Monthly Archives: October 2019


Malwarebytes Makes Renowned Security Software

Who is Malwarebytes and what do they do? Well Malwarebytes makes security software that is renowned for its malware removal capability. The software is also known for their user friendly interface and ability to work alongside classic antivirus products, without interfering with their activity.

What is Malwarebytes good at?

  • Being a second layer of defense against malware and ransomware.
  • Plays nice with other antivirus products.
  • Be well protected regardless of the browser you prefer using.

Malwarebytes for Windows Premium vs. Free

Malwarebytes is offered in two versions: Premium version and a Free version. The Free version can detect and remove malware, spyware and rookits from your machine. The Premium version does the same things, but has a few other features:

  • Real-time protection
  • Anti-exploit
  • Anti-ransomware
  • Malicious website protection

Pros and cons

Here are some pros about the Premium version of Malwarebytes for Windows:

  • It includes anti-exploit features that some traditional antivirus products do not, and which can protect
Read the rest

Morons Use Public Wifi!

Well as the title implies, Morons Use Public WiFi! Sorry, not Sorry. I am getting straight to the point and ripping off the band-aid. You are a moron if you use public WiFi and its probably not your fault but this day in age there is no excuse and these 7 reasons below will tell you why you should stay off Public WiFi.  

1. The Man-in-the-middle Attack

One of the most common types of Wi-Fi security threats is the man-in-the-middle attack. This is where hackers intercepts data through techniques to eavesdrop on you. The hackers will intercept and relay messages between two different points which makes it appear everything is normal, but in reality, the attacker is controlling the entire communication.

 

2. Attack cloning 

Here is a simple and one of my favorite tricks. The hackers would divert your internet traffic to a cloned site. The technical term for this … Read the rest


Adobe Users Compromised Due To Public Accessible Database

Around 7.5 million Adobe Creative Cloud users details are now available on the dark web. Researcher Bob Diachenko uncovered the compromised database which could be tapped without a password or any other authentication; offering an attacker access to email addresses, account information and which Adobe products that users purchased. They were quickly made aware but information was already out on the web. Which now leaves you open to even more phishing campaigns, as spear phishing wasn’t bad enough. 

Thankfully, users’ passwords and payment details were not among the data that was exposed. However, a laundry list of personal information belonging to nearly 7.5 million Adobe Creative Cloud users was accessible via the database. This included:

  • Email addresses
  • Account creation date
  • Which Adobe products they use
  • Subscription status
  • Whether the user is an Adobe employee
  • Member IDs
  • Country
  • Time since last login
  • Payment status

 

Please be vigilant towards any emails you … Read the rest


Saying Goodbye To Adobe Flash

Saying goodbye to Adobe Flash will be hard, The end date of Flash Player is on December 31, 2020. Here’s what you can expect after the farewell of flash.

Adobe Stated the following:

“Given this progress, and in collaboration with several of our technology partners – including AppleFacebookGoogleMicrosoft and Mozilla – Adobe is planning to end-of-life Flash. Specifically, we will stop updating and distributing the Flash Player at the end of 2020 and encourage content creators to migrate any existing Flash content to these new open formats.”

“Several industries and businesses have been built around Flash technology – including gaming, education and video – and we remain committed to supporting Flash through 2020, as customers and partners put their migration plans into place. Adobe will continue to support Flash on a number of major OSs and browsers that currently support Flash content through the

Read the rest

Hackers Using Discord to Steal Your Information With Malware

Researchers found that Hackers are injecting malware into Discord to steal your information. The Windows Discord application functionality is based on HTML, CSS, and JavaScript. This allows malware to modify its core files so that the client executes malicious behavior on startup.

 

This Discord malware is targeting data that can be obtained from the chatting platform itself:

  • details about the Discord version used;
  • the browser user agent;
  • first 50 characters out of the victims’ Windows clipboard;
  • zoom factor;
  • stored payment information;
  • username;
  • email address;
  • phone number;
  • a public IP address;
  • a local IP address;
  • screen resolution;
  • timezone;
  • Discord user token.

 

How to check if you are infected

Checking if your Discord client has been modified is very easy as the targeted files normally have only one line of code in them.

To check the %AppData%\Discord\[version]\modules\discord_modules\index.js simply open it in Notepad and it should only contain the single line of “module.exports … Read the rest


How To Fix Not Responding Windows Explorer

Are you having problems with windows explorer? Here are a few steps on how to fix windows explorer not responding or windows crashing issue. There is a Windows 10 feature in File Explorer called “Quick Access”. This feature allows you easy access files and folders you frequently use, either it be locally or on the network and OneDrive.

Quick Access can make your workflow faster by making it so you don’t have to navigate to a file’s or folder’s that are buried deep in a directories file system. However, on occasion you may want to delete the Quick Access history to help maintain some privacy or quicker access or just resolve the explorer crashing issue

Clearing Windows 10 Quick Access History

  1. Click Start or Cortana’s search field and type: file explorer options and hit Enter or click the option at the top of the search results.

2. Now in the … Read the rest


Firefox 70 Tells You If Website Breached

Firefox 70 has been released for Windows, Mac, and Linux and with it comes additional protection like telling you if a website was breached. Firefox 70 also has a new ability for providing social tracking protection and the most awesome feature is that it has a integrated data breach notification service for your saved logins.

Lockwise data breach notifications

With Firefox 70, the Lockwise password manager will now warn you if your saved login credentials were exposed in a data breach.

If your login information was saved to the password manager priror to the data breach, Firefox will display an alert in lockwise logins entry. This alert will state that “Passwords were leaked or stolen from this website since you last updated your login details” and then prompt you to change your password.

You can download Firefox 70 from the following links:

Read the rest

Top Email Phishing Scams

Email phishing scams have evolved to a point that makes it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands and people to trick victims into providing money or providing credentials over an email or a fake landing page.

Roughly one in four Americans in constantly online.  According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.

Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the … Read the rest


Is Microsoft Teams HIPAA Compliant?

Many still seem to wonder and ask what is Microsoft Teams and is this software questionable for use? This includes compliance and security officers in the Healthcare industry leading them to ask is this HIPAA Compliant? However lets go back to the basics, Microsoft Teams is a cloud platform that combines workplace chat, meetings, notes, and attachments. Microsoft Teams is Microsoft’s was created to be the competitor to Slack and Google Hangouts Chat.

Microsoft Teams and the Business Associate Agreement

I have previously mentioned that their is a office365 Business Associate Agreement which is the written contract between a Covered Entity and a Business Associate. It is required by law for HIPAA compliance.

I have checked Microsoft’s site and found a page called:

 

Microsoft Teams Security Features

Certification and Compliance

Microsoft created Teams to be fully Office 365 Tier-C compliant, … Read the rest


Achieving Security with IoT (Internet of Things)

Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security.  Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This day in age we have to maintain a due-care and due-diligence approach on security for all these IoT devices.

With this in mind, here are seven best practices on security for IoT:

  1. Use security gateways: They have the ability to inspect and audit the communications of your network.
  2. Use VLans: Put all IoT devices in a separate Vlan outside primary business network.
  3. Use strong authentication: Change those consumer devices default passwords!
  4. Disable services: Many devices use telnet, FTP and other risky services that may be exposed to the internet.
  5. Use secure protocols
Read the rest

Stay Informed

Receive instant notifications when new content is released.