Are You Afraid Of Malware Ads?

Maybe you should be: https://blog.malwarebytes.org/exploits-2/2015/11/magnitude-exploit-kit-activity-increases-via-malvertising-attacks/ Also the .pw domain should be blocked – (Palau Pacific Island). The malware tries to insert itself into your computer while you are watching an ad. This is what should happen – where your anti-virus /anti-malware software protects you from these unseen attacks. Guess what is in the malware? Did … Read more

Patch Your Systems Except For Windows10

Microsoft patches – happen every 2nd Tuesday  (until this policy changes with Windows10) https://technet.microsoft.com/en-us/library/security/ms15-nov.aspx Ms15-112 through MS15-123 are various patches that need to be patched, just remember to not download Windows 10, or at least not to install it until you are ready. A full Windows Operating System upgrade is not so easy and actually … Read more

Website Files Ransomed – Not Just Personal Files

This image explains (from PCWorld Article)  The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if your computer was already Pwned (taken over somehow by criminal hackers) and then the criminal sold your computer access to the Ransomware criminal. That is … Read more

I’ll Give You $1k To Use Your Username & PW Over The Holidays

SecTor presentation by Kristin Lovejoy at http://2015.video.sector.ca/video/144598380 There are several business disrupters: The Cloud is changing how software is developed and thus how security should look at the cloud Agile Programming  methodology is changing not just how we develop software but also how we look at security.   Agile programming is reducing the time from … Read more

Torte Botnet Infected 83k WordPress Hosting Servers

  It is an interesting document from the stateoftheinternet.com https://www.stateoftheinternet.com/downloads/pdfs/SpamBot-Investigation-whitepaper-R3.pdf This botnet had 83,000 unique infections (which include webservers running all operating systems) And on page 6 where the researchers revealed the botnet: Using these logged responses, we found that the size of this botnet is fairly large. Over 1,400,000 (including duplicates from the c2) probe requests … Read more