Wednesday, December 30, 2015

Secure Hunter Wonderful New Year 2016

Dear Customer,

Thank you for taking part in Secure Hunter Anti-Malware growthSecure Hunter Wonderful New Year 2016

 

We sincerely appreciate your taking time to provide your comments and feedback.

We hope you appreciate this time of the year as much as we do.

We hope you will enjoy this holiday season and we take this opportunity to extend to you and every member of your family our warmest wishes for the coming.May your Christmas and Holiday season be filled with happiness and joy, followed by a most wonderful

New Year 2016.

Secure Hunter Happy New Year

Sincerely,

Haim A.CEO

www.securehunter.com

The post Secure Hunter Wonderful New Year 2016 appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1YPiSTc
Secure Hunter

Wednesday, December 16, 2015

‘Secure Hunter’ Announces Release Of Secure Hunter Anti-Malware PRO

 

The internet has, in the recent ten years or so, become this gigantic world in itself and there are people who look to spread malware and viruses all over the internet and its users – just for their personal pleasure. Sad as it is, one can never be too sure about the safety of a particular site.

There is not much good Anti-Malware software in the market but customers can rest assured that the All-new Secure Hunter Anti-Malware software is amongst the best services in the market right now.

Sad as it is, Antivirus’ maker has declared that Antivirus is dead and can never be revived.

Secure_Hunter_Anti-Malware_Pro

In today’s day and age, it is necessary to download additional security measures since it is impossible for PC-installed applications to catch viruses. So, the Anti-Malware software will be the best complement to the existing anti-virus software in the computer.

Since Anti-Malware software are online, they are frequently updated and it is made sure that they know how to tackle the latest bugs. Secure Hunter is the perfect Anti-Malware software as it will be frequently updated. The main priority of the Secure Hunter team is to keep the customer’s PC secured and to do that, the makers are even willing to sell their product free of charge!

The Anti-Malware software will work ’round the clock to ensure complete protection when the users are using the internet. Secure Hunter Anti-Malware software can be purchased in two different packages – the free package, the PRO package and there are other free programs available too.

Through the scan, one will instantly be able to see which malware is hunting up the computer and the users will be immediately able to eliminate the damaging content. It also protects the user from identity theft by hiding the user’s true identity when they are online.

It can do a hidden scan and a complete scan and is available instantly after it has been downloaded initially.

The best part about the experience is that Secure Hunter Anti-Malware can be downloaded for free if people register now. Customers are advised to register and then wait for the release of the software and to frequently go through the website’s Beta page to look for updates.

Download Today !

About us:

Secure hunter has been operating since 2005 and has offered up great Web solutions and protection software for its customers.

 

 

The post ‘Secure Hunter’ Announces Release Of Secure Hunter Anti-Malware PRO appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1MhwCcW
Secure Hunter

Wednesday, December 9, 2015

10 Safety Products for Security On-the-Go

10 SAFETY & SECURITY TIPS ON-THE-GO
Smartphones, tablets and other mobile devices carry more personal data than ever before, which means you should take certain precautions tosafeguard the information in the event of a lost or stolen device.
10 Security Precautions You Should Take on Every Device…
1. Keep a clean machine.
Running the most recent versions of your mobile operating system,security software, apps and Web
browsers is the best defense against malware, viruses and other online threats.

2. Don’t lose track of your device.
Avoid putting down your devices in public places or in a taxi.

The small size and portability make them easy to lose or steal.  A brightly colored
case or sticker on your device will increase the chances you won’t leave it behind.

3. Protect your personal information.
When using a public, unsecured wireless connection, avoid using apps or websites that require you to enter a password.

This applies to the wireless networks provided on many airlines, as well as Wi-Fi connections in places like coffee
shops, hotels, airports and libraries.

4. Connect with care.
Switch off your Wi-Fi and Bluetooth connections when not in use to help prevent malicious parties from connecting to your device without
your knowledge.

If you’re banking or shopping, remember, a 3G or 4G connection is safer than an unsecured Wi-Fi connection.

5. Secure your device.
Activate key-lock features and/ or use a passcode. If your device
allows for a complex password, take advantage of the feature.

6. Back it up.
Sync your contacts, photos, videos and other mobile device data with
another device or cloud service on a weekly basis.

7. Provide contact info.
Do an Internet search for the best way to add your name and an alternative contact number to
your lockscreen, in case a Good Samaritan finds your device.

(Don’t use highly personal information,such as your home address.)

8. Activate locator apps.
Many manufacturers have free apps you can download to help you locate your device in the event
it gets lost or stolen.

These apps often allow you to remotely lock the device or wipe data.

9. Think before you app.
Only download apps from reputable sources, like verified app stores. Understand what information (i.e., location, social
networking profiles, etc.) the app would access and share before you download.

10. Record the serial number.
By dialing these five characters – *#06# – you can access your phone’s unique, 15-digit International Mobile Equipment
Identity (IMEI) number.

Write this number down and store in a secure location, so you can report it if your phone goes missing.

The post 10 Safety Products for Security On-the-Go appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1lPjmH7
Secure Hunter

Security Tips to Protect Your Business

Privacy Tips for Businesses

Transparency Builds Trust

 

  • Be open and honest about how you collect, use and share consumers’ personal information. Think about how the consumer may expect their data to be used. Privacy practices that are perceived as bad or “creepy” can harm your company’s reputation.

 

  • True transparency requires clear communication through multiple channels. Don’t count on your privacy notice as your only tool to educate consumers about your data practices.

 

  • Communicate clearly and concisely to the public about what privacy means to your organization and steps you take to achieve and maintain privacy. Build trust by doing what you say you will do.

 

  • Explain to all employees what privacy means to the organization and the role they have in making sure privacy is achieved and maintained. Designate and empower a privacy officer to take responsibility for ensuring that your privacy promises are kept.

 

Be Aware of What’s Being Shared

 

  • Be open and honest about how you collect, use and share personal information. Any options you provide consumers to control their personal information should be easy to use and effective.

 

  • Educate employees about the value and impact of protecting consumer and employee information as well as their role in keeping it safe.

 

  • Conduct due diligence and maintain oversight of partners and vendors. You are also responsible for how they collect and use personal information.

 

Personal information is like money. Respect it. Protect it.

 

  • Consumers’ personal information may be valuable for your business, but it’s also something they value.

 

  • Follow reasonable security measures to keep individuals’ personal information safe from inappropriate and unauthorized access.

 

  • Collect and use personal information only if it is needed for the purposes you have stated or required by law. Dispose of personal information safely and securely when it is no longer needed.

The post Security Tips to Protect Your Business appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Y2s6Wu
Secure Hunter

Security Tips for Buying & Selling Major Items Online

Safety & Security Tips for Buying & Selling Major Items Online

 

Buying or selling a high ticket item like a car, boat, or jewelry online can be risky. Many online classifieds do little to protect consumers from fraud simply because they can’t verify the item exists or whether it’s actually owned by the ad creator.

STOP. THINK. CONNECT. teamed up with Escrow.com and Better Business Bureau to create these  tips for buying and selling major items online:

 

 

  • Protect Yourself (and Your Money!): An online escrow service can help keep buyers and sellers safe from fraud. When you use an online escrow service, they collect the money from the buyer and hold it until the buyer and seller agree that the terms of the sale have been met. Once both parties are satisfied, the online escrow service sends the payment to the seller.

 

 

  • Think Before You Act: Be wary of communication that implores you to act immediately, offers something that looks too good to be true, or asks for personal information like your Social Security number or bank routing number.

 

 

  • Do Your Research Before Sending Money: Do your due diligence and find a licensed, bonded, accredited, audited online escrow company to act as trusted third‐party that collects, holds and only disperses funds when both buyers and sellers are satisfied. Check with Better Business Bureau to see what others have to say about a company. A good overview of the laws and licensing of an online escrow service can be found here:

http://ift.tt/1IEO68i

 

 

  • Beware of Fraud!: Be aware that there are a growing number of fraudulent escrow services that steal money, merchandise, and identities from unsuspecting consumers. The existence of such sites undermines the reputation of legitimate online escrow services.

 

 

  • Protect Yourself from Identity Theft: Never disclose financial or personal information like your Social Security number, credit card number, or bank account information until you have verified that the online escrow company you are using is properly licensed.

 

  • Keep a Paper Trail: Print and save records of your communication with the seller, product description, price, terms of the sale, etc.

 

  • Help Report Cybercrime: If you think you are a victim of a fraudulent escrow service, you should report the website to the FBI’s Internet Crime Complaint Center (ic3.gov) and create an identity theft report with the Federal Trade Commission (http://ift.tt/1Y2s6Gb). If you sent money via ACH, wire transfer, or check, you should immediately contact your financial institution to see if a hold can be put on the transfer of the funds and to see what other steps may be necessary to protect your account. You should also ask your financial institution to investigate and report the fraud.

Read More at :

STOP. THINK. CONNECT

The post Security Tips for Buying & Selling Major Items Online appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1IEO8wP
Secure Hunter

What are Botnets ?

What are botnets?

Botnets are generally networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by cybercriminals, usually for financial gain or to launch attacks on website or networks. Botnets may infect and use laptops, desktops, servers, routers, smartphones, or any other network equipment to conduct malicious activity.

 

All computers connected to the Internet are susceptible to malware infections. The malware employed by botnets can be surreptitiously installed on your computer. If you open an email attachment or visit a website that is distributing malware, your computer may become infected and be turned into a “bot” (short for “robot”). If your computer becomes part of a botnet, it may wait for instructions from the “command and control” (also sometimes known as “C2” or “C&C”) computers or perform automated tasks, such as keystroke monitoring, without your knowledge. Cybercriminals like botnets because botnets give the criminal control of thousands of computers at once, and they help to hide the cybercriminal’s identity.

 

How your computer acts when infected is dependent on what the cybercriminals are trying to accomplish. Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming, and malware distribution. Bots can also be

used to launch attacks on websites and networks, which as are sometimes referred to as Distributed Denial

of Service Attacks or DDoS.

 

How do you know if your computer is part of a botnet?

Botnets can be difficult to detect. In the past, sluggish performance and annoying advertisements were signs your computer was infected. These days, there may be no outward signs you have malware. Criminals try to hide their malware in an effort to infect as many computers as possible.

 

Internet service providers are beginning to take a proactive approach by issuing notices to customers when botnet traffic has been detected from their devices. You may have to opt in for the service. If you receive such a notice, confirm the legitimacy of the notice, then use the tools offered or take the steps indicated to check your device(s) and eliminate the malware. For more information, contact your Internet Service Provider.

 

Are botnets illegal?

The installation of malware on the victim’s computer, without the victim’s consent, to build the botnet is illegal and the activity the botnet conducts may be illegal.

 

How can you prevent botnets?

While 100 percent prevention is not possible, there are a few things you can do to dramatically reduce your computer’s risk of infection, starting with these tips from STOP. THINK. CONNECT., the national cybersecurity education and awareness campaign:

 

Keep a Clean Machine

 

 

  • Keep software current: Having the latest operating system, software, anti‐virus protection, web browsers and apps are the best defenses against viruses, malware, and other online threats.
  • Enable automatic updates: Most security software will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  • Protect all Internet‐connected devices: Remember smartphones, tablets, gaming systems and

other devices can be infected with viruses and malware, too. Protect them like you would your computer, including updating apps and operating systems.

