Ransomware: Prevention is the best solution

cyber

Ransomware is malicious software that denies you access to your computer or files until you pay a ransom. There are several types of ransomware that are commonly seen: files/folders encryptors screen ‘lockers‘ MBR ransomware (MBR: master boot record) To read the original article : http://improve-your-security.org/ransomware-prevention-is-the-best-solution/

Set of online resources from AV-Comparatives.org

cyber

TOPICS:AV-ComparativesResourcesTips POSTED BY: IMPROVEYOURSECURITY SEPTEMBER 18, 2017 Here is a set of resources put together by AV-Comparatives.org : General guidelines in minimizing risks Online vulnerability starts with human vulnerability E-mail security Web navigation Safe online banking To read the original article : http://improve-your-security.org/set-of-online-resources-from-av-comparatives-org/

CCleaner Malware Incident – What You Need to Know and How to Remove

cyber

This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CCleaner coverage. What happened? An unknown threat group compromised the CCleaner infrastructure. The attacker added malware to the CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 installers, but the malware only executed on […]

How Do Hackers Hack Social Networking Websites?

cyber

At the point when individuals discuss hacking and social networks, they’re not alluding to the common meaning of hacking, which is utilizing malignant code or secondary passages as a part of machine systems to harm systems or take restrictive data. Hacking into social networks requires almost no specialized ability. It’s […]

OurMine Hackers Hacked VEVO and leaked 3.12TB data online

cyber

The infamous hacker group OurMine targeted the popular video hosting service and leaked 3.12TB worth of data online. The hacker group is constantly in news by attacking various popular companies including HBO recently. Now they leaked 3.12TB of data and some of the documents leaked contain very sensitive information according […]

The Fuzzing Project

cyber

Optionsbleed – HTTP OPTIONS method can leak Apache’s server memory Posted by Hanno Böck on Monday, September 18. 2017 If you’re using the HTTP protocol in everday Internet use you are usually only using two of its methods: GET and POST. However HTTP has a number of other methods, so I wondered what […]

Chrome will tag FTP sites as “Not secure”

cyber

Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome security team has shared. To read the original article : https://www.helpnetsecurity.com/2017/09/15/chrome-ftp-insecure/

Faces of Fraud 2017: Survey Analysis

cyber

Only 38 percent of banking/security leaders have high confidence in their organization’s ability to detect and prevent fraud, according to the latest Information Security Media Group Faces of Fraud Survey. John Gunn of VASCO Data Security weighs in on how to improve that confidence. To read the original article : https://www.inforisktoday.com/faces-fraud-2017-survey-analysis-a-10241

UBCI 1ère Banque de la place certifiée PCI-DSS

cyber

UBCI a obtenu sa certification PCI – DSS V3.1 (Payment Card Industry – Data Security Standard), accordée par la société ControlCase. Ce standard international, imposé par VISA Inc, est soumis à 12 exigences de sécurité visant à garantir aux clients un niveau de sécurité maximal pour leurs données de cartes […]

Cybercrime update: Big trouble in dark markets?

cyber

Many of the components required to commit cybercrime can be bought and sold online if you know the right part of the internet in which to look. These “dark markets” also enable cybercriminals to monetize the fruits of their larcenous labors, from botnet building to credential theft. In the first […]