Trojan.Mebromi hides in motherboard
Security researchers have found a nasty new virus that borrows in to a computer's motherboard, infects PCs as soon as they boot up, and is particularly difficult to detect and dispose of.The security...
View ArticleQR code vulnerabilities
QR codes are another way to connect people with content online. These small squares of black and white dots can be scanned with mobile devices like iPhones, Blackberries, and most smartphones to...
View ArticleAutomated Skype calls spread malware
As more and more people become acquainted by the tricks used by internet scammers and cybercriminals, so they are pressed to find new social engineering tricks in their hope of tricking the unwary.One...
View ArticleNew U.S. Internet rules to take effect November 20
The long-delayed U.S. Internet rules that tackle the controversial issue of balancing consumer and content provider interests against those who sell access to the Web will take effect November 20.The...
View ArticleHealthcare info breached
With the announcement of a health information breach affecting 4.9 million patients in the Defense Department's TRICARE healthcare program, there have now been five incidents that have each affected...
View ArticleTwitter-Mining
Twitter can be fun. It's also a powerful research tool. People increasingly use Twitter to share advice, opinions, news, moods, concerns, facts, rumors, and everything else imaginable. Much of that...
View ArticleSocial media monitoring template
Here are my foundational thoughts and technical framework for the social media monitoring aspect of a Cyber Intelligence team. This is the follow-up of my Forecasting the Future article from a few...
View ArticleMalware targets kids computer games
Online crooks are taking a new and nasty approach to cybercrime by rigging educational online games meant for preschoolers. Malicious software, including Trojans that can swipe your bank account...
View ArticleHalloween scam hits Internet
Halloween is still a few weeks away, but online criminals are getting a head start on the holiday with a batch of new scams aimed at infecting your computer and stealing your personal information.One...
View Article10 Things You Didn't Know Could Be Hacked
Connected devices, from telephones to cars, bring convenience into our daily lives. But they can also introduce new forms of vulnerability — perhaps more than you may think. Here are 10 everyday items...
View ArticleAntivirus for Mac
For years, Mac owners have laughed at the frantic efforts of their PC neighbors to fend off attack by viruses, Trojans, rootkits, and other malware. Given that PCs are a vastly greater segment of the...
View ArticleDuqu workaround sloppy
The latest Windows malware, Duqu is getting a lot of attention.Duqu exploits a previously unknown TrueType font parsing bug in the Windows kernel. The bug exists in all the supported versions of...
View ArticleSOPA won't stop scammers, would censor everyone else
There’s a disturbing bill making the rounds on Capitol Hill right now called the Stop Online Piracy Act, or SOPA. It’s purportedly designed to thwart music and movie piracy by empowering copyright...
View ArticleInternet job scams
Protecting your online persona should be a top priority. I'd like to remind you of what you can do to help keep yourself safe during a job search. Know What to Avoid Some employment scams appear as...
View ArticleBeware of identity theft when traveling
As the holiday season approaches, the Department of Homeland Security’s Stop.Think.Connect.™ Campaign reminds travelers getting ready to head to crowded airports, train, and bus stations to be...
View ArticleBanking Trojan Automatically Covers Its Fraud
Online crooks have added a devious piece of engineering to the infamous SpyEye banking Trojan that allows it to cover its tracks and keep victims in the dark as it drains their bank accounts.The new...
View ArticleWindows XP is on it's Deathbed
We are nearing the end of another era in the Microsoft world – Windows XP. This was arguably one of the most popular operating systems Windows has ever produced. April 8, 2014 is the grand finale for...
View ArticleUniversities Under Cyber-attacks From China
Universities in the United States are under cyber-attack with hacking attempts invading networks by the millions weekly. Many of the attacks have been traced back to China, and the theft of personal...
View ArticleCyber Monday Awareness
With the upcoming online shopping event Cyber Monday approaching in a few days, the potential for Distributed Denial of Service attacks (DDoS) and other issues of hacktivism and cyber-crime are likely...
View ArticleCyber Hygiene
This is the digital age and we rely on our computers and other electronic devices in so many areas of our lives that the need to be proactive and vigilant to protect against cyber-threats has never...
View Article
More Pages to Explore .....