Search Results for "cyber war"


  • Watch Out For Fake Tech Support Calls and Web Sites
    In the July issue of Microsoft’s free Security for Home Computer Users newsletter(sign up here), there was an article entitled “Is that Call from Microsoft a Scam?”  The answer in a nutshell was: yes, it is a scam.  Microsoft is not going to call you.  Neither is Hewlett Packar...
  • How to Catch a Phish
    “Give a man a Phish and he eats for a day, teach a man to Phish and he eats for a lifetime.” When you get an email that is spoofed as the example below has been, this is called a Phishing email.  The object is to “hook” the recipient into doing something that will be harmful to their we...
  • How a Phishing Attack Works
    I just read an article on Sophos that shows all the steps in a typical phishing exploit.  The example they used was a spoofed iTunes scam, where the attackers warn you that unauthorized persons are buying songs on your account.  If you really want to learn how to spot and avoid these threa...
  • “GameOver”Not Over Yet, CryptoLocker Scammers Are Back
    In June major parts of the GameOver botnet including the command and control servers, were taken down by police.  There was a brief respite in the distribution of the CryptoLocker ransomware exploit, but it looks like the cybercriminals are back in action. As reported by Sophos, the GameOver cr...
  • Keyloggers Found on Many Hotel Business Center Computers
    Bad news business and vacation travelers, those free computers that are in many hotel business centers have been infected with keylogger malware.  This means that whatever you are typing while sitting at one of these publicly accessible computers is being sent to a cyber-criminal somewhere....
  • It’s Not Just Retail–Oil and Electric Utilities Hacked by Dragonfly
    As reported by Symantec on June 30, and covered by the New York Times and SiliconBeat, there is a active exploit running against U.S. and European energy firms using the Dragonfly or Energetic Bear exploit kit.  Similar to Stuxnet, this exploit seeks to gain access and control of the industrial...
  • CryptoLocker Update
    The CryptoLocker ransom-ware exploit remains on of the most difficult security challenges that we face, since once all your personal data is encrypted, the only way back is either from an uninfected backup, or paying the cyber-criminals to receive your decryption key.  The good news (well I gue...
  • Windows 9–Already?
    We are hearing stories about the development and immanent release of Windows 9, as early as November or December 2014 – that’s right – THIS year!  After caving to users demands for the return of the Start Menu, it looks like they have decided that the Windows 8 Experience has to end. ...
  • Sunday Funnies: US Gov Seeks to Outlaw Stupidity
    Usually my Sunday submission is a bit more genuinely humorous, but not so much today.  Other titles I considered were “Your Tax Dollars At Work” and “Government Seeks to Tax Cyber-Crime Victims,” but the real title should be: Congress to Enact Legislation To Make Bad Cyber Security Ille...
  • Windows XP–No Support For MS Security Essentials Either
    If you read my earlier article about the end of support for Windows XP, it was missing an important fact.  If you are running Microsoft Security Essentials on Windows XP, support for MSE is going to end for you as well.  This is from the Microsoft website: As a result, after April 8, 2014...
Page 144 of 148 «...120130140142143144145146...»