10 TIPS FOR SECURING YOUR SMARTPHONE
This month is National Cyber Security Awareness Month. Each week within October will take on adifferent theme, with this week's being 'Mobile'. So, with that in mind, we thought we'd prepare some tips to help keep your smartphone safe.
Top 5 threat protection best practices
Trend Micro predicts that there may be as many as a million Android malware threats by the end of the 2014. What's going on here? Make no mistake about it, there are REAL ANDROID MALWARE PROBLEMS. (Credit: Juniper Networks) Part of it is that Android is being targeted because it's extremely popular. The research company Canalys found that Android is running on 59.5 percent of all smart mobile devices that were shipped in the first quarter of 2013.
YES, YOUR SMARTPHONE CAMERA CAN BE USED TO SPY ON YOU...
Yes, smartphone cameras can be used to spy on you - if you're not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the screen is turned off - a pretty handy tool for a spy or a creepy stalker.
Free Security Scans - Find threats your antivirus missed
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data,even on your mobile device and Mac. You can't ignore your the safety of your devices any longer: you need to recognize and stop these threats before they do MORE harm.
MALWARE ATTACKS ON ANDROID DEVICES SEE 600% INCREASE IN 2013 / 2014
Malware targeting the Android platform is exploding, with a 600 percent increase in just the past 12 months. That statistic is among the findings of a new study--Mobile Security Threat Report--unveiled last week at the Mobile World Congress in Barcelona, Spain.
Monday, October 30, 2017
A Hacker's Tool Kit - Cybercrime is growing ever more pervasive—and costly.
Tuesday, December 6, 2016
Check if you were hit by the massive 'Avalanche' cybercrime ring
Wednesday, November 30, 2016
‘AVALANCHE’ NETWORK DISMANTLED IN INTERNATIONAL CYBER OPERATION
The global effort to take down this network involved the crucial support of prosecutors and investigators from 30 countries. As a result, 5 individuals were arrested, 37 premises were searched, and 39 servers were seized. Victims of malware infections were identified in over 180 countries. Also, 221 servers were put offline through abuse notifications sent to the hosting providers. The operation marks the largest-ever use of sinkholing[1] to combat botnet[2] infrastructures and is unprecedented in its scale, with over 800 000 domains seized, sinkholed or blocked.
- www.bsi-fuer-buerger.de/botnetz and www.bsi-fuer-buerger.de/avalanche, in German;
- www.bsi-fuer-buerger.de/EN/botnetz and www.bsi-fuer-buerger.de/EN/avalanche, in English;
- https://us-cert.gov/avalanche;
- www.nationalcrimeagency.gov.uk/news/962-avalanche-takedown;
- www.getsafeonline.org/news/avalanche;
- www.actionfraud.police.uk/news-police-takedown-computer-network-used-to-infect-millions-of-devices-dec16;
- www.cyberaware.gov.uk/blog
Thursday, April 9, 2015
Facts About Remote Access Trojans (RATs) vs AlienSpy
Monday, June 27, 2011
Top 5 threat protection best practices
1. Control outbound content as well as inbound.
2. To protect against malware, block access to Web ports and scan traffic.
3. Educate users about the dangers and safe use of social networking Web sites.
4. Encrypt sensitive data in use, at rest, and in motion.
5. Restrict use of removable storage devices.
US Sophos Antivirus - Learn more!
Click Here
Data Leakage for Dummies
Request your free copy now - HERE
- Create strategies for data-risk management
- Prevent data loss from your computers and devices
- Protect your network from data leakage
Click Here
Glossary of Terms
- Adware
- Access 97 macro virus
- AppleScript Worm
- Application
- AutoCAD LISP (AutoLISP) virus
- Batch file worm
- BIOS
- Bluetooth
- Chain letter
- CMOS settings
- Companion virus
- Controlled application
- Controlled device
- Corel Script virus
- Dialer
- Distributed Computing
- DOS Boot Sector virus
- DOS executable file virus
- DOS worm
- Dropped files
- Dropper
- Excel formula virus
- Excel macro virus
- Excel 97 macro virus
- Exploit
- False alarm
- -Fam and -Gen
- Hacking tool
- HIPS
- Java virus
- JavaScript virus
- JavaScript worm
- Joke
- Junk
- Keystroke Logger
- Linux executable file virus
- Linux worm
- Macintosh file virus
- Macintosh worm
- Macromedia Flash infector
- Malicious behavior
- Malware
- MapBasic program
- Master Boot Sector virus
- Mid infecting
- mIRC or pIRCH script worm
- Misunderstanding
- MSH virus
- MMS
- Name
- Office 97 macro virus
- PalmOS based executable virus
- PHP Script virus
- PowerPoint 97 macro virus
- Prefix
- Potentially unwanted application (PUA)
- Publisher macro virus
- Registry virus
- Remote administration tool
- Rootkit
- Scam
- Scare
- SMS
- Spyware
- Spyware Trojan
- Spyware Worm
- Suffix
- Suspicious behavior
- Suspicious file
- Symbian bluetooth worm
- System monitor
- Test file
- Trojan
- Trusted relay
- Unix worm
- Unspecified PUA
- Virus
- Virus hoax
- Visual Basic Script virus
- Visual Basic Script worm
- VoIP (Voice Over IP)
- Wi-Fi
- Win16 executable file virus
- Win32 executable file virus
- Win32 worm
- Windows 95 executable file virus
- Windows 98 executable file virus
- Windows NT executable file virus
- Windows 2000 executable file virus
- Word macro virus
- Word 97 macro Trojan
- Word 97 macro virus
- Word 97 macro worm
- Word 2001 macro virus
- Worm
- Windows Scripting Host virus
- Zero-day
Click Here