Best of Breed Security Software

imageAV-TEST, the German independent testing laboratory, has published its award for best security products of 2014.  If you like to use best of breed products, this report is for you.  If you would like to see how the security software you are using stacks up to the competition, this report will provide that insight as well.

The results, ...

Continue Reading →
0

How Cyber-Attackers Use Your Email Against You

The easiest way for a cyber-attacker to get into your network is through your email.  This can be accomplished a number of different ways, but a successful exploit may use several of these methods together to gain access to your network and control your computer systems.  The great thing, from the attacker’s perspective, is that by using your email, they can get around whatever perimeter defenses you have, such as firewalls and intrusion detection systems, and can even beat the ...

Continue Reading →
0

Is it Superfish or SuperPhish? Company Vows Innocence

There is another article about the Lenovo/Superfish debacle on Silicon Beat that looks at what this application is supposed to do, and what it actual is doing, and a bit into what it could do if it so chooses.  None of it sounds all that great and some of it is scary.

Superfish is supposed to allow users to take a picture, submit it to Superfish, and Superfish will search the web for a close match and return the results to ...

Continue Reading →
0

Lenovo Users Alert–Uninstall Superfish Now!

It has been reported that Lenovo computers have been shipped with a nifty piece of bloatware called Superfish that can break an encrypted session, track users online, and allow malicious attackers to take over an online transaction.  this program needs to be uninstalled TODAY!

Lenovo has apologized, explaining that they were unaware of the negative security aspects of this adware program, and has posted an uninstall program on their website.  There are also great step-by-step illustrated instructions on Sophos.  ...

Continue Reading →
0

Google To Be A Cell Phone Carrier

Image result for google logo

Google recently announced their intention to become a cellular services provider and compete with ATT, Verizon, Sprint, and T-Mobile.  What they are doing is launching an MVNO (Mobile Virtual Network Operator), which means they will be offering services on another carrier’s network.  In this case, they will be providing phones that will work on two networks, Sprint and T-Mobile’s.  In this way they ...

Continue Reading →
0

Windows 10 To Introduce New “Spartan” Browser

Spartan logo.svgIs Microsoft planning to pull the plug on Internet Explorer?  Probably not, at least right away, but Windows 10 will most likely introduce a new alternative web browser currently named “Spartan.”  Windows 10 is expected to release later in 2015.  It is currently available as a “Professional Preview.”

Internet Explorer is still the dominant web browser, with nearly a 60% share, by Google Chrome ...

Continue Reading →
0

Ransomware + Virus = Major Problem

We have warned previously about the CryptoLocker/CryptoWall ransomware exploit previously, which begins with a phishing email designed to look like a past due invoice or a tax notice.  Opening the ZIP attachment would install encryption software which would render your files unusable without the encryption key, which the perpetrators would graciously sell you for amounts beginning at $200 and going up from there.  How much depends on the value of your stuff and your apparent ability to pay.  Personally, I ...

Continue Reading →
0

Sunday Funnies: We Love Logistics

If logic is the first part of logistics, why do my UPS and FedEx drivers leave stuff on the front porch, in the rain and in full view of every thief driving down the street, when I have a sign on the front porch that clearly states “All Deliveries To The Back Door Please.”  Especially when the box is printed “DELL” in big letters.  What are they thinking?  Heck, the pizza guy goes to the back door, and for him ...

Continue Reading →
0

Apple Pushes Out Security Update

Many of the Apple users I run across in my daily life still believe that Macs, MacBooks, iPads, and iPhones are immune from hacking.  Nothing could be further from the truth.  Cyber-criminals have been writing exploits for the Apple platform, including iOS, since at least 2011.  Mac users need to secure their computers too.

Continue Reading →

0
Page 219 of 272 «...190200210217218219220221...»