  • Plug & scan: USB sticks, thumb drives, CDs, DVDs and other external media can be infected by viruses and malware. Use your security software to scan them.

 

 

Connect With Care

 

  • When in doubt, throw it out: Delete any online communications (i.e., texts, emails, social media posts) that look suspicious, even if you think you know the source.
  • Get savvy about Wi‐Fi hotspots: When using a public or unsecured wireless connection, avoid using

sites and apps that require personal information like log‐ins.

  • Be cautious about “scareware:”Cybercriminals have used fear to compromise your computer and to steal your personal information, which may include credit card information and banking login credentials. If you get security notices saying you are infected and need to purchase software, these could very well be attempts to compromise your device.

 

If You Think You’re Infected

If you are notified, become aware, or suspect your computer has become a bot, take immediate steps to remove malware. You can find a list of free botnet detection and remediation resources at

http://ift.tt/1maM6us.

Learn about industry efforts to fight botnets at http://ift.tt/1YZ1Zly.

STOP. THINK. CONNECT

The post What are Botnets ? appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1maM6ut
Secure Hunter

Online Gaming Tips for Parents

Online Gaming Tips for Parents

 

Online gaming often involves interaction with other computers and live players. It’s fun for kids to connect with others, but they also need to understand how to protect themselves so gaming remains an enjoyable activity. Though some parents might like to prohibit game use, the reality is that most young people have access to computers and online games, if not at home, then at friends’ houses and possibly at school. As a parent or guardian, it’s important to understand what the risks are and how to help your child navigate the gaming world. The first step is STOP. THINK. CONNECT.

 

Keep a Clean Machine.

Gaming systems are computers with software that needs to be kept up‐to‐date (just like your PC, laptop, phone or tablet). Security protections are built‐in and updated on a regular basis. Take time to make sure all the online gaming devices in your house have the latest protections.

 

  • Keep security software current: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
  • Protect all devices that connect to the Internet: Computers, smart phones, gaming systems, and other web‐

enabled devices all need protection from viruses and malware.

 

Protect Your Child’s Personal Information.

Talk to your children about what constitutes personal information. Children need to know what is appropriate to share and what is not. Names, birthdays, age, geographic location, contact information, and photos with identifiable information all count as personal information. While it’s fun to engage in games with players from around the globe, children should retain a level of anonymity to protect themselves from those who might not have the best intentions.

 

  • Secure your kids’ accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you play games on that site.
  • Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
  • Help your kids own their online presence: When available, set their privacy and security settings on websites to your comfort level for information sharing. Remind them that it’s ok to limit how and with whom they share information.
  • Have your kids use an avatar rather than an actual picture of themselves.
  • Use voice chat safely or not at all. If your kids play a game that features live voice chat, make sure they disguise their voice. If the game does not have this feature, do not let them use voice chat.

 

Be Web Wise.

Stay informed of the latest Internet developments, know what to do if something goes wrong and be aware of what your kids are doing online.

 

  • Stay current. Keep pace with new ways to stay safe online. Check trusted websites for the latest information, share with your children, and encourage them to be web wise.

 

 

  • Think before you act: Teach your kids to be wary of communication that implores them to act immediately, offers something that sounds too good to be true, or asks for personal information. They should not accept downloads from strangers. This includes cheat programs that may claim to help them perform better in the game, but really could be carrying malware.
  • Know how to block and/or report a cyberbully. Keep a record of the conversation if they are being harassed and encourage them not to engage the bully.
  • Read and understand the ratings for the games that your children are playing. Some game sites have multiple games with different ratings, so check all of them.
  • Participate in the game with your kids.

 

Be a Good Online Citizen.

It is easy to say things from behind a computer screen that you would never say face to face. Remind your kids to maintain the same level of courtesy online as they would in the real world.

 

  • Safer for me more secure for all: What you and your kids do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.
  • Be respectful of other players. Playing games has always been a ripe setting for engaging in conversation that can provoke other players. Online gaming should be a place where good sportsmanship is practiced.

 

STOP. Before you use the Internet, take time to understand the risks and learn how to spot potential problems.

THINK. Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family’s.

CONNECT. Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.

 

Additional resources:

Read More At :

STOP. THINK. CONNECT.

 

The post Online Gaming Tips for Parents appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1YZ1YOP
Secure Hunter

Security Tips for Parents

Security Tips for Parents & Internet Safety

 

The Internet is a wonderful place for learning and entertainment, but like the world around us, it can pose dangers if precautions are not taken. Allowing free access puts your child, your computer and your personal data at risk. Help to instill good judgment in your children by encouraging them to take some common sense steps. The first step is STOP. THINK. CONNECT.: Take security precautions, understand the consequences of your actions and behaviors and enjoy the benefits of the Internet.

 

 

Keep a Clean Machine.

 

  • Keep security software current: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
  • Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  • Protect all devices that connect to the Internet: Computers, smart phones, gaming systems, and other web‐enabled devices all need protection from viruses and malware.

 

Protect Your Child’s Personal Information.

 

  • Help your kids own their online presence: When available, set their privacy and security settings on websites to your comfort level for information sharing. Remind them that it’s ok to limit how and with whom they share information.

 

Connect with Care.

 

  • When it doubt, throw it out: Remind your children that links in emails, tweets, posts and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or, if appropriate, mark as junk email.

 

Be Web Wise.

 

  • Stay current. Keep pace with new ways to stay safe online. Check trusted web sites for the latest information, share with your children, and encourage them to be web wise.

 

Be a Good Online Citizen.

 

  • Safer for me, more secure for all: What you and your kids do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.

 

More Family Online Safety Practices:

 

  • Know the protection features of the ISPs (Internet service provider) and software your children use. All major ISPs have tools to help you manage young children’s online experience (e.g., selecting approved websites, monitoring the amount of time they spend online, or limiting the people who can contact them) and may have other security features. But remember that your home isn’t the only place they can go online.

 

 

  • Remain positively engaged. Pay attention to and know the online environments your children use. Surf the Internet with them. Appreciate your children’s participation in their online communities and show interest in their friends. Try to react constructively when they encounter inappropriate material. Make it a teachable moment.

 

 

  • Support their good choices. Expand your children’s online experience and their autonomy when developmentally appropriate, as they demonstrate competence in safe and secure online behavior and good decision making.

 

 

  • Teach critical thinking. Help your children identify safe, credible websites and other digital content. Encourage them to be cautious about clicking on, downloading, posting, and uploading content.

 

 

  • Explain the implications. Help your children understand the public nature of the Internet and its risks as well as benefits. Be sure they know that any digital info they share, such as emails, photos, or videos, can easily be copied and pasted elsewhere, and is almost impossible to take back. Things that could damage their reputation, friendships, or future prospects should not be shared electronically.

 

 

  • Just saying “no” rarely works. Teach your children how to interact safely with people they “meet” online. Though it’s preferable they make no in‐person contact with online‐only acquaintances, young people may not always follow this rule. So talk about maximizing safe conditions: meeting only in well‐lit public places, always taking at least one friend, and telling a trusted adult about any plans they make – including the time, place, and acquaintance’s contact information (at least a name and cell phone number).

 

 

  • Empower your children to handle problems, such as bullying, unwanted contact, or hurtful comments. Work with them on strategies for when problems arise, such as talking to a trusted adult, not retaliating, blocking the person, or filing a complaint. Agree on steps to take if the strategy fails.

Find  more at :

stopthinkconnect.org

The post Security Tips for Parents appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1maM6dX
Secure Hunter

What About Passwords?

What About Passwords?

The Solution

Online services like email, social networks and banking make it especially important to secure your accounts. Luckily, many of these sensitive online services give you the authentication tools to protect yourself and your information online.

Email providers and financial services to social networks and blogging platforms are implementing new security features that can help their users add another layer of security to their accounts. These technologies are often referred to as two-step authentication, login approvals, multi-factor authentication, etc. because they add a new layer of protection by adding a second element – in addition to a password – to protect your account.

These methods provide an extra layer of security. Most people only have one layer to protect their account. But combining something you know (your password) with something you have (your phone, a token, fob, etc.) makes your account even more secure by requiring the second element to log in. Simply put, two-step authentication makes sure it’s really logging in, not just someone who has your password.

Two Steps Ahead: Protect Your Digital Life Tour 

STOP. THINK. CONNECT. and other partners are hosting online safety events throughout the country to educate people and small business owners about adding layers of security to their everyday online activities. To learn more about the Two Steps Ahead: Protect Your Digital Life Tour, visit the Events page.

Resources

For more information about two-factor authentication, including step-by-step instructions for enabling the service on different platforms like Google, Facebook and Windows.

Financial Institutions:

Other Services:

Read More At :

What About Passwords

The post What About Passwords? appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1NMlLbX
Secure Hunter

How to enable Two-step authentication

Mobile device security tips and strategies to employ now

Keep a Clean Machine

Mobile devices are computers with software that need to be kept up-to-date (just like your PC, laptop or tablet). Security protections are built in and updated on a regular basis. Take time to make sure all the mobile devices in your house have the latest protections. This may require synching your device with a computer.

  • Keep security software current: Having the latest mobile security software, web browser, and operating system are the best defenses against viruses, malware and other online threats.
  • Protect all devices that connect to the Internet: Computers, smartphones, gaming systems and other web-enabled devices all need protection from viruses and malware.
Protect Your Personal Information

Phones can contain tremendous amounts of personal information. Lost or stolen devices can be used to gather information about you and. potentially, others. Protect your phone like you would your computer.

  • Secure your phone: Use a strong passcode to lock your phone.
  • Think before you app: Review the privacy policy and understand what data (location, access to your social networks) the app can access on your device before you download.
  • Only give your mobile number out to people you know and trust and never give anyone else’s number out without their permission.
Connect with Care

Use common sense when you connect. If you’re online through an unsecured or unprotected network, be cautious about the sites you visit and the information you release.

  • Get savvy about Wi-Fi hotspots: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your phone.
  • Protect your $$: When banking and shopping, check to be sure the site is security enabled. Look for web addresses with “https://” or “shttp://,” which means the site takes extra measures to help secure your information. “Http://” is not secure.
  • When in doubt, don’t respond: Fradulent texting, calling and voicemails are on the rise. Just  like email, requests for personal information or for immediate action are almost always a scam.
Be Web Wise

Stay informed of the latest updates on your device. Know what to do if something goes wrong.

  • Stay current. Keep pace with new ways to stay safe online: Check trusted websites for the latest information, and share with friends, family, and colleagues and encourage them to be web wise.
  • Know how to cell block others: Using caller ID, you can block all incoming calls or block individual names and numbers.
  • Use caution when meeting face-to-face with someone who you only “know” through text messaging: Even though texting is often the next step after online chatting, it does not mean that it is safer.
Be a Good Online Citizen

It is easy to say things via phone or text message that you would never say face to face. Remind your kids to maintain the same level of courtesy online as they would in the real world.

  • Safer for me and more secure for all: What you do online has the potential to affect everyone – at home, at work and around the world. Practicing good online habits benefits the global digital community.
  • Text to others only as you would have them text to you.
  • Only give your mobile number out to people you know and trust and never give anyone else’s number out without their permission.
  • Get permission before taking pictures or videos of others with your phone: Likewise, let others know they need your permission before taking pictures or videos of you.

– See more at: http://ift.tt/1OTeP0e

The post Mobile device security tips and strategies to employ now appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1REGy7l
Secure Hunter

Windows Security Utilities

Sysinternals Security Utilities

AccessChk
This tool shows you the accesses the user or group you specify has to files, Registry keys or Windows services.

AccessEnum
This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.

Autologon
Bypass password screen during logon.

Autoruns
See what programs are configured to startup automatically when your system boots and you log in. Autoruns also shows you the full list of Registry and file locations where applications can configure auto-start settings.

LogonSessions
List active logon sessions

Process Explorer
Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility will even show you who owns each process.

PsExec
Execute processes with limited-user rights.

PsLoggedOn
Show users logged on to a system.

PsLogList
Dump event log records.

PsTools
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

SDelete
Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

ShareEnum
Scan file shares on your network and view their security settings to close security holes.

ShellRunas
Launch programs as a different user via a convenient shell context-menu entry.

Sigcheck
Dump file version information and verify that images on your system are digitally signed.

Sysmon
Monitors and reports key system activity via the Windows event log.

The post Windows Security Utilities appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1OTeP0a
Secure Hunter

Malware Removal

Malware Remover 
If you spend any time online at all, and especially if you download files from the internet, SpyWare is something you really have to worry about. For those not familiar with these unsavory little characters, they really are the bane of all ‘Net users lives; the chances are there is some form of spyware lurking on your PC right now.

In a nutshell, they are little files, often remotely executable programs, that enter your system on the back of files you download or internet cookies picked up from sites you visit. Some cause real threat to your privacy as they steal information from your drive, and upload it to a server where this information will get sold, or used without your knowledge, and others will cause pop-up ads and some will hijack your browser to guide you to the sites they want you to visit

Fortunately, you are about to meet Secure Hunter Scanner It’s sole purpose is to kill pests on your system by scanning your drives and picking them up before they get the chance to do any harm.


Fatures:

Scan contains three options: quick scan, full scan, custom volume scan.
you also have the ability to scan memory, scan Registry (quick scan, deep scan) and scan cookies .
The ability to choose which action to take on the Infected objects( Quarantine, Keep or Delete).
The ability to save the scanning log results .
The ability to make a backup for list of objects you want & the ability to restore them as well.
The Program has a keep List that contains entries to components you don’t want Secure hunter to remove or detect in the next scan.
Alerts that fires the alert types that you made in the system guard.
The options window contains tabs which include: General options, Scanning options, Startup options, Live update options, Schedule options & Interface option

The post Malware Removal appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1R9VBXn
Secure Hunter

Monday, December 7, 2015

UK research network Janet under ongoing and persistent DDoS attack Secure Hunter

Attackers seem to be adjusting methods in response to Tweets

Publicly-funded academic computer network Janet has come under a persistent DDoS attack today, which hobbled multiple internet connections, including the Manchester to Manchester Core Router.…

The Register – Security
Secure Hunter Anti -Malware

The post UK research network Janet under ongoing and persistent DDoS attack Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1IB327e
Secure Hunter

Thursday, December 3, 2015

Attack targets auto industry firms in Europe

Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.
Computerworld Malware and Vulnerabilities News

The post Attack targets auto industry firms in Europe appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Q391nY
Secure Hunter

Shields up on potentially unwanted applications in your enterprise

Has your enterprise environment been bogged down by a sneaky browser-modifier which tricked you into installing adware from a seemingly harmless software bundle? Then you might have already experienced what a potentially unwanted application (PUA) can do.

The good news is, the new opt-in feature for enterprise users in Windows can spot and stop PUA in its tracks. If you are an enterprise user, and you are running System Center Endpoint Protection (SCEP), or Forefront Endpoint Protection (FEP), it's good to know that your infrastructure can be protected from PUA installations when you opt-in to the PUA protection feature.  If enabled, PUA will be blocked at download and install time.

 

What is PUA and why bother?

Potential Unwanted Application (PUA) refers to unwanted application bundlers or their bundled applications.

These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify among the noise, and can waste helpdesk, IT, and user time cleaning up the applications.

Since the stakes are higher in an enterprise environment, the potential disaster that PUA brings can be a cause of concern. Hence, it is important to deliver trusted protection in this field.

Typical examples of behavior that we consider PUA include ad-injection, many types of software bundling, and persistent solicitation for payment for services based on fraudulent claims.

 

PUA protection for enterprise

The Potentially Unwanted Application protection feature is available only for enterprise customers.  If you are already one of Microsoft's existing enterprise customers, you need to opt-in to enable and use PUA protection.

PUA protection updates are included as part of the existing definition updates and cloud protection for Microsoft's enterprise customers. No additional configuration is required besides opting into PUA protection.

 

Deploying PUA protection

Systems administrators can deploy the PUA protection feature as a Group Policy setting by the following registry key policy setting according to your product version:

System Center Endpoint Protection, Forefront Endpoint Protection

Key Path:            HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftMicrosoft AntimalwareMpEngine

Value Name:      MpEnablePus

 

Note: The following configuration is available for machines that are managed by System Center Endpoint Protection.

