Quantcast

Archive: Apr 2012

Generations of DoS attacks: some history and links to Jester, Anonymous and LulzSec

Sam Bowne from City College of San Francisco shares his expertise in the history of denial-of-service attacks, their technical aspects, and the major groups of hacktivists who use those for various purposes. This Defcon presentation starts with the classification of DoS attacks and the analysis thereof in...

PC Tools Internet Security review

Choosing PC Tools Internet Security gives you what you need to stay safe online. Due to changes in PC Tools’ marketing and operational policy, Internet Security is no longer available for downloading and updating. Being a reputable security software vendor that’s always been about innovation and...

How to remove Facebook malware

Malware distribution in social networks appears to be turning into a steadily growing trend. This tutorial encompasses the description of the most common patterns of malware propagation on Facebook, and provides tips on how to eliminate the risk to enjoy social networking to the fullest. Criminals are...

How malware authors are winning the war 3: social media scams and security enhancement

Read previous: How malware authors are winning the war 2: exploit toolkits, fake antiviruses and mobile threats James Lyne moves on with his analysis of malware distribution patterns, speaking on the techniques fraudsters are applying to diversify away from the expected conventional paradigm of cybercrime...

How malware authors are winning the war 2: exploit toolkits, fake antiviruses and mobile threats

Read previous: How malware authors are winning the war: waves of malicious code Having singled out the three major waves of malicious code evolution, Sophos’ James Lyne proceeds with his presentation, describing exploit toolkits, rogue antivirus activity patterns and the gradual, yet steadily growing trend...

How malware authors are winning the war: waves of malicious code

Director of Technology Strategy at Sophos James Lyne expresses his vision of the way malware production has evolved over time, shifting from mostly prankish activities to the complex sophisticated cybercrime infrastructure that we’re seeing today. Hello there, my name is James Lyne from Sophos, and today...

PC Tools Privacy Guardian review

PC Tools Privacy Guardian is a powerful tool to provide your internet privacy. Due to changes in PC Tools’ marketing and operational policy, Privacy Guardian is no longer available for downloading and updating. Those who care about personal data security and identity protection should duly...

The threats of the Age of cyber-warfare 2: Kaspersky on cybercrime

Follow-up on Eugene Kaspersky’s talk called “The threats of the Age of cyber-warfare” where the speaker is looking into instances of critical infrastructure damage, catastrophes and military challenges called forth by cybercrime. Mr. Kaspersky is also providing some ideas on minimizing the risks,...

The threats of the Age of cyber-warfare: Eugene Kaspersky on cybercrime

Co-founder and CEO of “Kaspersky Lab” Eugene Kaspersky delivers a speech called “The threats of the Age of cyber-warfare”, expressing his vision on the current state of the global cybercrime and exemplifying his research with some observations and evidence of close affiliation of...

Eugene Kaspersky on the evolution of malware

Co-founder of Kaspersky Lab and a true cybersecurity guru Eugene Kaspersky gives a short talk, expressing his viewpoint on malware evolution: the way malware was, the way it is now and how things might change in the future. The evolution of malware within last 10 years depends on the evolution of people who...

What to do if your Facebook account gets hacked?

The ‘WHO Radio’ Wise Guys Brian Gongol and Dan Adams are discussing the Facebook account hack issue to help you in case you find out that your Facebook account has gotten compromised, providing specific tips to take care of this breach and prevent it from happening in the future. So how do you find out...

Bitdefender Antivirus Plus 2016 review

$39.95 Bitdefender Antivirus Plus 2016 is now powerful enough to handle ransomware attacks. Usability:  Features:  Efficiency:  Support:  Overall:  Buy Now Even with the Caps Lock on, the phrase ‘virus protection is important’ wouldn’t be nearly as expressive...

Drive-by downloads 3: web anti-malware services

Read previous: Drive-by downloads 2: malware code implementation and preventive measures Concluding their in-depth discussion of drive-by downloads, Neil Daswani and Lars Ewe provide some tips for avoiding the consequences of such infestation. These recommendations are split into specific steps webmasters...

Drive-by downloads 2: malware code implementation and preventive measures

Read previous: Drive-by downloads: exploiting cross-site scripting vulnerabilities As Neil Daswani and Lars Ewe are moving on with their discussion, they outline the five main steps that cyber criminals tend to take for conducting drive-by downloads. Additionally, some helpful recommendations are provided as...

Drive-by downloads: exploiting cross-site scripting vulnerabilities

Engineering manager at Twitter (co-founder of Dasient) Neil Daswani and CTO at Cenzic Lars Ewe have a discussion of today’s Internet safety challenges at RSA 2011 Conference – ‘Drive-by downloads: How To Avoid Getting a Cap Popped in Your App’. Their focus areas in this part of the talk...

Facebook privacy concerns 2: data sharing pitfalls and tweaking privacy settings

Read previous: Facebook privacy concerns: Timeline profile and user tracking Are you really in charge of what’s being shared about you on Facebook? Is there large-scale data mining going on, you being part of it? This Zen Archer’s article provides an insight into these issues for you to get a better...

Facebook privacy concerns: Timeline profile and user tracking

This entry by Zen Archer gives an up-close glimpse of some of the current concerns associated with Facebook privacy. A special focus here is on the Timeline profile’s privacy-infringing peculiarities and user tracking implementation. Facebook is different now. A lot of people say it is a pivot, going from...

Terrorist Groups in the Online World: Mikko Hypponen at RSA Conference 2012

Mikko Hypponen talks on links between online crime, Windows trojans and funding the insurgents, explains the roots of some terrorist online publications and extremist malware. So my latest research has been into the Internet use as done by extremist and terrorist organizations. And when we start to think...

Online Espionage 2: email backdoors and RSA hack

Moving on with his “Online Espionage” talk, Mikko Hypponen is providing a number of specific examples of attacks through email attachments containing backdoors for implementing subsequent contamination of the targeted systems. Mr. Hypponen is also giving an insight into the RSA hack issue, outlining the...

Online Espionage: Mikko Hypponen at SecTor IT security conference

What is the present-day governmental and nation states espionage like and how should security companies treat it? How do emails with contagious attachments transform into critical privacy problems? How do you tell that you’re being spied on? The well-known malware adventurer and cybersecurity analyst...

The machinery of cybercrime 3: online card and ID markets

Read previous: The machinery of cybercrime 2: terror funding via the Internet Jeff Bardin entirely dedicates the final part of “The Machinery of Cybercrime” talk to the card and ID markets as a substantial component of the large-scale worldwide criminal effort. Some of the specifics touched upon are...

The machinery of cybercrime 2: terror funding via the Internet

Read previous: The machinery of cybercrime: malware infrastructure and ties to terrorism Continuation of Jeff Bardin’s talk called “The Machinery of Cybercrime” where he gives a special emphasis to terror funding sources, including the peculiarities of money movements via the Internet and stolen...

The machinery of cybercrime: malware infrastructure and ties to terrorism

The Chief Intelligence Strategist for ‘Treadstone 71’ Jeff Bardin presents his overview of cybercrime from several different angles. Mr. Bardin describes cyber fraud as viewed from within this industry, outlining such aspects as credit card fraud, botnet operations, spam distribution, phishing, money...

Malwarebytes Anti-Malware review

$24.95 Malwarebytes Anti-Malware is all about outstanding performance and unsurpassed efficiency in handling malware threats. Usability:  Features:  Efficiency:  Support:  Overall:  Download The official Malwarebytes’ web page claims their security software is there to...