MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?

MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?. https://www.makeuseof.com/is-microsoft-defender-the-best-antivirus-for-your-pc-in-2021/

Continue reading MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?

Top 8 Internet Fraud and Scams of All Time

https://www.makeuseof.com/tag/top-5-internet-fraud-scams-time/

Continue reading Top 8 Internet Fraud and Scams of All Time

How To Protect Your PC From Hackers?

Computer viruses are rapidly growing in the World Wide Web as numerous hackers unleash them on internet in the hope of stealing private financial information. To protect yourself completely, it is important to have a set of tools hardware and …

Continue reading How To Protect Your PC From Hackers?

The best VPNs for Linux in 2018 (and the worst)

Ubuntu, Fedora, OpenSUSE, and Mint users often get the short end of the stick when it comes to software, and VPN services are no different. Let’s be honest: Linux users are low on the priority list for most companies and developers. That’s why we set out to find the best VPN providers who have taken the time to give Linux fans some attention.   Credit to https://www.comparitech.com/   https://www.comparitech.com/blog/vpn-privacy/best-vpn-for-linux/

Continue reading The best VPNs for Linux in 2018 (and the worst)

Proxy server…HELL no!

Continue reading Proxy server…HELL no!

Scary bun known knowledge

The Dark Arts: Hacking Humans https://hackaday.com/2016/06/10/the-dark-arts-hacking-humans/amp/ Basically everything can be hacked…not only computing devices

Continue reading Scary bun known knowledge

Hackers can read your WhatsApp and Telegram chats if they wanted to

https://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=4&articleid=65755247&source=wordpress

Continue reading Hackers can read your WhatsApp and Telegram chats if they wanted to

Google aims to kill passwords by the end of this year

https://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=4&articleid=65091164&source=wordpress

Continue reading Google aims to kill passwords by the end of this year

1Block

Secure, passwordless authentication using Blockchain technology This is very interesting check the link above. Web sites and applications shouldn’t have to rely on problematic identification methods such as usernames and passwords. This is a human problem. This is a customer …

Continue reading 1Block

10 Worst Internet Security Mistakes

    1) “password” When you are choosing your passwords, what do you normally do? Do you optimize your passwords to the best security you can manage, or do you just type in “password” all of the time and let …

Continue reading 10 Worst Internet Security Mistakes

Top 25 Worst Passwords of 2015

123456 password 12345678 qwerty 12345 123456789 football 1234 1234567 baseball welcome 1234567890 abc123 111111 1qaz2wsx dragon master monkey letmein login princess qwertyuiop solo passw0rd starwars

Continue reading Top 25 Worst Passwords of 2015

Stop Sharing Folders Without a Password

If there’s one thing you should remember about sharing on the network securely, it is this: never turn off password protected sharing. Force all network users who want to access what you are sharing to use the Homegroup or a username and password. This way, if an unwanted guest has access to your network, your shared data is safe from prying eyes. Also, when sharing something on the network, using the Sharing Wizard or other tools that were covered in the Windows Networking class, avoid sharing with the user ‘Everyone.’ This user means anyone with or without a user account …

Continue reading Stop Sharing Folders Without a Password

5 Tips to Reduce Risk from Web Threats

1. Keep your systems patched and up to date. Keeping systems fully up to date—including the operating system, web browsers, browser plugins, media players, PDF readers and other applications—can be a tedious, annoying and time-consuming ongoing task. Unfortunately, hackers are counting on most people to fall far short of what’s needed to keep their systems up to date. 2. Standardize your web software. If you’ve just read point number 1, you’re probably still thinking that keeping systems fully patched and up to date is an onerous task. What makes this worse is if you don’t know what software is running …

Continue reading 5 Tips to Reduce Risk from Web Threats

Europeans most at risk from surge in Dyre malware attacks June2015

The Dyre malware campaign returned with nasty new features in the first three months of 2015 causing a spike in infections, Trend Micro has reported. The company said that infections of the malware on computers rose 125 percent to around 9,000 in in the period from January to March. Some 39 percent of the infections were in Europe, although North America was only just behind on 38 percent. Infections in Asia-Pacific were lower at 19 percent. French web users were most at risk. Around 34 percent of all infections in the region were in the country, followed by Germany on …

Continue reading Europeans most at risk from surge in Dyre malware attacks June2015

How To Make Your Own Sandbox: An Introduction to Virtualization Techniques

If you happened to write a big system software, you probably had to use some sort of virtual machine – it could be VMWare, Virtual PC or whatever. Have you ever asked yourself how those machines work? I’ve been excited by these wonderful technologies for quite a long time. They looked like a piece of magic to me. And the best approach to uncover the magic, to understand the details is to write a virtualization solution from a scratch. For now, I have my own virtualization solution – a sandboxing tool. It was a challenging task to accomplish. There were …

Continue reading How To Make Your Own Sandbox: An Introduction to Virtualization Techniques