Windows Defender

Key Path:            HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindows DefenderMpEngine

Value Name:      MpEnablePus

 

The group policy value for MpEnablePus can be configured as a DWORD type as follows:

Value (DWORD)    Description
 0 (default) Potentially Unwanted Application protection is disabled
1 Potentially Unwanted Application protection is enabled. The applications with unwanted behavior will be blocked at download and install-time.

 

After enabling this feature, PUA blocking takes effect on endpoint clients after the next signature update or computer restart. Signature updates take place daily under typical circumstances.

The user experience can vary according to the policy settings that are configured in your enterprise. However, when enabled, the default behavior is that PUA will be blocked and automatically quarantined.

 

PUA threat file-naming convention

When enabled, we will start identifying unwanted software with threat names that start with “PUA:”, such as, PUA:Win32/Creprote.

Specific researcher-driven signatures identify the following:

  • Software bundling technologies
  • PUA applications
  • PUA frameworks

 

What does PUA protection look like?

By default, PUA protection quarantines the file so they won’t run. PUA will be blocked only at download or install-time. A file will be included for blocking if it meets one of the following conditions:

  • The file is being scanned from the browser
  • The file has Mark of the Web set
  • The file is in the %downloads% folder
  • Or if the file in the %temp% folder

 

The user experience of the blocking depends on the product you have installed.

With System Center Endpoint Protection deployed, the following dialog box will be shown upon detection:

SCEP dialog box indicates detection status

 The user can view the blocked software in the History tab.

You can take a look at the list of blocked applications from the History tab

In Windows 10, where its endpoints including Windows Defender are managed, the following dialog box will be shown:

Detection message in Windows Defender

PUA protection roll-out scenario

Like all good processes, it is best to plan your PUA protection deployment to get the most out of it. Here are some best practices to plan your PUA protection roll-out.

As blocking PUA in your enterprise is an explicit choice, it is best practice to do the necessary due diligence such as having a corporate policy or guidance that defines that potentially unwanted applications are not to be installed or downloaded in your corporate environment.

With a corporate policy or guidance in place, it's recommended to also sufficiently inform your end-users and your IT Helpdesk about the updated policy or guidance so that they are aware that potentially unwanted applications are not allowed in your corporate environment. This will preemptively inform your end-users as to why SCEP or FEP is blocking their download. By informing your helpdesk about your new policy or guidance, they can resolve end-user questions.

Finally, if you expect a lot of end-users in your environment to be downloading or installing PUA, then it is recommended that machines be gradually enrolled into the PUA protection. In other words, deploy the PUA opt-in policy to a subset of machines, observe the number of detections, determine if you'd want to allow any of them in your enterprise, add exclusions for them (all exclusions mechanisms are supported – file name, folder, extension, process) and then gradually roll-out the opt-in policy to a larger set of machines

 

Handling false positives

If you think that an application has been wrongfully identified as PUA, submit the file here, and add ‘PUA’ along with the detection name in the comments section.

 

We look forward to providing you with a great protection experience.

Geoff McDonald, Deepak Manohar, and Dulce Montemayor

MMPC


Microsoft Malware Protection Center

The post Shields up on potentially unwanted applications in your enterprise appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1TAKGED
Secure Hunter

Ponmocup is the ’15 million’ machine botnet you’ve never heard of Secure Hunter

Skilled VXers have built 25 plugins, made 4000 variants, say crack security team

Botconf  One of the world’s most successful, oldest, and largest botnets is an underestimated and largely-unknown threat that has over time infected 15 million machines and made millions plundering bank accounts.…

The Register – Security
Secure Hunter Anti -Malware

The post Ponmocup is the ’15 million’ machine botnet you’ve never heard of Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1IqXnAE
Secure Hunter

Wednesday, December 2, 2015

Brit hardware hacker turns Raspberry Pi Zeros into selfie slayers Secure Hunter

Internet of Wrongs too lame for Wassenaar

Kiwicon  Hipsters and selfie addicts beware: infosec man Steve Lord has crafted a tool designed to sever your line of addiction to Instagram by quietly blocking it over public Wi-Fi.…

The Register – Security
Secure Hunter Anti -Malware

The post Brit hardware hacker turns Raspberry Pi Zeros into selfie slayers Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1QfPoaL
Secure Hunter

50c buys you someone else’s password for Netflix, Spotify or … Secure Hunter

Carders selling hacked accounts for a pittance. And yes. Even for smut sites

Criminals are selling ‘lifetime’ Netflix, HBO, and cable sports streaming accounts for less than US$ 10 on sites hidden within Tor.…

The Register – Security
Secure Hunter Anti -Malware

The post 50c buys you someone else’s password for Netflix, Spotify or … Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1YHz7OO
Secure Hunter

Tuesday, December 1, 2015

Google to end updates, security bug fixes for Chrome on 32-bit Linux Secure Hunter

It’ll work but forget about any new patches, so basically it won’t work if you value your life

Google has quietly announced it will end support for its Chrome browser on 32-bit Linux. This doesn’t affect the 64-bit build.…

The Register – Security
Secure Hunter Anti -Malware

The post Google to end updates, security bug fixes for Chrome on 32-bit Linux Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1TjnGsX
Secure Hunter

Conficker, back from the undead, dominates malware threat landscape Secure Hunter

Look out, ransomware is coming up on the rails

Conficker was the most common malware used to attack UK and international organisations in October, accounting for 20 per cent of all attacks globally, according to security vendor Check Point.…

The Register – Security
Secure Hunter Anti -Malware

The post Conficker, back from the undead, dominates malware threat landscape Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1HCQGeM
Secure Hunter

