RSS
IT Glossary    1_9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z   .....  A                                          


SYSTEM
 Windows10
  Registry Windows 10
  Windows 10 tweaks & tricks
Windows8
Tweaks & tricks
  Network settings
  Registry
Windows7
Windows7: General settings
  Windows7: Registry
  Windows7: Registry faq
  Windows7: Network settings
  Windows7: Security
  Windows7: Firewall
  Windows7: Compatibility Mode
  Windows7: Administrator Password
Windows NT/2K/XP/VISTAWindows NT/2K/XP/VISTA
Win 2K faqWin 2K faq
  Win 2K(kernel & MEM.managment)
  Win 2K XP (Securit)
  Win 2K XP (Boot)
  Win 2K XP (Install)
  Win 2K XP (Admin)
  Win 2K XP (File system)
  Win 2K XP (Services)
  Win 2K & XP optim & tweak
  Win XP faq
  Win XP faq #2
  Win XP faq (net)
  Win XP faq (lan)
  Win XP recover & recovery console
  WinXP & ntfs
  WinXP & game faq
  Win PE
  Win Vista
  Win Vista FAQ
  Win Server tweaks
RegistryRegistry
Reg WIN2K/XP faq
Reg WIN2K/XP faq #2
Reg NT/XP: Structure
Reg XP: Restore & backup
Reg XP: Costumize XP
Reg XP: Inet
Reg NT/XP: SAM
Reg: Inet & LAN
BIOSBIOS
BIOS faq
BIOS recover
BIOS #
@Mail.ru
computer ambulance
Ransomware FUD strikes against Office 365

In case youve been enjoying a luddite vacation for the past couple of weeks, you might have seen some of the headlines about ransomware targeting Office 365. This is a classic example of FUD gone wild, (FUD, in case you dont know, stands for Fear, Uncertainty, and Doubt) and how a single post, whether well written or not, whether accurate or not, can be picked up and suddenly becomes gospel on the Internet. Heres a little more fact-based view of whats happened.
If you were to click through some of the headlines and tweets and reports reporting on reports, youd find it all goes back to a single post from a single third-party security vendor known as Avanan. Avanan offers products and solutions for a variety of security challenges, including DLP, antimalware, data sanitization, and more. On June 27, Avanan author Steven Toole posted an article on the Avanan website alleging that a widespread attack on Office 365 Corporate Users with Zero-day Ransomware Virus took place.
Ransomware FUD strikes against Office 365
(Read More... )

Android Trojan Blocks Outgoing Calls to Banks

After Android malware that intercepts incoming calls to bypass two-factor authentication systems emerged earlier this year, Symantec researchers have now discovered a Trojan that prevents users from making outgoing calls to banks from their smartphones.Android Trojan Blocks Outgoing Calls to Banks
(Read More... )

Edward Snowden: Three years on

Its been three years since former NSA contractor Edward Snowden fled the United States and revealed classified information on government surveillance programs involving the US, European governments, and telecommunications companies. In the time since he first came to public notice, he has been living in Russia, which granted him asylum, while the US government has been pressing for his arrest and extradition to face charges of espionage. Lets look back on the events from 2013, what has happened since, and what, if anything, has changed in the world as a result.Edward Snowden
(Read More... )

Is Wi-Fi making you sick?

Wireless technology is everywhere these days. Almost every home seems to have a wi-fi router, as computer users find it so much easier to set up than running Ethernet cables. Businesses too are increasingly deploying wireless networks along with their wired ones, so employees can use their mobile devices while moving around the building. Hotels, conference centers, city parks, restaurants, coffee shops, airports they all have wireless hot spots, both public and private. Even on a cruise ship in the middle of the ocean, you cant escape those signals.Is Wi-Fi making you sick
(Read More... )

