our XP machines got 20 critical update, there were 21 on a windows 7 machine with MS Office installed and 13 for a machine without MS Office. This is a larger than normal number of windows updates - and as critical...
update your Flash player – AGAIN….
Once a week (if I remember) - I try to check the following items to see if they are as up-to-date as they can be... Adobe Reader Java Adobe Flash Player These three pieces of software are the three top-most exploited programs on my PC (and yours) - that if left...
Android Malware Used to Mask Online Fraud, Says Expert
By Gregg Keizer, Computerworld Android Malware Used to Mask Online Fraud, Says ExpertAndroid malware being automatically distributed from hacked websites looks like it's being used to mask online purchases, and could be part of a fraud gang's new push into mobile,...
Support for Windows Updates that won’t finish is FREE from Microsoft in most case (for home users)
Everyone knows they should run Windows Updates regularly - right? Well, once in a while, Windows Updates just STOP working - or you get an update that just will not apply. Our first recommendation is to ensure that you choose the "MANUAL" update method - and try to...
Keeping yourself safe with Java
By Greg Hewitt-Long One of the most common ways a piece of malware enters your computer is by exploiting an out-of-date piece of software on your computer - that software can be the operating system itself, Adobe Flash, Acrobat Reader, or Java - to name just a few....
Privacy and Security in the Consumer Cloud: The not so fine print
by Stephen Cobb ESET Security Evangelist The consumer cloud expanded again this week with the addition of Google Drive to more familiar brands like Dropbox, Microsoft SkyDrive, Apple iCloud, and Amazon Cloud Drive. Unfortunately, most of these cloud-based file storage...
QR Codes and NFC Chips: Preview-and-authorize should be default
by Stephen Cobb ESET Security Evangelist What do printed QR codes and NFC (Near Field Communication) chips have in common, besides storing instructions that computers can read? They are both hackable and their ability to store and communicate computer instructions is...
OS X Lamadai: Flashback isn’t the only Mac malware threat
by Alexis Dorais-Joncas Security Intelligence Team Lead The Flashback trojan has been all over the news lately, but it is not the only Mac malware threat out there at the moment. A few weeks ago, we published a technical analysis of OSX/Lamadai.A, the Mac OS X payload...
FBI – remove malware from your computer or lose internet service
by Jay Scherder, KY3 News SPRINGFIELD, Mo. -- It's being called the "Internet Doomsday." Thousands of computers could go offline this summer because of a virus. According to InformationWeek, at its peak the malware was infecting machines used by half of all Fortune...
Snow Leopard users most prone to Flashback infection
By Gregg Keizer Computerworld - Of the Macs that have been infected by the Flashback malware, nearly two-thirds are running OS X 10.6, better known as Snow Leopard, a Russian antivirus company said Friday. Doctor Web, which earlier this month was the first to report...
Eugene Kaspersky warns ‘Apple “10 Years” Behind Microsoft When It Comes To Security’
Speaking to CBR at the Info Security 2012 conference, Kaspersky founder and CEO Eugene Kaspersky said that Apple is years behind Microsoft when it comes to security, and the company will have to change the ways it approaches updates following the recent malware...
DNS Changer (re)lived, new deadline: 9 July 2012!
by Righard Zwienenberg Senior Research Fellow As written in our "Password management for non-obvious accounts" blog post on February 22, the FBI confiscated the DNS Servers used by the DNS Changer malware and replaced them with different servers so that infected users...
Infected WordPress Blogs Blamed for Mac Flashback Trojan
By John E Dunn, techworld.com The source of the Apple Mac Flashback Trojan was probably a large clutch of compromised US-based WordPress blog websites hijacked to push visitors to malware hosts, Kaspersky Lab research has revealed. As has previously been established...
Computer Trojan Horse Steals Credit Card Details From Hotel Reception Software
By Lucian Constantin, IDG News A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, researchers from security firm Trusteer said in a blog post on Wednesday....
20,000 Websites Possibly Infected by Malware, Says Google
By Kevin Parrish Google has informed 20,000 web sites that they could be infected with redirect malware. On Tuesday, Google's Matt Cutts said via Twitter that his Google Search Quality team sent out warning letters in numerous languages to 20,000 websites reporting...
Phishing Using HTML and Intranet Security Settings
by Righard Zwienenberg Senior Research Fellow Phishers always try to find new ways to bypass security features and trick 'educated' users. Over the years we have seen simplistic phishing attempts where the required information had to be typed into the e-mail body....
How to recognize a PC support scam
By David Harley A while ago, I responded to a blog comment promising some thoughts on how to recognize a cold-calling PC support scam. Unfortunately, I wasn't able to do that immediately, and then I was on vacation with no Internet connectivity (I should do that more...
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.
"*" indicates required fields