Monday, November 30, 2015

Your browser history, IP addresses, online purchases all up for grabs without a warrant Secure Hunter

What the FBI can do with an NSL and a gagging order

Following a decade-long legal battle, the details of a US national security letter (NSL) sent to ISP owner Nicholas Merrill can finally be revealed.…

The Register – Security
Secure Hunter Anti -Malware

The post Your browser history, IP addresses, online purchases all up for grabs without a warrant Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Q9M5ln
Secure Hunter

Guess who doesn’t do cyber resilience testing? Yep, air traffic control Secure Hunter

…and the National Grid

Analysis  Although Chancellor George Osborne recently spoke of the National Grid, hospitals and air traffic control as being potential targets of online attacks in a recent high-profile speech at GCHQ, only the financial services sector runs comprehensive stress tests.…

The Register – Security
Secure Hunter Anti -Malware

The post Guess who doesn’t do cyber resilience testing? Yep, air traffic control Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1TnnTvK
Secure Hunter

Sunday, November 29, 2015

Hello Barbie controversy re-ignited with insecurity claims Secure Hunter

Doll leaks data, even before the tear-downs are finished

Back in February, The Register queried the security and privacy implications of Mattel’s “Hello Barbie”, and now the doll has hit the shelves, a prominent security researcher has turned up the first security problems with the toy.…

The Register – Security
Secure Hunter Anti -Malware

The post Hello Barbie controversy re-ignited with insecurity claims Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1NWP1NF
Secure Hunter

Hungryhouse resets thousands of customers’ passwords Secure Hunter

Good security hygiene after third-party data breach

Online takeaway service Hungryhouse has reset the passwords of thousands of its customers following an apparent data breach at a third party hosting company.…

The Register – Security
Secure Hunter Anti -Malware

The post Hungryhouse resets thousands of customers’ passwords Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1TePm22
Secure Hunter

Saturday, November 28, 2015

Kids charity hit by server theft Secure Hunter

Some personal data stored, but motive likely equipment theft, says Plan UK

A two-man break in at the London offices of children’s charity Plan UK has resulted in theft of five computer servers.…

The Register – Security
Secure Hunter Anti -Malware

The post Kids charity hit by server theft Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1PTOmCD
Secure Hunter

Millions of families hit in toymaker VTech hack – including 200,000+ kids Secure Hunter

Youngsters’ personal info, parents’ contact details leak from Chinese gizmo giant

Names, home and email addresses, security questions and answers, and more information on millions of families worldwide have been swiped from a top toymaker’s database.…

The Register – Security
Secure Hunter Anti -Malware

The post Millions of families hit in toymaker VTech hack – including 200,000+ kids Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1QM9qv3
Secure Hunter

Friday, November 27, 2015

Final countdown – NSA says it really will end blanket phone spying on US citizens this Sunday Secure Hunter

We’re leaving together …

Come Sunday, the NSA will end its ferocious dragnet surveillance of American citizens’ phones, the White House insists.…

The Register – Security
Secure Hunter Anti -Malware

The post Final countdown – NSA says it really will end blanket phone spying on US citizens this Sunday Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1IffmtP
Secure Hunter

Hungryhouse hit by data breach affecting ‘10,000’ customers Secure Hunter

Heads up, pizza lovers, major password reset underway

Online takeaway service Hungryhouse has been hit by a third-party data breach and has responded by reportedly resetting the passwords of 10,000 of its customers.…

The Register – Security
Secure Hunter Anti -Malware

The post Hungryhouse hit by data breach affecting ‘10,000’ customers Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1PftC8m
Secure Hunter

Thursday, November 26, 2015

Microsoft rides to Dell’s rescue, wrecks rogue root certificate Secure Hunter

Windows Defender lives up to its name by dealing death to Dell’s dumb DLL

Microsoft has killed Dell’s user-pwning root certificate and its self-reinstalling .dll with its antivirus Defender tool.…

The Register – Security
Secure Hunter Anti -Malware

The post Microsoft rides to Dell’s rescue, wrecks rogue root certificate Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1R9w9jZ
Secure Hunter

Researcher reveals Chinese e-crime shopping list Secure Hunter

Crazy low prices for app ‘purchases’, or perhaps you’d like a poison PoS unit?

Dodgy developers can have their data-stealing iOS applications boosted to the top ranks of Apple’s App Store for as little as US$ 4000 thanks to services on offer by Chinese hackers.…

The Register – Security
Secure Hunter Anti -Malware

The post Researcher reveals Chinese e-crime shopping list Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1MF6hZY
Secure Hunter

Wednesday, November 25, 2015

Tuesday, November 24, 2015

Fifth arrest in TalkTalk hacking probe: Now Plod cuff chap in Wales Secure Hunter

A ydynt yn hyd yn oed yn cael y rhyngrwyd yng Nghymru?

Cops probing the TalkTalk mega-hack arrested a teen in south Wales on Tuesday.…

The Register – Security
Secure Hunter Anti -Malware

The post Fifth arrest in TalkTalk hacking probe: Now Plod cuff chap in Wales Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1P7nAqf
Secure Hunter

North Korea is capable of pwning Sony. Whether it did is another matter Secure Hunter

PART 2 – It looked like a training exercise anyway

Sysadmin Blog  Researchers think they have figured out how Sony was hacked. Long story short: the hackers knew what they were doing and covered their tracks with some clever, but really basic, tricks. I’m not particularly surprised by this, but I am surprised that others are surprised by it.…

The Register – Security
Secure Hunter Anti -Malware

The post North Korea is capable of pwning Sony. Whether it did is another matter Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1PWVFaY
Secure Hunter

Monday, November 23, 2015

Superfish 2.0 worsens: Dell’s dodgy security certificate is an unkillable zombie Secure Hunter

