Privacy – Texas passes law where search warrant required to read email

Uncategorized Comments Off on Privacy – Texas passes law where search warrant required to read email

Based on recent developments, Texas has implemented a new privacy law to better protect its residents against unauthorized local and state legal searches. http://www.techlicious.com/blog/texas-passes-strict-new-email-privacy-law/ QUOTE: The state of Texas is taking a bold step towards protecting online privacy. Governor Rick Perry has signed HB 2268, a first-in-the-nation law that requires state and local law enforcement agents to seek […]

Twitter Security – June 2013 Apple Giveaway spam run

Uncategorized Comments Off on Twitter Security – June 2013 Apple Giveaway spam run

There usually “no free iPad3 tablets” being given away on the Internet.  Most free offers are social engineering traps set by the bad guys.  http://www.threattracksecurity.com/it-blog/large-ipad-3-spamrun-on-twitter/ QUOTE: Randomly sending messages to Twitter users, the account “Apple Giveaway” asks users to visit a malicious site with a variety of different messages: “You are invited to get a new […]

Microsoft EMET 4.0 vulnerability assessment tool release

Uncategorized Comments Off on Microsoft EMET 4.0 vulnerability assessment tool release

The Enhanced Mitigation Experience Toolkit (EMET) version 4.0 is now available for download and below are key links: http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-download.aspx https://isc.sans.edu/diary/EMET+4+0+is+now+available+for+download/16019 http://blogs.technet.com/b/srd/archive/2013/04/18/introducing-emet-v4-beta.aspx QUOTE: “The Enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent hackers from gaining access to your system. Software vulnerabilities and exploits have become an everyday part of life. Virtually every product has […]

Oracle Java – Security improvements are coming

Uncategorized Comments Off on Oracle Java – Security improvements are coming

A security improvement program was recently announced by the head of Oracle’s Java software development team.  They will gradually tighten security in favor of more regimented default controls, such as signed applets for example: https://blogs.oracle.com/security/entry/maintaining_the_security_worthiness_of QUOTE: Over the past year, there have been several reports of security vulnerabilities in Java, primarily affecting Java running in Web browsers. […]

Android Security – Obad.A Trojan becomes most advanced mobile malware circulating

Uncategorized Comments Off on Android Security – Obad.A Trojan becomes most advanced mobile malware circulating

Kaspersky Labs has documented the Obad trojan as the most advanced Android malware attack in circulation.  Its use of encryption and command-and-control server functionality are reminiscent of how the Storm worm botnet was continuously improvised by malware authors over time. http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan QUOTE: Recently, an Android application came to us for analysis. At a glance, we […]

Microsoft Security – June 2013 updates available

Uncategorized Comments Off on Microsoft Security – June 2013 updates available

Critical security updates for Windows, IE, and Office are available from Microsoft … If notified by Windows Update that “security updates are available”, please install them promptly to enhance protection. http://technet.microsoft.com/en-us/security/bulletin/ms13-jun The ISC always has an excellent summary recap https://isc.sans.edu/diary/Microsoft+June+2013+Black+Tuesday+Overview/15977

SQL Server 2014 – Overview of new version

Uncategorized Comments Off on SQL Server 2014 – Overview of new version

SQL Server 2014 was recently announced at the 2013 Tech Ed conference in New Orleans: Microsoft SQL Server 2014 was announced during the Microsoft Tech Ed 2013 keynote. Designed and developed with our cloud-first principles in mind, SQL Server 2014 builds on the momentum of SQL Server 2012, released just 14 months ago. We are […]

Microsoft and FBI take down Citadel Botnet family impacting 5,000,000 users

Uncategorized Comments Off on Microsoft and FBI take down Citadel Botnet family impacting 5,000,000 users

This large botnet attack was designed to steal banking credentials which could in turn be used to steal actual monies. This action performed by law enforcement officers and with the help of Microsoft, helps to improve e-commerce safety. http://www.pcmag.com/article2/0,2817,2420046,00.asp http://www.microsoft.com/en-us/news/Press/2013/Jun13/06-05DCUPR.aspx QUOTE: Microsoft today announced that, in coordination with the FBI, it has disrupted more than […]

Facebook – Kim Kommando shares how to avoid Zeus Banking trojan

Uncategorized Comments Off on Facebook – Kim Kommando shares how to avoid Zeus Banking trojan

Kim Komando, who hosts a popular consumer radio show, released a security bulletin on how folks are getting infected … http://www.komando.com/coolsites/index.aspx?id=14620&utm_medium=nl&utm_source=alerts&utm_content=2013-06-05-article-in-body-d&page=2 The malware in question is called “Zeus.” In most cases, it looks like a funny or shocking video one of your friends posted. It may be posted on their page or in a message to you. […]

Facebook – Zeus Bank Account Stealing Trojan Virus Spreading

Uncategorized Comments Off on Facebook – Zeus Bank Account Stealing Trojan Virus Spreading

Zeus banking Trojan is being aggressively spammed as shared below … Please be careful on anything you click on in Facebook http://www.techlicious.com/blog/bank-account-stealing-trojan-zeus-spreading-on-facebook/ QUOTE: Be careful what links you click on Facebook. A gang of international cybercrooks has resurrected a six-year-old Trojan virus named Zeus, using it to harvest personal information and drain unsuspecting victims’ bank accounts. It […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in