Promologic.com- Possible SCAM

They send email asking to put advert on your blog, like a freelancer called John.   Now the company looks  american , without any history behind.   The email is sent from an adsl connection as below   IP: 188.129.87.171   [DNS] – [Tracert] Name: cpe-188-129-87-171.dynamic.amis.hr  [Whois] Country: HR – Croatia  They are using Windows 7 64bit with Mozilla firefox v 36   netname: AMISHR-ACESS descr: Amis Telekom d.o.o. descr: ADSL infrastructure subnets country: HR admin-c: AMHR-RIPE tech-c: AMHR-RIPE status: ASSIGNED PA mnt-by: AMISHR-MNT mnt-lower: AMISHR-MNT mnt-routes: AMISHR-MNT remarks: INFRA-AW source: RIPE # Filtered role: Amis Hrvatska RIPE Team address: Amis …

Continue reading Promologic.com- Possible SCAM

LLT Consulting company – Possible SCAM!

Be careful on this ones. You probally will receive an email like that: Hello! My name is Josephine Bergson representing the advertising department of the LLT Consulting company. We are interested to place ads (banners), of your choice, on your websites. Design and sizes can be seen on our website at www.lltconsulting.net/id_af2fyu9k/ Depending on the banner size you choose we can pay up to $950.00/month. If you are interested to become an advertising partner please let me hear from you. Kind Regards, Josephine Bergson josephine.bergson@lltconsulting.net A scan will reveal the following They use Java in a very strange way. DO …

Continue reading LLT Consulting company – Possible SCAM!

7 seven Worse stealth attacks in IT

Today’s most ingenious malware and hackers are just as stealthy and conniving. Here are some of the latest techniques of note that have piqued my interest as a security researcher and the lessons learned. Some stand on the shoulders of past malicious innovators, but all are very much in vogue today as ways to rip off even the savviest users. Stealth attack No. 1: Fake wireless access points No hack is easier to accomplish than a fake WAP (wireless access point). Anyone using a bit of software and a wireless network card can advertise their computer as an available WAP …

Continue reading 7 seven Worse stealth attacks in IT

Why Do People Get Computer Viruses

No one likes to seek out out that they’ve picked up one of many widespread pc viruses from being on-line. Yet so many individuals are unaware of the issues which might be on-line that may trigger injury to your system. If you’ve come to the web in hopes…

Continue reading “Why Do People Get Computer Viruses”

Alureon Virus – Stopping The Google Redirect

What Is The Alureon Virus? The Alureon virus is a extreme an infection of the pc that may permit an web felony to steal personal info. This can vary out of your web site passwords and usernames to your private monetary info. It has been round for a lot…

Continue reading “Alureon Virus – Stopping The Google Redirect”

The Most Notorious Computer Viruses

Thinking of throwing away your laptop computer due to a malfunction of some type? Has a laptop computer half abruptly stopped functioning correctly? Is a program which used to run nice all of the sudden going haywire? Before you chalk it as much as hardware…

Continue reading “The Most Notorious Computer Viruses”

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of the attack campaign are the following: •The malicious file wipes the master boot record (MBR) and other files. •The malware was hard coded with a specific execution date and time and searches machines for credentials with administrative/root access to servers. •The malware is written to specifically target South Korean victims. …

Continue reading South Korean Malware Attack

Getting the Local Traffic Report

It can be problematic and lead to headaches – and possibly even hair loss (your follicles may vary) – if you need to capture local network traffic (sent to your own device or PC) as many tools (even the venerable WireShark) aren’t very helpful with that scenario. However, there is a way to do it using two free tools, namely RawCap and the aforementioned WireShark. Once you know how, it’s (almost) as easy as pie — that is, eating a pie, such as an apple pie – not memorizing 3.14….etc) First, download RawCap here Next (provided you don’t already have …

Continue reading Getting the Local Traffic Report

Anonymous Tips

  This is a simple guide for noobs on how to stay anonymous and safe in the clearweb and the darknet. If it seems “too good to be true” you better bet your ass it’s a scam! Assume everything is being monitored 24/7, is hacked/malware attacks, keyloggers, LEO/spies, and that your real IP is being leaked. Just that last bit might make you think twice before downloading/sharing any type of illegal content. Remember sometimes these downloaded/uploaded requests which use the ‘GET’ command are simple leaks your senstive IP information. (Please don’t download too big of files to slow down the …

Continue reading Anonymous Tips

Intrusive Surveillance

Intrusive Surveillance basically means any type of surveillance that is occurring due to some form of intrusion into your machine. As such, it is the most difficult form of “forensics” to defend against, since doing so involves the securing and hardening of your operating system against attack. While keeping up with security patches is a necessary condition to be secure, sadly it is not sufficient. In spite of this, there are several obvious indicators that someone is investigating you/watching what you do with your computer. I should probably start this section off by saying that if you need anonymity, you …

