FAKEAV – FBI launches Operation Trident Tribunal

Uncategorized Comments Off on FAKEAV – FBI launches Operation Trident Tribunal

Hopefully, our government agencies will be successful in this new campaign, designed to reduce and eventually eradicate Fake AV attacks http://www.fbi.gov/news/stories/2011/june/cyber_062211/cyber_062211 http://blogs.mcafee.com/mcafee-labs/combating-fakealerts QUOTE: Department of Justice and the FBI announced “Operation Trident Tribunal,” a coordinated, international law enforcement action that disrupted the activities of two international cyber crime rings involved in the sale of scareware. […]

McAfee – Botnets illustrated and explained

Uncategorized Comments Off on McAfee – Botnets illustrated and explained

An interesting and well done illustration related to the concept of BOTNETs and the associated dangers when infected. McAfee – How my PC became a ZOMBIE http://blogs.mcafee.com/mcafee-labs/botnets-demystified-and-simplified QUOTE: Even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can […]

Adobe – Critical Security Update on June 15th

Uncategorized Comments Off on Adobe – Critical Security Update on June 15th

Last week, Adobe released important security updates for Flash, Acrobat, and Shockwave as noted below.  These should be promptly applied as applicable: Adobe Releases Patches for in Numerous Products http://blogs.pcmag.com/securitywatch/2011/06/adobe_releases_patches_and_imp.php QUOTE:  Adobe released security patches for Acrobat, Adobe Reader, BlazeDS, ColdFusion, Flash Player, LiveCycle DataServices, LiveCycle ES, and Shockwave Player today.  13 vulnerabilities were patched in […]

Corporate Best Practices – Check your Security Logs

Uncategorized Comments Off on Corporate Best Practices – Check your Security Logs

The ISC emphasizes the best practice of thoroughly checking security logs on a daily basis.  Major security breaches and leakages of customer data continue to be reported.  Discovering issues very early can greatly reduce the impacts associated with unauthrozied access. Log files – are you reviewing yours? http://isc.sans.org/diary.html?storyid=11068 QUOTE:  Logs review should be a intrinsic […]

Microsoft Security release – June 2011

Uncategorized Comments Off on Microsoft Security release – June 2011

Applying this security update will better protect your system. Several key patches were released this month: Microsoft – June 2011 Security release https://www.microsoft.com/technet/security/bulletin/ms11-jun.mspx http://isc.sans.org/diary/Microsoft+June+2011+Black+Tuesday+Overview/11050

Facebook – How to create a unique account name

Uncategorized Comments Off on Facebook – How to create a unique account name

Users can personalize their accounts, so that they can easily share it as a link. Adding an account name is done through the settings below: Facebook – How to create an account https://www.facebook.com/editaccount.php?drop Click on ACCOUNT menu option Select ACCOUNT SETTINGS Click on SETTINGS tab Select User Name (if name taken a numeric suffix or […]

How to create a Facebook Page for an Organization

Uncategorized Comments Off on How to create a Facebook Page for an Organization

Found this link and capturing best practices associated with creating a PAGE that an organization might publish. How to create a Facebook Page for an Organization https://www.facebook.com/pages/learn.php Facebook Product Guide for Development (Best Practices) https://www.facebook.com/advertising/FacebookPagesProductGuide.pdf QUOTE: A Facebook Page is a public profile that enables you to share your business and products with Facebook users. […]

RSA Offers SecurID Token replacements for large customers

Uncategorized Comments Off on RSA Offers SecurID Token replacements for large customers

Below is a recent letter from RSA offering replacement tokens for large customers.  This is to offer assurances from the recent hacking attempt of RSA’s website to discover SecurID internal security controls. So far no compromises have been reported, for this well designed two factor authentication process.  One best practice to prevent any unauthorized access issues is […]

Security breaches – Hackers cost companies real dollars

Uncategorized Comments Off on Security breaches – Hackers cost companies real dollars

Two articles sharing the need for meaningful standards and best practices in corporate security Security breaches – Hackers cost companies real dollars http://blog.eset.com/2011/06/10/the-dollar-cost-of-a-data-breach QUOTE: Bottom line, there’s a price to pay, either for prevention or cure, and it’s rising. More good news: many of the data breaches could’ve been prevented and/or blunted by relatively simple […]

IP V6 Day – June 8, 2011

Uncategorized Comments Off on IP V6 Day – June 8, 2011

When the 32 bit IPv4 standard was introduced in September 1981, it supported over 4 billion potential addresses. However, by February 2011, IANA reported that the existing supply of IPv4 had been fully allocated.  IPv6 represents a 128 bit network addressing scheme and on June 8, 2011 this was launched in a 24 hour test […]


© 2022 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in