There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision makers to purchase the pricey premium counterparts of these freebies, many are full-blown utilities. A few important categories include threat intelligence tools, tools to build security in during the development stage, penetration testers, and forensics tools. (click on the picture above for the full story)
WannaCry took down wide swaths of the internet over the weekend, then disappeared. Here’s what you need to know, without the hype.
(click on the picture for the full article.)
So I don’t need to worry about it right now?
Wrong. Very wrong. This is one of those rare times when the Windows sky is falling. We already have reports from Matt Suiche of a new WannaCry variant that’s been sinkholed with 10,000 infections logged. The clones are coming, and many of them won’t be easy to stop. You have to get your Windows PC patched now.
More cyber security freebies than you knew existed.
Like it or not, your PC is susceptible to malware. This page will teach you how to locate the bad stuff, then remove it from your system.
Click on the Skull and Cross Bones to Sniff out and kick out Windows malware for free.
For videos on how Sysinternals Process Explorer works click on the YouTube link below.
For a video for how VirusTotal click on the video below.
New Android malware poses as popular game, but enlists phones into botnet
The malware has evaded Google Play’s malware scans for weeks.
At least five instances of the app have so far been able to evade Google Play’s malware scans for almost a month, since it was first submitted to the app store.
When the user installs the app, it will automatically join a botnet — a network of devices controlled by an attacker — which disguise ad clicks to generate money
On Monday, security researchers found an issue so scary they called it “Heartbleed.” It’s a flaw in an encryption tool used by about two-thirds of Internet servers that could be exploited to leak your login names and passwords.
Click on graphic above to go to full story or follow this link:
Those who can create malware, will create malware — no matter how sneaky they have to be to do so. The latest craze is called pileup malware. The gist of this is a seemingly innocent and harmless piece of software is installed on your device (even with the stamp of approval from your malware scanner). The initial install requires little to no permissions, so it looks perfectly safe. The problem comes when it’s time to update that software. Without needing your approval, the software will upgrade its own permissions, giving it much more access than it originally had — there’s the pileup (and the rub). You now have an official piece of harmful malware on your machine.