
DuckDuckGo better than Google for privacy
#1 — Google tracks you. DuckDuckGo Doesn’t
You share your most intimate secrets with your search engine without even thinking: medical, financial and personal issues, along with all the day to day things that make you, well, you. All of that personal information should be private, but on Google it’s not. On Google, your searches are tracked, mined, and packaged up into a data profile for advertisers to follow you around the Internet through those intrusive and annoying ever-present banner ads, using Google’s massive ad networks, embedded across millions of sites and apps.
In fact, it’s a myth that you need to track people to make money in web search. When you search ‘car’ they can show you a car ad without knowing anything about you. That’s how they make money and it doesn’t involve tracking because it is based on the keyword and not the person. Google could … Read the rest

Mac Malware Injects Ads Into Encrypted Traffic
A newly discovered malware infection targeting macOS devices.
Malwarebytes security researchers say it has the ability of injecting ads into encrypted web traffic.
This malware is call OSX.SearchAwesome, the malware is delivered by a malicious installer that arrives as an app downloaded using a torrent file. The malware installer looks like a disk image file but doesn’t have the usual icon art that is used to make it look legitimate.
When the malware is launched, the image file installs the the payload silently and then it requests the user to authorize changes to the Certificate Trust Settings and to allow a component called spi to modify the network configuration. This will then allow the malware to inject itself to network traffic.
… Read the rest
How To Fix RDP Connection Was Denied
Learn how to troubleshoot and resolve the “RDP connection was denied” error. Fix issues preventing remote desktop access with simple steps and solutions.
RDP Connection Was Denied to allow a end user to remote connect to the computer?
The connection was denied because the user account is not authorized for remote login.
- Right-click My Computer, and select Properties.
- Select the Remote tab.
- IF not already done: Select “Allow users to connect remotely to this computer.
- Click “Select Users” if you want to add a non-Administrator user.
- Click Add.
- Select \ type the user in question, and click OK.
- Click OK to close the Remote Desktop Users dialog box.
- Click OK to close the main dialog box.
To Open RDP to Public:
- Allow port 3389 through windows firewall or your AV firewall
- You will also have to allow port 3389 through your physical firewall \ router.
- If default port changed the

Marriott Data Breach hits 500 million Starwood Guests
Marriott Data Breach hits 500 million Starwood guests. It was said that during the investigation, there had been unauthorized access to the Starwood network since 2014. The information copied from the Starwood guest database over all this time were names, mailing addresses, phone numbers, email addresses, passport numbers, Starwood Preferred Guest (“SPG”) account information, dates of birth, gender, arrival and departure information, reservation dates, and communication preferences.
Starwood brands include: W Hotels, St. Regis, Sheraton Hotels & Resorts, Westin Hotels & Resorts, Element Hotels, Aloft Hotels, The Luxury Collection, Tribute Portfolio, Le Méridien Hotels & Resorts, Four Points by Sheraton and Design Hotels. Starwood branded timeshare properties are also included.

Attempted Breach on DELL EMC Network
There was an attempted breach on DELL EMC customers using Dell.com. The company has been stressing customers to change their passwords. Dell cybersecurity teams are still not sure on how hackers got access to the information on the website. They are not sure if it was due to vulnerabilities or other causes. But it was said they took proper measures to mitigate any further attacks.
Dell Announces Potential Cybersecurity Incident
ROUND ROCK, Texas, Nov. 28, 2018 – Dell is announcing that on November 9, 2018, it detected and disrupted unauthorized activity on its network attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords. Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was extracted. Additionally, Dell cybersecurity measures are in place to limit the impact of any potential exposure. These

Hackers Breach Dunkin’ Donuts Accounts
Tuesday Dunkin’ Donuts posted an advisory on the website regarding to its credential stuffing attack on the companies data.
What does This Credential Stuffing mean?
Credential stuffing is a term related to a specific type of hacking that secures user credentials by breaching a system, and then attempts to use those credentials with other systems. Like other kinds of related hacking, credential stuffing attacks rely on hackers being able to get into a network and take out sensitive user information such as passwords and usernames.
Dunkin Brands Inc. (“Dunkin’”) is writing to provide you with information regarding a recent
incident involving your DD Perks account. Although Dunkin’ did not experience a data security
breach involving its internal systems, we’ve been informed that third-parties obtained usernames
and passwords through other companies’ security breaches and used this information to log into
some Dunkin’ DD Perks accounts. One of these may have been … Read the rest

Microsoft Warns of Apps Exposing Private Keys
On Tuesday Microsoft notified users that digital certificates have been compromised for two apps which allowed someone to remotely spoof websites and content. The issue was that the certificate and private key were the same for anyone who installed these two applications. Which allowed a hacker to decrypt the software’s private key which compromised the security of the windows computers. The certificate became susceptible to attacks like spoofing, phishing, or man-in-the-middle attacks.
November 23, following a vulnerability identified in Sennheiser HeadSetup and HeadSetup Pro, new versions have been made available.
Updating the software to its latest version will rid the software of vulnerable certificates. Additionally, the invalidation by Windows November 27th of the former certificates fully eliminate the possibility to exploit the certificates.
The latest software versions are as follows:
Mac users and Windows users, that
… Read the rest
How to Uninstall the Kaseya Agent from Macs.
How to remove Kaseya Agent from Macs can be a challenge sometimes hopefully these few simple steps can assist you on removing the agent successfully.
- Applies to: All VSA’s. Download the following package and extract the zip contents.
KaseyaUninstall.pkg.zip
Download
- Run the KaseyaUninstall.pkg installer and choose to Install to the Macintosh Harddrive. Although this appears to be installing a product, it is actually running the uninstallation script for the Kaseya Agent. (NOTE: You may have to go into System Preferences > Security & Privacy > General Tab to allow the software to run. )
- Launch Terminal and run the “rm -rf /var/tmp/kpid” command.
- Remove the agent with root rights, i.e. in Terminal run the “sudo rm -rf /var/tmp/kpid” command and then provide the root password
- The Kaseya Agent and all associated files should now be removed.

Octobers HealthCare.gov Data Breach Exposed Individuals Personal Information
Octobers HealthCare.gov Data Breach Exposed Individuals Personal Information. The details that were surfaced about the data breach said that around 75,000 consumers were effected. Letters were sent out to affected people from the Centers for medicare and Medicaid Services and it said that the sensitive data exposed may have included Social Security numbers and a variety of other personal information including income, tax filing status, family relationships and immigration status. At least no Financial information was exposed this time around and none of the exposed data included patient diagnosis or treatments.
The system that was hacked was connected to the Healthcare.gov website. Anyone that used it to sign up for a new insurance plan were compromised, hackers targeted the behind-the-scenes system that insurance agents used to help customers directly enroll in their new plans, and not the consumer Healthcare.gov site itself.

Maintaining Security with Internet of Things
Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security. Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This day in age we have to maintain a due-care and due-diligence approach on security for all these IoT devices.
With this in mind, here are seven best practices on security for IoT:
- Use security gateways: They have the ability to inspect and audit the communications of your network.
- Use VLans: Put all IoT devices in a separate Vlan outside primary business network.
- Use strong authentication: Change those consumer devices default passwords!
- Disable services: Many devices use telnet, FTP and other risky services that may be exposed to the internet.
- Use secure protocols: