There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey premium counterparts of these freebies, many are full-blown utilities. A few important categories include threat intelligence tools, tools to build security in during the development stage, penetration testers, and forensics tools. (click on the picture above for the full story)
Nervous about your privacy online? We’ve asked data and analytics experts how they protect their own privacy. Here’s what they said.
How do you protect your personal information online these days, especially in the wake of the recent Facebook and Cambridge Analytica news about a huge data leak of consumer data?
Do you turn on Amazon Alexa’s microphones only when you need her help? Do you keep a Post-it note over your webcam? Have you turned off the microphone on your mobile phone? Will you delete your Facebook account?
Click on picture for article.
More cyber security freebies than you knew existed.
Amid all the fear and hype generated over the past few days as a result of Wikileaks and its precipitous Vault 7 dump, one fact was crystal clear: People have no idea what hacking an Android smartphone or an iPhone means or what it entails.
Click on the “Hacking Detected” picture for the full article.
“. . . National Taxpayer Advocate Nina Olson expressed concerns that the new features would block honest taxpayers. The IRS has now confirmed that the revamped tool requires an email address, multifactor authentication via text messages and specific financial information such as credit card or loan numbers”
Click on picture for full article.
“The hope of an anti-malware program that can perfectly detect malware and malicious hacking is pure folly. Keep an eye out for the common signs and symptoms of your computer being hacked as outlined above. And if you are risk-adverse, as I am, always perform a complete computer restore with the event of a breach. Because once your computer has been compromised, the bad guys can do anything and hide anywhere.”
Sure sign of system compromise No. 1:
Fake antivirus messages
Sure sign of system compromise No. 2:
Unwanted browser toolbars
Sure sign of system compromise No. 3:
Redirected Internet searches
Sure sign of system compromise No. 4:
Frequent random popups
Sure sign of system compromise No. 5:
Your friends receive fake emails from your email account
Sure sign of system compromise No. 6:
Your online passwords suddenly change
Sure sign of system compromise No. 7:
Unexpected software installs
Sure sign of system compromise No. 8:
Your mouse moves between programs and makes correct selections
Sure sign of system compromise No. 9:
Your antimalware software, Task Manager, or Registry Editor is disabled and can’t be restarted
Sure sign of system compromise No. 10:
Your bank account is missing money
Sure sign of system compromise No. 11:
You get calls from stores about nonpayment of shipped goods
(Click on CSO logo above for the ‘full’ article.)
Those who can create malware, will create malware — no matter how sneaky they have to be to do so. The latest craze is called pileup malware. The gist of this is a seemingly innocent and harmless piece of software is installed on your device (even with the stamp of approval from your malware scanner). The initial install requires little to no permissions, so it looks perfectly safe. The problem comes when it’s time to update that software. Without needing your approval, the software will upgrade its own permissions, giving it much more access than it originally had — there’s the pileup (and the rub). You now have an official piece of harmful malware on your machine.