Anonymous – Global Cyber War I (Emergency Video PR) In a thread of hack events from the Anonymous group, the most recent target has been Monsanto.com. Anonymous, which briefly knocked the FBI and Justice Department websites offline as well as Music Industry websites in retaliation for the US shutdown of…
ProtectMyID: Sudden changes in behavior are the most common sign your computer may be infected with #spyware. DEFEND yourself. http://t.co/1zm6Vmh6
ProtectMyID: Sudden changes in behavior are the most common sign your computer may be infected with #spyware. DEFEND yourself. http://t.co/1zm6Vmh6 View full post on Twitter / ProtectMyID View full post on National Cyber Security
Top 10 list of common scams unveiled by BBB
Scammers are finding new ways to prey on unwary, according to the Better Business Bureau. View full post on email spoofing – Yahoo! News Search Results View full post on National Cyber Security
The FBI Releases a List of Common Passwords
This report, which is based upon information from law enforcement and complaints submitted to the IC3, details recent cyber crime trends, new twists to previously-existing cyber scams, and announcements. Popular Passwords An Internet site who manages passwords recently posted an article pertaining to the lack of secure passwords being utilized…
What Kind of Linux User Are You? – A Reflection of the Common Types of Linux Users
Alright, the other day I read an article entiled 5 types of very annoying Linux users, and the article is very true. The article is a reflection of a certain Linux user who observed that there are many kinds of Linux users and that there are five types of Linux users…
ProtectMyID: #Truesday: The most common type of identity theft is low-tech theft (stolen wallets, checkbooks, and paper financial statements). T or F?
ProtectMyID: #Truesday: The most common type of identity theft is low-tech theft (stolen wallets, checkbooks, and paper financial statements). T or F? View full post on Twitter / ProtectMyID View full post on National Cyber Security
Demystifying the Common Methods of DDoS / DoS Attacks
“Tango Down!!!” DDoS (distributed denial-of-service) or DoS (denial-of-service) attack, the act of putting a computer resource, server or network down or unavailable. In fact the CIA Website was once took down by a massive DDoS Attack. These kind of attacks are considered lame but it actually gives your website a…
11.49.5 Dovecot SSL Certificate “Common Name” Field Validation Security Bypass
CVEs: CVE: Not Available Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security
Use common sense when reviewing your email
View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime