Facebook – Privacy and Targeted Advertisements

Uncategorized Comments Off on Facebook – Privacy and Targeted Advertisements

Facebook shares it’s balanced approach of targeting ads and maintaining user privacy. http://facecrooks.com/Internet-Safety-Privacy/Sheryl-Sandberg-Defends-Targeted-Ads-Says-Facebook-Protects-User-Info.html/ http://www.bbc.com/news/business-27108483 QUOTE: Facebook chief operating officer Sheryl Sandberg recently defended Facebook’s privacy practices in an interview with the BBC, saying that Facebook is extremely protective of user information. Her response came when concerns were raised about Facebook’s targeted advertising. “Privacy is of […]

Facebook – partners with Storyful News Verification services

Uncategorized Comments Off on Facebook – partners with Storyful News Verification services

  Facebook has partnered with Storyful’s News Verification service to stop Fake news from circulating in scams, pranks, or malware attacks http://techcrunch.com/2014/04/24/towards-a-more-truthful-internet/ http://facecrooks.com/Internet-Safety-Privacy/Facebook-Teams-Up-With-Tech-Company-Stop-Fake-News.html/ QUOTE: Luckily, Storyful has developed a news verification technology and process that can distinguish between real and fake news. It digs to identify the original source of the news, and then reviews […]

Mozilla Firefox 29 release – Major UI changes and security fixes

Uncategorized Comments Off on Mozilla Firefox 29 release – Major UI changes and security fixes

Firefox 29 was launched today and includes the following changes in the new version: https://www.mozilla.org/en-US/firefox/29.0/releasenotes/ QUOTE: Key new features include: * Significant new customization mode makes it easy to personalize your Web experience to access the features you use the most (learn more) * A new, easy to access menu sits in the right hand […]

Android Security – iBanking Mobile Bot uses Facebook web injection techniques

Uncategorized Comments Off on Android Security – iBanking Mobile Bot uses Facebook web injection techniques

ESET documents the iBanking and Qadars mobile security threats: http://www.welivesecurity.com/2014/04/16/facebook-webinject-leads-to-ibanking-mobile-bot/ http://www.virusradar.com/en/Win32_Qadars/detail http://www.welivesecurity.com/2013/12/18/qadars-a-banking-trojan-with-the-netherlands-in-its-sights/ QUOTE:  iBanking is a malicious Android application that when installed on a mobile  phone is able to spy on its user’s communications. This bot has many interesting phone-specific capabilities, including capturing incoming and outgoing SMS messages, redirecting incoming voice calls, and even capturing […]

Adobe Flash Player – April 2014 Security update

Uncategorized Comments Off on Adobe Flash Player – April 2014 Security update

A critical zero day vulnerability has been patched in Adobe Flash.  Corporate and home users should update as soon as possible. http://helpx.adobe.com/security/products/flash-player/apsb14-13.html http://blog.trendmicro.com/trendlabs-security-intelligence/adobe-releases-patch-for-flash-zero-day-vulnerability/ QUOTE: Adobe has released a security advisory regarding a zero-day vulnerability (CVE-2014-0515) found in the program Adobe Flash. According to the advisory, the updates pertain to “Adobe Flash Player 13.0.0.182 and earlier […]

Mobile Security – Top Five Mobile Banking Trojans in 2014

Uncategorized Comments Off on Mobile Security – Top Five Mobile Banking Trojans in 2014

PC Magazine shares recap of the 5 most active mobile banking threats during 2014 so far http://securitywatch.pcmag.com/malware/323017-understanding-the-top-5-mobile-banking-trojans QUOTE: Mobile banking Trojans are very active, targeting user devices to gain access to your bank accounts. Just as you protect your PCs to prevent malware infections, be careful what you do with your mobile devices. Be careful […]

Tornado Scam warning – Fake Donation and services sites emerge

Uncategorized Comments Off on Tornado Scam warning – Fake Donation and services sites emerge

After any tragedy, fake donation emails and websites surface. It is always a best practice to contribute to mainstream organizations like Red Cross or Salvation Army.  Verification that a site is official will ensure funds are properly received by those in need. http://www.arkansasonline.com/news/2014/apr/28/mcdaniel-warns-scams-after-tornado/ http://talkbusiness.net/2014/04/businesses-rally-provide-tornado-relief-ag-warns-scams/ QUOTE: McDaniel says he expects to see scams emerge on services […]

Internet Explorer Zero Day – Bromium Labs shared technical details for CVE-2014-1776 exploit

Uncategorized Comments Off on Internet Explorer Zero Day – Bromium Labs shared technical details for CVE-2014-1776 exploit

Bromium Labs shared technical testing details for the CVE-2014-1776 exploit circulating.  Users should be careful to avoid malicious websites using IE http://labs.bromium.com/2014/02/25/dissecting-the-newest-ie10-0-day-exploit-cve-2014-0322/ QUOTE: Few days ago the news about a fresh Internet Explorer 10 zero-day exploit popped up. Now the exploit code is publicly available and we managed to analyze the vulnerability and find out some details […]

AOL EMAIL security breach – Users should change passwords

Uncategorized Comments Off on AOL EMAIL security breach – Users should change passwords

AOL has shared that email credentials have been discovered for at least 2% of it’s accounts by hackers and recommends all users change passwords immediately http://arstechnica.com/security/2014/04/youve-got-pwned-aol-reports-e-mail-breach-as-bigger-than-thought/ QUOTE:  Last week, AOL confirmed that an unknown number of AOL Mail accounts have been hacked. Today, the company urged all its customers to change passwords and security questions, […]

TDL4 Rootkit – New Variant manipulates Windows kernel vulnerability CVE-2013-3660

Uncategorized Comments Off on TDL4 Rootkit – New Variant manipulates Windows kernel vulnerability CVE-2013-3660

    The TDL4 rootkit is one of the most advanced malware attacks circulating and it can hide in a stealth like manner within the operating system.  A new variant was can manipulate the new CVE-2013-3660 vulnerability.  This leads to access of the Windows kernel and capability to bypass detection by almost all anti-virus products and security defenses.   […]


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in