Your IP is:

23.22.204.36

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3] Port2: Port3:

Skip to content

Report: Many Windows automatic updates are thwarted by user inaction

You can’t have good security unless you keep your operating system and applications current, with all of the latest patches and updates. Microsoft makes it easy for Windows users with its automatic updates, and yet a new report finds that many PCs with automatic updates enabled are nevertheless not actually up to date.

Categories: General.

Tags: , , , , , , ,

What you need to know about new zero day that hits most supported Windows versions

Microsoft issued a security advisory this week with details of a zero day vulnerability that affects every supported version of the Windows operating system with the exception of Windows Server 2003. The flaw is very similar to the OLE vulnerability patched earlier this month, which was linked to the Sandworm cyber espionage campaign.

Categories: General.

Tags: , , , , , , , ,

How the FIDO Alliance’s U2F could simplify two-factor authentication

We’ve had enough malware campaigns and data breaches to confirm the need for better data protection online. The Universal 2nd Factor (U2F) standard is a step in the right direction, and the first compatible devices are coming out now.

U2F is an open authentication standard. It was initially developed by Google, but it’s now managed by the FIDO (Fast Identity Online) Alliance. The FIDO Alliance also includes household names like Microsoft, Mastercard, Visa, PayPal, Discover, Samsung, and BlackBerry among its members.

Categories: General.

Tags: , , , , ,

POODLE’s bark is bigger than its bite

Google researchers revealed a major flaw in the SSL encryption protocol—SSLv3 to be precise—which has been affectionately named “POODLE.” The vulnerability is more serious than the silly name might suggest, and the news has garnered a lot of attention because of the potentially broad implications. But security experts assure us the sky is not falling.

Categories: General.

Tags: , , , ,

3 simple ways two-factor authentication can protect you when no one else will

It seems like consumer data is compromised in some massive data breach every other week. You should expect the companies you do business with to do everything possible to prevent data breaches and protect your data, but it’s unreasonable to believe it will never happen. It’s up to you to take additional steps to protect your own data, and minimize the potential fallout from a breach as much as you can. One of the best ways to do that is with two-factor authentication.

Categories: General.

Tags: , , , , ,

Spot phishing scams and don’t take the bait

Can you recognize a phishing scam email when you see one? Do you know what signs to look for to identify a phishing attack, and avoid becoming a victim? In honor of National Cybersecurity Awareness Month, PhishMe has developed an infographic with helpful tips to keep you safe and secure.

PhishMe points out the usual, common-sense things you should do to avoid getting compromised—by either phishing scams or malware exploits. Don’t open unknown file attachments or click on links in suspicious emails, and don’t enter your credentials on login pages linked from email messages.

Categories: General.

Tags: , , , , ,

Report: Huge spike in mobile malware targets Android, especially mobile payments

Two very predictable traits drive cybercriminals: First, they tend to focus on targets with the highest odds of success. Second, they prefer attacks that generate profit. A new joint report from Kaspersky Lab and INTERPOL underscores how these two factors contribute to concerning trends in mobile threats. 

The Mobile Cyber Threats report analyzes mobile malware data collected from Kaspersky’s cloud-based Kaspersky Security Network (KSN) during the period of August 1, 2013 through July 31, 2014, for over 5 million Android smartphones and tablets protected by Kaspersky security products.

Categories: General.

Tags: , , , , , , , ,

Survey: BYOD security remains spotty, with users unaware or unmotivated about risks

Many organizations have embraced the concept of BYOD (bring your own device), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure.

Categories: General.

Tags: , , , , , , , , ,

Survey finds generation gaps in adoption of new tech

Wearable tech and Internet-of-Things (IoT) gadgets are all the rage. A new survey from Acquity Group, though, illustrates how different generations are embracing these new developments.

The study defined three age groups: Millennials (ages 18-25), Generation X (ages 26-35), and Baby Boomers (over age 45). (I guess that group between age 36 and 45 just isn’t very interesting). Overall, Acquity Group found that younger consumers are most likely to adopt connected technologies in the long run, but older consumers are more likely to own certain products already.

Categories: General.

Tags: , , , , ,

Prevent identity theft with this interactive site

Preventing identity theft starts with you—making sure you’re aware of the threats out there, and how to avoid them.

Choice Loans, a financial lending service based in the UK, has put together a site that can help. It’s an interactive guide to various types of identity fraud, complete with 16 things you can do to detect or respond to them.

Categories: General.

Tags: , , , , ,