From Pinterest

JUN
There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.” Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.
This game is available on international gaming forums, and is being spread when gamers download a copy ...
Continue Reading →
Are you sick and tired of having to have your computer restored after every malware infection? Looking for a way to fend off crypto-ransomware attacks for good? Then Windows 10 S may be for you.
Windows 10 S is a new, stripped down and hardened version of the popular operating system. This is a great option for computer users who mostly use computers for searching the web and reading email. The ...
Continue Reading →
We have reported previously about Operation Hard Copy. This is from the US Department of Justice: The US Marshall’s Service arrested another member of the North Dakota lottery scam in Jamaica recently.
“United States Attorney Chris Myers announced today, that the U.S. Marshals Service, working with Jamaican law enforcement, has located and apprehended another man charged with participating in an international organized crime advance fee “lottery scam” which defrauded at least 90 ...
Continue Reading →On May 13, in Austin, Texas, the 40th Annual O.Henry Pun-Off Championship was held. Since I love puns, and am frequently guilty of punning in public, I thought this was an interesting tid-bit to pass along. Enjoy! (or not)
Continue Reading →
I am often asked to explain the difference between a security compliance audit, a vulnerability assessment, and a penetration test. These exercises do many of the same things, but to a different degree. A security compliance audit is like a 5K fun run, where a vulnerabilty assessment is more like a marathon. A penetration test is an iron man competition.
In the course ...
Continue Reading →
US-CERT sent an announcement on May 9th about new resources for small and medium size business owners and managers. Protecting Small Businesses can be found on the FTC website. It includes information about:
There are also helpful videos about:
Back on February 22nd, we discussed Facebook’s new Delegated Account Recovery feature. Basically, if you should for some reason forget your password to any account, or lose your two-factor authentication device (smartphone), and can no longer get into your account, Facebook will help you recover the account, as long as it is one that is enrolled with Facebook.
This is not the same thing as password managers like DashLane or LastPass, ...
Continue Reading →
On Wednesday we took a look at a collection of mostly web-based reconnaissance tools. Today we are taking it to the next level and actually attempting to find and exploit vulnerabilties.
Kali Linux – This is a pen-testers version of Linux that comes fully loaded with over a hundred testing applications. Kali can be installed in any old laptop you have laying around, installed as a virtual ...
Continue Reading →