For those out there that think Apple products are immune to the threats of viruses, malware, and spyware on the Internet, think again! NBC News reports on a “new wave of money-stealing malware” affecting Macs. Read the Article.
Author Archives: Joshua Liberman
Researchers at the University of Texas at Austin and Standford University have discovered there are some serious security vulnerabilities in many critical non-browser software packages such as Amazon’s EC2 Java library, Amazon’s and PayPal’s merchant SDKs, Trillian and AIM instant messaging software, popular integrated shopping cart software packages, Chase mobile banking software, and several Android applications and libraries. Read the following article to learn more. Read the Article.
Justice has been served. For the last five years the internet has been flooded with pop-ups that claimed your computer is infected. The following article is about the people that created this spyware and what their penalty is for doing so. Read the Article.
Some interesting news from the press (Windows Secrets in this case). I suppose that to be safe, we should share their sentiment and recommend you stay off Internet Explorer for now. We build all of our systems with Firefox installed, you should use it as your only browser. Read the Article.
These days you really need to know that you are purchasing your software from a trusted source. Microsoft has uncovered an operation that was selling counterfeit copies of Windows infected with harmful malware designed to target personal information to access and abuse their online services, including e-mail, social networking accounts and online bank accounts. Examples of this abuse include malware sending fake e-mails and social media posts to a victim’s family, friends and co-workers to scam them out of money, sell them dangerous counterfeit drugs, and infect their computers with malware. Click here to read this article on the Microsoft Technet.
Joshua Liberman has a warning for those who have their heads—and business applications—in the clouds. If cloud services or the connectivity to them are down, then so are your users. And since either a service or broadband Keeping Your Cloud Upfailure alone can bring productivity to a halt, the perceived availability rate even for well-managed cloud offerings can effectively be 99 percent or less. That translates to days of downtime a year. Read Article”
Here is an interesting article concerning cybercrime and what it costs the consumer. Computer security is one of Net Sciences specialties. Call us today if you are concerned with the level of security applied to your computer network so we can discuss what you can do to lock it down tighter. Read Article
Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.
We at Net Sciences recommend you train your employees to be ready for situations like this. Read Article
More and more people are utilizing Cloud services these days. Most think because they are now in the Cloud security is not an issue but this is not true. Here are some basic tips to secure your Cloud accounts. Read the article from ars technica.
Here is a good, concise summary of some basic steps to take to keep your network secure., coming directly from Microsoft. Please note that amongst the most important is user education. To your safe computing! Read Article