Tags » Computer Security

Can Mark Cuban's Cyber Dust Help Protect Proprietary Information?

Cyber Dust is an app that lets users¬†send text messages without leaving a digital fingerprint. All texts “self destruct” within 30 seconds, after which they are not stored anywhere — including on Cyber Dust’s servers. 350 more words

Trade Secrets

Apple documents previously undocumented services that can leak user data

Apple documents previously undocumented services that can leak user data | Ars Technica.

Wow! Huge bombshell! When I first heard that a security researcher revealed that all iOS devices had secret services which served as a backdoor to YOUR data running; I took it with a grain of salt. 179 more words

Link

Computer Scam!

I spent yesterday helping a client who had received a telephone call, supposedly from Microsoft – Microsoft has NOTHING to do with this kind of thing – claiming that her computer had a virus and was leaking information to the internet. 499 more words

Other

CompSec: The Other CIA

Computers are essentially the means to data storage and processing. In that sense, data has value. Never mind theories about money and store of value; data is its own kind of thing. 603 more words

Computers

START >> RUN

-Accessibility Controls access.cpl

-Add Hardware Wizard hdwwiz.cpl

-Add/Remove Programs appwiz.cpl

-Administrative Tools control.exe admintools

-Automatic Updates wuaucpl.cpl

-Bluetooth Transfer Wizard fsquirt

-Calculator calc Certificate Manager certmgr.msc… 405 more words

How To

Author: SecurityXploded
Date: 05/17/2014 06:58 AM
Size: 1.64 MB
License: Bundleware
Requires: Win 8 / Win 7 / Vista/ XP
Downloads: 13402 times

Download@Authors Site… 235 more words

How To

Linux and FreeBSD Servers Infected to Function like a Windows Bot

July 18th, 2014, 14:46 GMT · By Ionut Ilascu

Again another reason to use the new Web component on the managed services RMM (MspManagedNetwork)

Security researchers have found a new malware, dubbed Mayhem, that targets Linux and FreeBSD web servers in order to turn them into bots, without requiring root access. 482 more words

Security News World Wide