Continue reading Intrusive Surveillance

CERT-In alerts online banking customers to be aware of Dyreza Trojan

Indian online banking customers are at risk. Yes, Cyber security sleuths have alerted online banking customers in the country, that some hackers have been spreading the deadly ‘Trojan’ virus which steals classified data and passwords of a vulnerable…

Continue reading “CERT-In alerts online banking customers to be aware of Dyreza Trojan”

Create a USB Password Stealer to See How Secure Your Info Really Is

Step One: Collect Your Tools NirSoft makes a ton of utilities that we love, and they have a pretty good suite of security tools. We’re going to use a few that recover passwords to create our ultimate USB tool. Plug in your USB drive, and create a folder titled “Utilities”. Then, download the following zip files (not the self-install executables) from the NirSoft Password Recovery Utilities page onto the thumb drive and—after extracting the files—place all of the .exe files in the Utilities folder: MessenPass Mail PassViewProtected Storage PassView Dialupass BulletsPassViewNetwork Password RecoverySniffPass Password SnifferRouterPassViewPstPasswordWebBrowserPassViewWirelessKeyViewRemote Desktop PassViewVNCPassView Each of these …

Continue reading Create a USB Password Stealer to See How Secure Your Info Really Is

Passwords/ Passwords (Thanks anonimous)

Choosing a Strong Password by @voodookobra – Educational article, great explanation. https://scott.arciszewski.me/blog/2014/08/choosing-strong-password Guide for creating strong passwords – Older article but still good info The Ultimate Guide for Creating Strong Passwords Passwords: Here’s how to make them harder to crack. > https://www.pcadvisor.co.uk/how-to/security/3446212/passwords-youre-doing-it-wrong-heres-how-to-make-them-uncrackable/ Handy tool for generating strong passwords > https://strongpasswordgenerator.com/ Passphrase generating tool > https://entima.net/diceware/ The Password Meter – check password strength and learn what qualities of your password put you at risk – Don’t use exact password but something close to give you idea. > https://www.passwordmeter.com/ Password Security 101 > https://www.androidcentral.com/security-101-passwords?utm_source=ac&utm_medium=dlvrit Password Management Guide Design – Design your own …

Continue reading Passwords/ Passwords (Thanks anonimous)

What to Do When Someone Gets Unauthorized Access to Your Computer

We don’t like to think about it, but it can happen: whether by hacking or by theft, someone can get access to your computer and everything on it. When the unthinkable happens, here’s how to pick up the pieces. Figure Out the Point of Entry and Clean Up the Mess Stopping the intrusion in progress is your number one priority. You can’t clean the house until you’ve got the entire party out and locked the door. For me, this part was easy: someone had accessed my computer with TeamViewer. If you’re not familiar with the application, TeamViewer gives someone COMPLETE …

Continue reading What to Do When Someone Gets Unauthorized Access to Your Computer

Security and Privacy Tips for the Paranoid

Turn off Java and Flash in your Web browsers icon-coffee  Java and Adobe Flash Player plug-ins are common points of vulnerability for many browsers. The two software platforms are useful and power a lot of interactive content on the Internet, but Justin Cappos, a professor of computer science at the Polytechnic Institute of New York University, says each platform is just too much of a risk. Cover your computer’s webcam and microphone icon-microphone  icon-camera    Cappos noted that it’s very easy to take control of a computer or its webcam. He uses the simple, low-tech expedient of a piece of black tape to …

Continue reading Security and Privacy Tips for the Paranoid

PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora

################################################################################ PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora ################################################################################ Credits at the end of the page. Due to extreme laziness the links are copy and paste.Ta Warning: Microsoft Windows is affected by PRISM. Using it may compromise your privacy. We strongly recommend replacing Windows with either Linux or BSD. @@@@@@@@@@@@@ Protect your: @@@@@@@@@@@@@ I. Computer II. Network I. Computer ##################### Anonymizing Networks: ##################### ——- Freenet ——- Decentralized censorship-resistant network. https://freenetproject.org/ —— GNUnet —— GNUnet is a fully free P2P network. https://gnunet.org/ — I2P — The invisible internet project. https://geti2p.net/en/ —— Syndie —— Distributed, anonymous forum software. https://syndie.i2p2.de/ …

Continue reading PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora

How to Secure wireless networks

In minimize wireless network attacks; an organization can adopt the following policies Changing default passwords that come with the hardware Enabling the authentication mechanism Access to the network can be restricted by allowing only registered MAC addresses. Use of strong WEP and WPA-PSK keys, a combination of symbols, number and characters reduces the chance of the keys been cracking using dictionary and brute force attacks. Intrusion detection systems (IDS),systems such as WIDZ can help; network scanning, association floods and Rogue APs. https://ostatic.com/widz Firewall software can also help reduce unauthorized access.

Continue reading How to Secure wireless networks