Data Breach – Update on Anthem attacks

Uncategorized Comments Off on Data Breach – Update on Anthem attacks

http://www.eweek.com/security/anthem-breach-evidence-points-to-china-security-researchers-say.html http://www.threatconnect.com/news/the-anthem-hack-all-roads-lead-to-china/ Security researchers have traced the theft of customer data from health insurer Anthem’s data systems to a professor at a Chinese university with links to a defense contractor. A new open-source intelligence analysis of the breach of health insurer Anthem has reinforced theories that the data theft leads back to a Chinese espionage […]

Facebook – Bug Bounty Hunters paid $1.3 Million in 2014

Uncategorized Comments Off on Facebook – Bug Bounty Hunters paid $1.3 Million in 2014

Paying security researchers to privately identify areas of vulnerability helps strengthen security overtime and this is a good investment process for Facebook given its huge user base http://facecrooks.com/Internet-Safety-Privacy/Facebook-Paid-Bug-Bounty-Hunters-1-3-Million-2014.html/ There’s no doubt that Facebook has a problem with malware, spam and cybercrime on its pages. However, it has gone to great lengths to combat these issues […]

EMAIL – Cloudmark highlights dangerous attachment extentions

Uncategorized Comments Off on EMAIL – Cloudmark highlights dangerous attachment extentions

This PC magazine article shares dangerous file extension in addition to EXE that users should avoid http://securitywatch.pcmag.com/spam/331629-tasty-spam-watch-out-for-attachments Most of us now know that if you see a file with the .exe extension as an email attachment, then that file is up to no good and you shouldn’t click on it. But .exe files aren’t the […]

EMAIL – Fraudulent 419 scams include Ebola theme

Uncategorized Comments Off on EMAIL – Fraudulent 419 scams include Ebola theme

This PC magazine article warns on 419 scams now include Ebola information to make more realistic. The vast majority of users avoid these scams, but there are enough victims to be profitable, even when odds are less than 1 out of 1,000 http://securitywatch.pcmag.com/spam/332430-tasty-spam-ebola-scam-infects-inboxes Many users are familiar with the 419 scam, named for the section […]

Internet Security – Browser Tracking Techniques

Uncategorized Comments Off on Internet Security – Browser Tracking Techniques

This informative article from Internet Storm Center shares browser tracking techniques https://isc.sans.edu/forums/diary/11+Ways+To+Track+Your+Moves+When+Using+a+Web+Browser/19369/ There are a number of different use cases to track users as they use a particular web site. Some of them are more “sinister” then others. For most web applications, some form of session tracking is required to maintain the user’s state. This […]

Antivirus – AV-Test product of year awards for 2014

Uncategorized Comments Off on Antivirus – AV-Test product of year awards for 2014

Several AV companies won product of year awards from independent testing firm AV-Test recently http://securitywatch.pcmag.com/security-software/332116-best-antivirus-products-honored-by-av-test-institute The Best of 2014 –  The award for best protection goes to Trend Micro. Not only did Trend consistently take high marks for protection, it also did well in the other two categories. For least impact on performance, Kaspersky took the […]

Leadership – Turning losses into victories

Uncategorized Comments Off on Leadership – Turning losses into victories

Another excellent monthly article related to management and leadership skills http://www.johnmaxwell.com/blog/how-to-turn-a-loss-into-a-win It’s hard to learn when we’re feeling down, because then we have to do things that aren’t natural. It’s hard to smile when we are not happy. It is difficult to respond with a good attitude when we’re numb with defeat. How will we […]

Malware – Hard Drive Firmware risk discovered

Uncategorized Comments Off on Malware – Hard Drive Firmware risk discovered

Researchers have discovered a new low-level machine language attack that can be hidden in the firmware that controls disk operations. http://www.geek.com/apps/nsa-malware-found-hiding-in-hard-drives-for-almost-20-years-1615949/ Someone out there figured out how to hide persistent, invisible espionage malware inside the firmware of your hard drives. Now it’s been discovered that they’ve been using it to spy on targets for nearly […]

Sarbanes-Oxley – Best practices in preparing for external audit

Uncategorized Comments Off on Sarbanes-Oxley – Best practices in preparing for external audit

Some excellent planning excerpts from this informative article: http://searchdatacenter.techtarget.com/tip/Five-tips-to-prep-for-a-Sarbanes-Oxley-audit The SOX compliance requirements are complex and detailed. If you have an annual Sarbanes-Oxley audit on the horizon, brush up on your responsibilities and prep work in these recommended steps: 1. There are ways to streamline compliance efforts for the biggest SOX hurdle: SOX 404. For example, test […]

Microsoft Security Updates – FEBRUARY 2015

Uncategorized Comments Off on Microsoft Security Updates – FEBRUARY 2015

Critical Security updates to Microsoft Windows, Office, IE, and other products became available on Patch Tuesday and users should promptly update for the best levels of protection against new threats https://isc.sans.edu/forums/diary/Microsoft+Update+Advisory+for+February+2015/19315/ http://technet.microsoft.com/en-us/security/bulletin/MS15-feb Microsoft is releasing the following nine security bulletins for newly discovered vulnerabilities: Bulletin ID: MS15-009 Bulletin Title: Security Update for Internet Explorer (3034682) […]


© 2019 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in