Ransomware takes it to the next level: Javascript

If youre lucky, youve only been hearing a lot about ransomware lately. If youre not so lucky, you might have experienced it firsthand. Victims of this most insidious form of malware know how devastating it can be to find that suddenly all of your important data from personal financial information to irreplaceable photos to mission-critical business documents is inaccessible. Its not gone (perhaps that would be less frustrating), but its sitting there on your drive, encrypted, and you dont have the key to unlock it. This has been the reality for many ransomware victims and now there is a new type of ransomware to be on the lookout for, one of the nastiest yet.
Ransomware has been in existence for over two decades (the first was the AIDS Trojan in the late 1980s), but there has been an explosion of it in the last few years, and its gotten more sophisticated. There are two basic types. In the case of computer locker ransomware, your entire system is locked so you cant log on. More commonly now, with crypto ransomware, the system is accessible but the data files are encrypted.
Ransomware takes it to the next level: Javascript
(Read More... )

Lenovo urges customers to uninstall dangerously flawed app from its systems

Exploit could lead to man-in-the-middle attack against desktop and laptop systems running the Lenovo Accelerator Application.
Chinese PC firm Lenovo has advised users of its desktop and laptop systems to uninstall a pre-loaded app that could allow hackers to execute code remotely and carry out a man-in-the-middle (MitM) attack.
Lenovo urges customers
(Read More... )

Ransomware hits 10K Australians

At least 10,000 Australians have been targeted in a ransomware campaign that lures recipients with an email that appears to come from local energy company AGL, according to the Sydney Morning Herald.Ransomware hits 10K Australians
(Read More... )

$100,000 Bounty on Syrian Electronic Army

The US Department of Justice believes it has identified three members of the notorious Syrian Electronic Army, who have in recent years made a name for themselves with their high profile hacks against media organisations, targeted spear-phishing attacks, and redirecting well-known websites to display propaganda in support of the Syrian Government and President Bashar al-Assad.
$100,000 Bounty on Syrian Electronic Army
(Read More... )

1.5Mn Customer Records Breached at Verizon Enterprise

Verizon Enterprise Solutions has suffered the theft of 1.5 million customer contact details, including for some of the top Fortune 500 companies. The customer info was found up for sale on an underground cybercrime forum, with a price tag of $100,000.1.5Mn Customer Records Breached at Verizon Enterprise
(Read More... )

18 Million Stolen Credentials Found in Japan

Stolen usernames and passwords belonging to 18 million Internet users have been found on a server owned by a Japanese company, which is said to have provided services to Chinese hackers.18 Million Stolen Credentials Found in Japan
(Read More... )

computer service


July 2016 Microsoft Patch Tuesday
Microsoft has been pummeling us with security updates for the past few months, and seemed to be stuck on the number 16 for a while there. While its great that theyre fixing all these vulnerabilities, it can put quite a strain on those of us who are tasked with testing and applying them. The good news is that this time, we get a bit of a reprieve. Dont get too excited its not like the good old days of Tuesdays Past when we only had to deal with four or five patches, but 11 feels like a fairly light load at this point.
Besides, its the middle of July and its too hot outside to venture out at least if you live in the southern part of the United States so we might as well stay in our air-conditioned buildings and spend the day testing and applying patches. Most of these are for Windows, with the exception of the usual Edge and IE cumulative updates, a Flash Player patch, and one for Office and one for .NET Framework. Six are rated as critical.
(Read More... )
The bottom line
Ensuring that networks are secure and that compliance with regulations and industry standards can be achieved is a complex task for any organisation no matter how small or large. An organisation that tries to do everything itself will be in a constant state of catch up, which often leaves vulnerabilities exposed. As networks become increasingly open and inter-connected, with always-on availability expected from an ever-growing variety of devices, a far better strategy is to offload security needs that are either not a core competence or that are complex and costly to manage to a third party that has specialised expertise.

Home | Stop-screens | Wi-Fi faq | LAN faq | Full BIOS settings | IP faq | FTP faq | Motherboards faq | | Handbook of meta tags | Internet protocols | Internet and Security | | Vippi | Protocols

Cookie policy | Sitemap

po gonn 2004