11 Jun
11 Jun
9 Jun
Excellent info on ditching password post-it notes and moving to a secure password manager. #LastPass
5 minute fix – How to use a password manager
nakedsecurity.sophos.com
This 5 minute fix will show you how to choose and use a password manager.
9 Jun
9 Jun
Many people still believe you only get malware from 'bad sites' (or Facebook). But hackers learned long ago that compromising legitimate websites to spread malware gave them a MUCH bigger group of victims to target. Simply put – NO website you visit can be assumed 'safe'. They get compromised all the time. Always stay vigilant.
Seven out of 10 Cyberattacks Hack Websites Target Secondary Victims
www.hotforsecurity.com
Nearly 70% of cyber attacks target secondary victims, and not the owners of the hacked website, according to the 2015 Data Breach Investigations Report, an annu
9 Jun
5 Jun
Have to share this just for the artwork. Facebook scams are always a threat. Beware what you click and simply untag yourself if your privacy settings allowed the tag in the first place.
Bitdefender originally shared:
#Scam alert: an attractive video capture is posted on users’ Walls. Twenty of the victims’ Facebook friends are tagged in the post, so those who have not tweaked their privacy settings will be tagged without their consent.
Find out more and stay #safe: http://bit.ly/facebook_scm
5 Jun
Original Post from Bitdefender:
#Scam alert: an attractive video capture is posted on users’ Walls. Twenty of the victims’ Facebook friends are tagged in the post, so those who have not tweaked their privacy settings will be tagged without their consent.
Find out more and stay #safe: http://bit.ly/facebook_scm
4 Jun
Part II of Hot for Security's look at ransomware and how it works. An informative read.
How Does Ransomware Work? The Ultimate Guide to Understanding Ransomware – Part II
www.hotforsecurity.com
Now that we’ve been introduced to ransomware, let’s see how it spreads and infects machines. How does it enter systems? Common penetration techniques inc
4 Jun
4 Jun
Tech scammers don't just target PC users! Microsoft, Apple, Yahoo, etc will never call you directly. Google only will if you use their business services like Adwords or My Business and even then it's very rare and usually in response to something you've encountered or done and they're trying to help (and certainly are NOT asking for money).
Tech Support Scammers Are Organized, Run Targeted Campaigns for Mac and Windows
news.softpedia.com
Scammers try to force victims into calling bogus support
4 Jun
2 Jun
If you upgrade to Windows 10 – you may not be able to play DVDs if your computer lacks a 3rd Party DVD player. If it does? Install the free VLC media player.
Microsoft explains what you’ll lose by upgrading to Windows 10
www.theverge.com
Microsoft announced today that it will be launching Windows 10 on July 29th, encouraging Windows 7 and 8.1 users to reserve their free upgrade with a notification in their task bar. However, while…
2 Jun
2 Jun
Macs are definitely more secure than PCs, but they can still be compromised. Exploits like this are especially dangerous since you can't remove it even if you wipe and reinstall OSX! At the very least, Mac users should be using some type of realtime antimalware package to protect against malicious downloads.
New exploit leaves most Macs vulnerable to permanent backdooring
arstechnica.com
Hack allows firmware to be rewritten right after older Macs awake from sleep.