Gartner Top Technologies for Security in 2017
How EDR, remote browsers, and cloud security will shape the next year of cybersecurity.
July 5, 2017
Contributor: Kasey Panetta
Ransomware and how to prevent it with Office 365
Nov 18, 2016
detonation chamber (sandbox)
In A Battle For Web Traffic, Bad Bots Are Going After Grandma
July 03, 2014
Over 61.5 percent of the traffic on the Web is automated applications called bots talking to other bots, according to one study. And experts say about half of those bots are bad.
Even Disconnected Computers May Face Cyberthreats
December 04, 2013
If your computer is infected with a virus or other forms of malware, disconnecting the machine from the Internet is one of the first steps security experts say you should take. But someday, even physically separating your laptop from a network may not be enough to protect it from cyber evildoers.
German computer scientists have come up with a prototype for building “covert channels” between computers using the machines’ speakers and microphones, potentially defeating high-security measures that rely on placing an “air gap” between computers.
The scientists said their network was based on a system originally designed for underwater communication.
“We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range,” Michael Hanspach and Michael Goetz, of the Fraunhofer Institute for Communication, Information Processing and Ergonomics, wrote in a paper published in the November issue of the Journal of Communications.
As Dan Goodin explains in Ars Technica: “The proof-of-concept software — or malicious trojans that adopt the same high-frequency communication methods …
Cryptolocker: The evolution of extortion
November 19, 2013
The Cryptolocker Trojan is an evolution of “ransomware,” not a revolutionary change from past criminal attempts to extort money from PC owners, a security expert said today.
Ransomware is a category of malware that, once on a system, encrypts files and then tries to convince users to pay to decrypt them so they can again be opened.
The crimeware has been in active circulation since at least 2005, with traces harking back as far as 1989.
Microsoft Malware Protection Center > Ramnit – The renewed bot in town
Mar 14, 2013
keep your security products, such as Microsoft Security Essentials, always updated to the latest definitions to avoid infection.
Try It Out: Encrypt Used Space Only
When you encrypt a drive with Windows Vista or Windows 7, BitLocker encrypts every bit of space on the drive, even if it’s not in use.
Windows 8 introduces Used Disk Space Only encryption, which gives you the option to encrypt only space on the drive that is actively being used.
‘New York Times’ The Target Of Chinese Cyber Attack
January 31, 2013
‘New York Times’ Accuses China Of Being Behind Hacking
January 31, 2013
Chinese computer hackers have been infiltrating the computer systems of The New York Times for the last four months, according to the paper. Renee Montagne talks to Nicole Perlroth, a Times reporter who covers cyber security.
Google Declares War on the Password
Jan. 18, 2013
a pilot project to see if these USB-based Yubico log-on devices might help it solve the password problem
June 6, 2013: 1.7.0_05
the JavaBeans Bridge for ActiveX! (It’s now part of Java Plug-In.)
Jan 20, 2013
Basic troubleshooting tips for Java issues
Jan 20, 2013
Why The Java Bug Is A Big Deal
Jan 12, 2013
Java: Should it stay or should it go?
Oct. 13, 2010
Without a single update mechanism that works for all software (which will never happen) Windows users will forever be at risk.