New vulnerabilities have recently been discovered with modern cpu's:
It would seem Intel are more prone to attack than AMD:
Meltdown and Spectre
Microsoft have released patches which will be available via Windows update. If like me yours hasn't arrived then download the standalone...
Original release date: December 01, 2016 | Last revised: December 14, 2016
Systems Affected
Microsoft Windows
Overview
“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
antivirus
avalanche
botnet
cybercrime
datatheft
denial of service
dhs
fast flux
fbi
financial institutions
impact
malware
os upgrade
password change
personal data
phishing
ransomware
remediation
security
windows
to all you netizens out there who've used urbanspoon.com in the past and currently using zomato.com … change passwords. purportedly, somethin' like 17million pw's stolen. according to zomato's updated blog:
not sure why this breach hasn't been listed on...
17 million
blog
breach
cybersecurity
datatheftdatabase
email addresses
hacked
india
news
password
privacy
recommendations
security
update
urbanspoon
user data
users
zomato
Original release date: December 01, 2016
Systems Affected
Microsoft Windows
Overview
“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
antivirus
avalanche
botnet
crimeware
cybersecurity
datatheft
denial of service
dhs
fast flux
fbi
fraud
malicious software
malware
phishing
ransomware
remediation
security updates
sensitive data
user safety
windows
Original release date: January 02, 2014 | Last revised: February 05, 2014
Systems Affected
Point of Sale Systems
Overview
Point of Sale Systems
When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale...
antivirus
best practices
consumer protection
credit card
cybersecurity
data security
datatheft
debit card
digital fraud
firewall
fraud prevention
identity theft
malware
network security
phishing
point of sale
pos systems
security best practices
skimming
track data
How do i totally remove pirrit suggestor? I don't remember visiting malicious website or downloading maclicious software into my computer and i'm having this green icon that revealed that my computer is infected with the adware called pirrit suggestor. When i checked my task manager, i found out...
A recent look at computer security shows online identity theft scams becoming easy for nefarious individuals who prey on those who lack essential security updates. Anyone experienced in the business need only to look at the serious manner of many, many businesses still running Windows XP without...
critical thinking
cyberbullying
cybercrime
cybercriminals
datatheft
europe
identity theft
maintenance costs
north america
online security
privacy
proactive measures
scam
security
security updates
telephony fraud
user awareness
user education
vulnerabilities
windows xp
A former college student has admitted taking part in a criminal scheme that used malware to steal and sell large databases of faculty and alumni, change grades, and siphon funds from other students' accounts.
He used thumbdrives with malware he created to compromise the machines. At first, I...
BOSTON (Reuters) – A computer security researcher has found a flaw in Microsoft Corp's widely used Internet Explorer browser that he said could let hackers steal credentials to access FaceBook, Twitter and other websites.
He calls the technique "cookiejacking."
"Any website. Any cookie...
browser issues
cookiejacking
credentials
cybersecurity
datatheft
explorer
hacking
internet explorer
malware
microsoft
online safety
privacy
researcher
security
social engineering
tech news
user interaction
vulnerability
web security
windows
The Deus Ex site and Eidos.com were defaced and taken down yesterday when a splinter group of the hacker organisation Anonymous broke through Square Enix security to steal the personal data of more than 80,000 registered users.
According to IRC chat logs of the hackers’ conversations...
anonymous
cyberattack
cybersecurity
datatheft
deus ex
eidos
exploit kit
hacker group
hacking
infighting
irc logs
malware
news
password change
personal data
resume theft
security breach
square enix
user data
video games
An unknown number of Link Removed after authorities discovered that hackers broke into one of the company's business partner's databases and stole information.
Computerworld quotes a McDonald's spokeswoman as saying:
We have been informed by one of our long-time business partners, Arc...
access denied
arc worldwide
customer data
cybersecurity
data breach
data security
datatheftdatabase
email company
hackers
incident
information security
mcdonald's
privacy
promotion
security
third party
The latest updates to Apple's Safari WebKit-based browser, versions 5.0.1 and 4.1.1, include several new features, such as enabling Safari Extensions and introducing the Safari Extensions Gallery,. They also address a number of security vulnerabilities. In total, the Safari updates close 15...
apple
autocomplete
browser
cross-site scripting
datatheft
heap overflow
information disclosure
internet explorer
macos
malware
memory issues
safari
security
svg
update
vulnerabilities
web security
webkit
windows xp
xss
A spyware application that surreptitiously scans chat logs and hard drives of unsuspecting Mac users has found its way onto three of the more popular download sites, security researchers said Tuesday.
Dubbed OSX/OpinionSpy, the spyware is distributed through software available on sites...
application
backdoor
browser
chat logs
datatheft
download sites
encryption
hard drive
intego
mac
malware
privacy
screensaver
security
spyware
surveillance
user data
white-hat hacker
windows
Criminal Hacker "Iceman" gets 13 years. Former "Security Researcher- Max Butler" has been sentenced to 13 years for hacking into a financial institutions and stealing credit card account numbers.
ATTACKS & ACTIVE EXPLOITS
Spam masquerading as a Microsoft Outlook security and stability update actually infects computers with ZBot, a Trojan horse program that steals sensitive information. The malware contains a list of financial institution and social networking sites; if users visit any...