Apple iOS 7 – Vulnerability allows calls from Emergency Call screen

Uncategorized Comments Off on Apple iOS 7 – Vulnerability allows calls from Emergency Call screen

A few new vulnerabilities have been found in the new release of iOS7 that will likely be patched expediently by Apple http://www.intego.com/mac-security-blog/ios-7-bug-allows-calls-from-emergency-call-screen/ http://www.intego.com/mac-security-blog/passcode-flaw-found-in-ios-7-that-was-quick/ QUOTE: New major releases of an operating system always bring with them a few unexpected wrinkles to be ironed out. Yesterday’s speedy discovery of a lockscreen bypass flaw being a case in point. […]

Browser Toolbar removal techniques – Kim Komando SEP 2013

Uncategorized Comments Off on Browser Toolbar removal techniques – Kim Komando SEP 2013

This safety tip from Kim Komando’s newsletter shares informative tips that can be applied to reset most popular browsers http://www.komando.com/tips/index.aspx?id=13304 QUOTE: Remove unwanted toolbars from any browser QUESTION — Kim, my kids accidentally installed a bunch of toolbars and plug-ins on our computer. I’m at the point I just want to re-install the entire browser, […]

Visual Studio 2013 – New Development features

Uncategorized Comments Off on Visual Studio 2013 – New Development features

EWeek provides a slideshow highlighting new features in Visual Studio 2013 http://www.eweek.com/developer/slideshows/microsoft-visual-studio-2013-key-new-features-for-developers.html/ QUOTE: Microsoft announced the availability of Visual Studio 2013 Release Candidate and noted that the company’s flagship application development suite will release to manufacturing (RTM) Oct. 18. Microsoft also announced that it would make its Windows 8.1 bits available to developers. This had […]

Passwords – September 2013 Quiz

Uncategorized Comments Off on Passwords – September 2013 Quiz

http://securitywatch.pcmag.com/security/315616-infographic-password-pop-quiz QUOTE: The quiz, made by fine folks at Security Coverage, creators of Password Genie, does a good job of placing the risks associated with bad passwords into context. For instance, most people understand that a longer password is more secure, but they may not know why.  The only real quibble I have with the […]

Malware – Grand Theft Auto 5 Torrent version risk

Uncategorized Comments Off on Malware – Grand Theft Auto 5 Torrent version risk

The Grand Theft Auto series is popular and malware has been detected in leaked Torrent versions circulating. Users are always best served by avoiding malware and licensing dangers associated with pirated software. http://securitywatch.pcmag.com/security/315446-leaked-gta-v-torrents-loaded-with-sneaky-costly-malware QUOTE: The fifth installment of the legendary (and controversial) sandbox shooters Grand Theft Auto is due out later this month, but some players are […]

Windows 8.1 – Pricing and Packages for OCT 2013 release

Uncategorized Comments Off on Windows 8.1 – Pricing and Packages for OCT 2013 release

http://blogs.windows.com/windows/b/bloggingwindows/archive/2013/09/17/pricing-and-packaging-for-windows-8-1.aspx QUOTE:  For consumers with Windows 8 devices today, Windows 8.1 will be a free update via an easy download from the Windows Store* starting on October 18th. Windows 8.1 will be a must-have update for those devices – bringing new features and improvements such as greater personalization, Bing Smart Search, and more than 20 […]

Malware – F-Secure threat report for 1st half of 2013

Uncategorized Comments Off on Malware – F-Secure threat report for 1st half of 2013

An informative and detailed recap can be found as follows: http://www.f-secure.com/weblog/archives/00002611.html QUOTE: Exploit-based attacks, particularly against the Java development platform, continue to dominate. New developments continue in mobile malware, ransomware, Mac malware and phishing, as Bitcoin comes of age. Meanwhile, hacks and intrusions aimed at tech companies gain major mainstream press. FULL 50 PAGE PDF […]

Apple iPhone 5S – Pros and Cons of Fingerprint Security

Uncategorized Comments Off on Apple iPhone 5S – Pros and Cons of Fingerprint Security

The ISC and other articles below share important considerations on fingerprint security controls: https://isc.sans.edu/forums/diary/Am+I+using+my+Fingerprints+yet+/16646 http://www.theguardian.com/technology/2013/sep/22/apple-iphone-fingerprint-scanner-hacked http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid QUOTE: Biometrics are not safe, says famous hacker team who provide video showing how they could use a fake fingerprint to bypass phone’s security lockscreen. For me, this brings up both sides of “the fingerprint discussion” KEY CONSIDERATIONS OR […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in