Home » Archive by category "Security" (Page 13)

Facebook Children Charity Scam

Cybercriminals have developed a custom piece of malware that injects itself into your Facebook session and prompts you to donate to a charity for sick children. The scammers’ goal is to make off with your personal data, especially your credit card number.  Security researchers have...
Read More

Conficker Still Affected Millions Of Computers And Businesses

Microsoft released a forth quarter security report stating that the worm Conficker is still infecting 1.7 million computers and work stations.   This news comes more than three years after the worm was first detected.  The rate of infection has increased despite widespread availability of tools to fight...
Read More

Oracle Zero Day Vulnerability Still Not Patched

Oracle Zero Day Vulnerability Still Not Patched after April’s patch release with had 88 patches.  The vulnerability allows an attacker to perform a man in the middle attack and capture information exchanged between clients and databases.  The vulnerability was reported in 2008 and has believed to been around...
Read More

DnsChanger Trojan

DNSChanger is a trojan that will change the infected system’s Domain Name Server (DNS) settings, in order to divert traffic to unsolicited, and potentially illegal sites. This Trojan is designed to change the ‘NameServer’ Registry key value to a custom IP address. This IP address...
Read More

Marriott Wireless Security Issues

Marriott has says it stopped Ad Service hidden in free wireless.  The free wireless connection inserted lines of code for serving special ads into every Web page a guest visited. The Marriott’s corporate headquarters said it has investigated the situation and disabled this feature at...
Read More

Network Users Are The Biggest Security Issues

The fact is that the biggest security threat to an organization is there users.  In a 2006 survey called Information Security Breaches they found that 32% of Information Security attacks originated from internal employees while 28% came from ex-employees and partners. Experts in Europe and...
Read More

Creating Back Links For SEO

Any successful off-page SEO campaign begins with building relevant, high authority back links to your website. Once built, the back links will provide you with two main benefits: relevant traffic and higher ranking in search engines.  This done threw what SEO’s call link juice.  The best types...
Read More

VMware Source Code Stolen

VMware on Tuesday announced that a single 300 megabyte file was copied from there network.  The file was from the companies ESX server hyper visor source code.  The code was released online and it held out the possibility that more proprietary files could be leaked...
Read More

Mac Flashback Trojan Began With WordPress Blogs

The whole Apple Flashback Trojan started with compromised word press blog.  Kaspersky labs confirms this the virus was spread threw a vulnerability in java.  When clicking on the wordpress link or post executed the silent malicious code.  This is the same thing that happened at...
Read More

Benefits of Single Sign On SSO

Benefits Reduces phishing issues Reducing password issues due to different user name and password combinations Reducing time spent re-entering passwords for the same identity Can support conventional authentication such as Windows  / Linux and Mac credentials Reducing IT costs due to lower number of IT...
Read More

Latest

tech support 10 Tools Every Computer Tech Needs
skype Using Skype To Replace Landline Phone
riff Bеѕt VR Apps and Games for Meditation
google pixel The World Is On Your Palm Now, Go Mobile
security lock Top In-Demand Skills For Cloud Computing

Tech Geek Today

Tech Geek Today

MonTueWedThuFriSatSun
      1
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       

Subscribe To The Technology Geek

Archives