Quantcast
Channel: Dan Nowacinski's feed
Browsing latest articles
Browse All 24 View Live

Image may be NSFW.
Clik here to view.

Trojan.Mebromi hides in motherboard

Security researchers have found a nasty new virus that borrows in to a computer's motherboard, infects PCs as soon as they boot up, and is particularly difficult to detect and dispose of.The security...

View Article



Image may be NSFW.
Clik here to view.

QR code vulnerabilities

QR codes are another way to connect people with content online. These small squares of black and white dots can be scanned with mobile devices like iPhones, Blackberries, and most smartphones to...

View Article

Image may be NSFW.
Clik here to view.

Automated Skype calls spread malware

As more and more people become acquainted by the tricks used by internet scammers and cybercriminals, so they are pressed to find new social engineering tricks in their hope of tricking the unwary.One...

View Article

Image may be NSFW.
Clik here to view.

New U.S. Internet rules to take effect November 20

The long-delayed U.S. Internet rules that tackle the controversial issue of balancing consumer and content provider interests against those who sell access to the Web will take effect November 20.The...

View Article

Image may be NSFW.
Clik here to view.

Healthcare info breached

With the announcement of a health information breach affecting 4.9 million patients in the Defense Department's TRICARE healthcare program, there have now been five incidents that have each affected...

View Article


Image may be NSFW.
Clik here to view.

Twitter-Mining

Twitter can be fun. It's also a powerful research tool. People increasingly use Twitter to share advice, opinions, news, moods, concerns, facts, rumors, and everything else imaginable. Much of that...

View Article

Image may be NSFW.
Clik here to view.

Social media monitoring template

Here are my foundational thoughts and technical framework for the social media monitoring aspect of a Cyber Intelligence team. This is the follow-up of my Forecasting the Future article from a few...

View Article

Image may be NSFW.
Clik here to view.

Malware targets kids computer games

Online crooks are taking a new and nasty approach to cybercrime by rigging educational online games meant for preschoolers. Malicious software, including Trojans that can swipe your bank account...

View Article


Image may be NSFW.
Clik here to view.

Halloween scam hits Internet

Halloween is still a few weeks away, but online criminals are getting a head start on the holiday with a batch of new scams aimed at infecting your computer and stealing your personal information.One...

View Article


Image may be NSFW.
Clik here to view.

10 Things You Didn't Know Could Be Hacked

Connected devices, from telephones to cars, bring convenience into our daily lives. But they can also introduce new forms of vulnerability — perhaps more than you may think. Here are 10 everyday items...

View Article

Image may be NSFW.
Clik here to view.

Antivirus for Mac

For years, Mac owners have laughed at the frantic efforts of their PC neighbors to fend off attack by viruses, Trojans, rootkits, and other malware. Given that PCs are a vastly greater segment of the...

View Article

Image may be NSFW.
Clik here to view.

Duqu workaround sloppy

The latest Windows malware, Duqu is getting a lot of attention.Duqu exploits a previously unknown TrueType font parsing bug in the Windows kernel. The bug exists in all the supported versions of...

View Article

Image may be NSFW.
Clik here to view.

SOPA won't stop scammers, would censor everyone else

There’s a disturbing bill making the rounds on Capitol Hill right now called the Stop Online Piracy Act, or SOPA. It’s purportedly designed to thwart music and movie piracy by empowering copyright...

View Article


Internet job scams

Protecting your online persona should be a top priority. I'd like to remind you of what you can do to help keep yourself safe during a job search. Know What to Avoid Some employment scams appear as...

View Article

Beware of identity theft when traveling

As the holiday season approaches, the Department of Homeland Security’s Stop.Think.Connect.™ Campaign reminds travelers getting ready to head to crowded airports, train, and bus stations to be...

View Article


Image may be NSFW.
Clik here to view.

Banking Trojan Automatically Covers Its Fraud

Online crooks have added a devious piece of engineering to the infamous SpyEye banking Trojan that allows it to cover its tracks and keep victims in the dark as it drains their bank accounts.The new...

View Article

Image may be NSFW.
Clik here to view.

Windows XP is on it's Deathbed

We are nearing the end of another era in the Microsoft world – Windows XP. This was arguably one of the most popular operating systems Windows has ever produced. April 8, 2014 is the grand finale for...

View Article


Image may be NSFW.
Clik here to view.

Universities Under Cyber-attacks From China

Universities in the United States are under cyber-attack with hacking attempts invading networks by the millions weekly. Many of the attacks have been traced back to China, and the theft of personal...

View Article

Image may be NSFW.
Clik here to view.

Cyber Monday Awareness

With the upcoming online shopping event Cyber Monday approaching in a few days, the potential for Distributed Denial of Service attacks (DDoS) and other issues of hacktivism and cyber-crime are likely...

View Article

Image may be NSFW.
Clik here to view.

Cyber Hygiene

This is the digital age and we rely on our computers and other electronic devices in so many areas of our lives that the need to be proactive and vigilant to protect against cyber-threats has never...

View Article
Browsing latest articles
Browse All 24 View Live




Latest Images