Calendar Spam technique making the rounds again

Just wanted to give everyone a heads up a that an old spam method is making its way around the net again and wanted to ensure you are informed. The system entails spammers sending you emails that include calendar invites with links. Warning: Do Not Click the link(s) in the email. Do Not Reply with … Continue reading Calendar Spam technique making the rounds again

Change your Facebook Password

With so many breaches happening not just on FB but all across the net, you have to keep your security one step ahead of the curve. In this article I'll go over changing your FB password as that is the latest breach but you should be doing this at least once every 90 days nothing … Continue reading Change your Facebook Password

Apple Isn’t Your Friend

Apple has been steadily positioning itself as the anti-Facebook for a while now, and between verbal jabs aimed at the social media giant and privacy-focused product decisions, the patient goodwill campaign seems to be working. Unfortunately, Apple isn’t going to save us, and now’s the time to keep your guard up. [...] Now that Facebook’s … Continue reading Apple Isn’t Your Friend

New Attack Method Delivers Malware Via Mouse Hover

Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan. Researchers have found a new form of attack that abuses the action of hovering over hyperlinked text and images in a Microsoft PowerPoint presentation. Trend Micro researchers discovered the "mouseover" technique, used by a Trojan downloader also … Continue reading New Attack Method Delivers Malware Via Mouse Hover

Netgear Router Security Update

Network

Netgear noted that several of their routers have a command injection Vulnerability issue where an attacker can use a phishing method to gain control of your router. Tip: To find the model/version number, check the bottom or back panel of your NETGEAR device. From the vulnerability Notes Database: R6200, R6250, R6400, R6700, R6900, R7000, R7100LG, … Continue reading Netgear Router Security Update

Bringing down the Net?

Network

Security expert Bruce Schneier recently talked about how someone is learning how to take down the internet. We have seen lots of companies talk about attacks on their infrastructure, breaches, hacking and stealing accounts, etc. As per the companies, it seems name of the attacks are made out to seem like probing for ways to … Continue reading Bringing down the Net?

Researchers find over 100 spying Tor nodes

Tor Logo

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network … Continue reading Researchers find over 100 spying Tor nodes

Linux Kernel Zero Day Vulnerability CVE-2016-0728

This vulnerability has existed since 2012 and it affects Android and Linux systems running Linux Kernel version 3.8+, and Linux server or desktop running kernel 3.8+ is vulnerable. As of the date of disclosure, this vulnerability has implications for approximately tens of millions of Linux PCs and servers, and 66 percent of all Android devices … Continue reading Linux Kernel Zero Day Vulnerability CVE-2016-0728

Being13: Inside the Secret World of Teens

If you are a parent, thinking about becoming one or know a parent that can benefit from this coverage; please allocate some time and watch and pass the word on to as many families as you can. This is an important piece that parents, guardians and well, everyone needs to watch; and make sure your … Continue reading Being13: Inside the Secret World of Teens

The infinite loop of iOS 8

There's a bug in Apple's iOS 8 that allows nearby attackers to send apps—and in some cases the iPhone or iPad they run on—into an endless reboot cycle that temporarily renders the devices useless, according to researchers who demonstrated the attack Tuesday. The exploit uses a standard Wi-Fi network that generates a specially designed secure … Continue reading The infinite loop of iOS 8