Gartner Top Technologies for Security in 2017
How EDR, remote browsers, and cloud security will shape the next year of cybersecurity.
July 5, 2017
Contributor: Kasey Panetta
http://www.gartner.com/smarterwithgartner/gartner-top-technologies-for-security-in-2017
Computers > Security
Ransomware and how to prevent it with Office 365
Nov 18, 2016
detonation chamber (sandbox)
Windows Hello
Bots Are Going After Grandma
In A Battle For Web Traffic, Bad Bots Are Going After Grandma
July 03, 2014
http://www.npr.org/blogs/alltechconsidered/2014/07/03/328196199/in-a-battle-for-web-traffic-bad-bots-are-going-after-grandma
Over 61.5 percent of the traffic on the Web is automated applications called bots talking to other bots, according to one study. And experts say about half of those bots are bad.
Even Disconnected Computers May Face Cyberthreats
Even Disconnected Computers May Face Cyberthreats
December 04, 2013
http://www.npr.org/blogs/alltechconsidered/2013/12/03/248576739/even-disconnected-computers-may-face-cyber-threats
If your computer is infected with a virus or other forms of malware, disconnecting the machine from the Internet is one of the first steps security experts say you should take. But someday, even physically separating your laptop from a network may not be enough to protect it from cyber evildoers.
German computer scientists have come up with a prototype for building “covert channels” between computers using the machines’ speakers and microphones, potentially defeating high-security measures that rely on placing an “air gap” between computers.
The scientists said their network was based on a system originally designed for underwater communication.
“We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range,” Michael Hanspach and Michael Goetz, of the Fraunhofer Institute for Communication, Information Processing and Ergonomics, wrote in a paper published in the November issue of the Journal of Communications.
As Dan Goodin explains in Ars Technica: “The proof-of-concept software — or malicious trojans that adopt the same high-frequency communication methods …
Acoustical networking
related:
https://franzcalvo.wordpress.com/2014/01/24/a-radiation-detector-in-your-smartphone
Cryptolocker: The evolution of extortion
Cryptolocker: The evolution of extortion
November 19, 2013
http://www.computerworld.com/s/article/9244176/Cryptolocker_The_evolution_of_extortion
The Cryptolocker Trojan is an evolution of “ransomware,” not a revolutionary change from past criminal attempts to extort money from PC owners, a security expert said today.
Ransomware is a category of malware that, once on a system, encrypts files and then tries to convince users to pay to decrypt them so they can again be opened.
The crimeware has been in active circulation since at least 2005, with traces harking back as far as 1989.
Microsoft malware Protection Center > Ramnit – The renewed bot in town
Microsoft Malware Protection Center > Ramnit – The renewed bot in town
Mar 14, 2013
http://blogs.technet.com/b/mmpc/archive/2013/03/14/ramnit-the-renewed-bot-in-town.aspx
keep your security products, such as Microsoft Security Essentials, always updated to the latest definitions to avoid infection.
Try It Out: Encrypt Used Space Only
http://technet.microsoft.com/en-us/windows/jj983729.aspx
When you encrypt a drive with Windows Vista or Windows 7, BitLocker encrypts every bit of space on the drive, even if it’s not in use.
Windows 8 introduces Used Disk Space Only encryption, which gives you the option to encrypt only space on the drive that is actively being used.
‘New York Times’ The Target Of Chinese Cyber Attack
‘New York Times’ The Target Of Chinese Cyber Attack
January 31, 2013
http://www.npr.org/2013/01/31/170787379/new-york-times-the-target-of-chinese-cyber-attack
‘New York Times’ Accuses China Of Being Behind Hacking
January 31, 2013
http://www.npr.org/2013/01/31/170727524/chinese-hackers-break-into-new-york-times-computers
Chinese computer hackers have been infiltrating the computer systems of The New York Times for the last four months, according to the paper. Renee Montagne talks to Nicole Perlroth, a Times reporter who covers cyber security.
http://hereandnow.wbur.org/2015/06/05/federal-data-breach-china
Google Declares War on the Password
Google Declares War on the Password
Jan. 18, 2013
http://www.wired.com/wiredenterprise/2013/01/google-password
a pilot project to see if these USB-based Yubico log-on devices might help it solve the password problem
UMF090552
What Version of Java Are You Using?
http://www.java.com/verify
http://javatester.org/version.html
June 6, 2013: 1.7.0_05
the JavaBeans Bridge for ActiveX! (It’s now part of Java Plug-In.)
Jan 20, 2013
http://www.oracle.com/technetwork/java/javase/tech/activex-tools-jsp-140240.html
Basic troubleshooting tips for Java issues
Jan 20, 2013
http://www.java.com/en/download/help/troubleshoot_java.xml
Why The Java Bug Is A Big Deal
Jan 12, 2013
http://www.forbes.com/sites/toddganos/2013/01/12/why-the-java-bug-is-a-big-deal
Java: Should it stay or should it go?
Oct. 13, 2010
http://blogs.computerworld.com/17150/java_should_it_stay_or_should_it_go
Without a single update mechanism that works for all software (which will never happen) Windows users will forever be at risk.