Facebook working with Kaspersky to improve the online security of its users

Facebook working with Kaspersky, F-Secure, ESET and Trend Micro to detect and clean the malware from its user’s machine. Facebook announced today that its working with Kaspersky and other security firms like ESET, F-Secure and Trend Micro to detect and remove malware from Facebook users’ computers. Trevor Pottinger, a Facebook security engineer said: Thanks to…

Google Admin Console has a Security Flaw

Summary: Google Admin Console has a Security Flaw which can be used by attackers to claim domains and send out spoof emails. As reported by Security Week, Patrik Fehrenbach and Behrouz Sadeghipour found a security flaw in Google Admin Console to gain temporary ownership of any domain. Google Admin Console is actually a web platform…

Lenovo installing Adware – Superfish – on new Computers and Laptops

Lenovo installing adware

Lenovo has been installing an adware named Superfish onto new computers. The adware gets installed automatically when the computer is started for the first time. The adware injects third-party ads on Google searches and websites without the user’s permission.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

IPv6 Information and Security Issues

IPv6 Information and Security Issues

Abstract
Internet Protocol IP version 6 (IPv6) was developed to address the growing depletion of IP version 4 addresses (IPv4). IPv6 also provides richer feature set and better security than IPv4. However, the adoption of the new protocol in organizations has been slowed down by inherent security issues. The transition from IPv4 to IPv6 is faced with many security challenges as well. These issues threaten the mainstream adoption of the protocol. The paper seeks to explore the security issues of IPv6 and the research community’s response to those challenges.

Introduction
The rapid adoption of the Internet in the global economy has resulted in a rapid exhaustion of IP addresses. Also contribution to this exhaustion of the IP addresses is the range of devices that are now using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for communication. These devices include cell phones, home appliances, wireless gadgets, vehicles, and gaming devices. There is many developing countries and China who report that lack of adequate IP addresses is hampering their development. Other concerns with IPv4 are that its configuration nature is leading to problem where router table entries were getting too large, and that the protocol has limited security. In response to the growing need for more IP addresses the Internet Engineering Task Force (IETF) established IP version 6 (IPv6) to provide a bigger address space.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

Microsoft will collect data using keylogger from Windows 10 Preview Users

Microsoft will collect data using keylogger from Windows 10 Preview Users.

Microsoft announced its next release, Windows 10 which was previously codenamed Threshold on 30th September 2014. Windows 10 Technical Preview can be downloaded and used for free.

But, the download page clearly states that – “Microsoft will collect data about your installation and use of Windows Technical Preview to help us improve our products and services under About your Privacy section.

Microsoft’s Privacy Statement states –

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

banking-malware

New Banking Malware EMOTET steals data using network sniffers

Trend Micro finds new banking malware, named EMOTET. Its steals sensitive data using network sniffers. The malware intercepts and logs outgoing traffic to check for sensitive data from the infected machine.

Most effected users are from Europe, Middle East and Africa region but there are victims from Asia-Pacific region and North America region as well.

The malware uses network sniffing technique to collect data from the infected machine and this makes the detection of the malware more difficult. Cybercriminals are spreading the malware through spam emails apparently related to money transfers or shipping invoices. In both cases, users are enticed to click on a link, which will download the malware to the infected machine.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

Free Email Updates
Get the latest content first.
100% Privacy Guaranteed. We don't spam.