And now here’s how you can really destroy it

Updated  The rogue root certificate in new Dell computers – a certificate that allows people to be spied on when banking and shopping online – will magically reinstall itself even when deleted.…

The Register – Security
Secure Hunter Anti -Malware

The post Superfish 2.0 worsens: Dell’s dodgy security certificate is an unkillable zombie Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1SXMQ09
Secure Hunter

Data breach at firm that manages Cisco, Microsoft certifications Secure Hunter

Pearson VUE says credentials manager product affected

Cisco, IBM, Oracle and Microsoft’s certification management provider, Pearson VUE, has copped to a data breach following a malware compromise of its Credential Manager System.…

The Register – Security
Secure Hunter Anti -Malware

The post Data breach at firm that manages Cisco, Microsoft certifications Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1OnIdeL
Secure Hunter

Sunday, November 22, 2015

Crimestoppers finally revamps weak crypto. Take your time guys Secure Hunter

Poor rating due to out-of-date SSLv2 protocol

UK crime tip-off service Crimestoppers has revamped its weak website crypto after months of running a system that relied upon obsolete protocols.…

The Register – Security
Secure Hunter Anti -Malware

The post Crimestoppers finally revamps weak crypto. Take your time guys Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1X7uOPe
Secure Hunter

How NSA continued to spy on American citizens’ email traffic – from overseas Secure Hunter

Files show agency just moved surveillance offshore

Newly revealed documents (not from Snowden this time) show that the NSA has continued to collect Americans’ email traffic en masse using overseas offices to get around curbs introduced domestically.…

The Register – Security
Secure Hunter Anti -Malware

The post How NSA continued to spy on American citizens’ email traffic – from overseas Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1ScDkWF
Secure Hunter

Saturday, November 21, 2015

Hillary Clinton: Stop helping terrorists, Silicon Valley – weaken your encryption Secure Hunter

Prez hopeful wants tech giants to stop treating govt as adversary

Hillary Clinton has joined a growing number of politicians using the Paris attacks earlier this month to argue for a weaker encryption.…

The Register – Security
Secure Hunter Anti -Malware

The post Hillary Clinton: Stop helping terrorists, Silicon Valley – weaken your encryption Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1N4mmK7
Secure Hunter

Malware caught checking out credit cards in 54 luxury hotels Secure Hunter

Sheraton, Westin, W chains in US, Canada pwned

Add Starwood – owner of the Sheraton, Westin, W hotel chains – to the ranks of resorts infiltrated by credit card-stealing malware.…

The Register – Security
Secure Hunter Anti -Malware

The post Malware caught checking out credit cards in 54 luxury hotels Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1jcSz63
Secure Hunter

Friday, November 20, 2015

Who’s running dozens of top-secret unpatched databases? The Dept of Homeland Security Secure Hunter

Irony alert

The US Department of Homeland Security is running dozens of unpatched databases, some of which are rated “secret” and even “top secret,” according to an audit.…

The Register – Security
Secure Hunter Anti -Malware

The post Who’s running dozens of top-secret unpatched databases? The Dept of Homeland Security Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1lah8BO
Secure Hunter

NCC Group sowing the seeds of disruption in the cyber security industry Secure Hunter

Are you what the boffs are looking for?

Competition  It’s 2015, the cyber attacks keep on coming, and the bad guys appear to be winning – some may argue this is because devastating data breaches are more newsworthy than businesses upping their security defences. We see a relentless battle between businesses trying to protect themselves and those with malicious intent attacking corporate systems to cause damage or steal information.…

The Register – Security
Secure Hunter Anti -Malware

The post NCC Group sowing the seeds of disruption in the cyber security industry Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Qy5bD3
Secure Hunter

Thursday, November 19, 2015

Tech goliaths stand firm against demands for weaker encryption after Paris terror attacks Secure Hunter

Massacre accompanied by political backdoor push

Tech giants claim they are standing firm in their refusal to allow government agencies to backdoor their cryptography – or to weaken encryption in their products.…

The Register – Security
Secure Hunter Anti -Malware

The post Tech goliaths stand firm against demands for weaker encryption after Paris terror attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1I2puk4
Secure Hunter

Tech firms fight anti-encryption demands after Paris murders Secure Hunter

If the US govt wants iMessages, well, tough

Comment  Anti-encryption sentiment among politicians is rising following the Paris terror attacks, but Silicon Valley firms are so far resisting attempts to weaken crypto systems to allow easier access to private communications for law enforcement and intel agencies.…

The Register – Security
Secure Hunter Anti -Malware

The post Tech firms fight anti-encryption demands after Paris murders Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1MoLg5N
Secure Hunter

Wednesday, November 18, 2015

Hacking group Strontium dogs NATO and government targets Secure Hunter

Microsoft reports phishers getting busy on high-value systems

There’s a new hacking team out there that’s proving surprisingly good at getting into government systems using social engineering tactics coupled with zero-day attacks in assaults that can last as long as a year.…

The Register – Security
Secure Hunter Anti -Malware

The post Hacking group Strontium dogs NATO and government targets Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1j8w8yD
Secure Hunter

Blackhole’s back: Hated exploit kit returns from the dead Secure Hunter

Analysis reveals attack was put together using leaked source

The seemingly long-defunct Blackhole Exploit Kit has resurfaced in a fresh run of drive-by download attacks, according to research carried out by security firm Malwarebytes.…

The Register – Security
Secure Hunter Anti -Malware

The post Blackhole’s back: Hated exploit kit returns from the dead Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1HYb0BV
Secure Hunter

Tuesday, November 17, 2015

Seized: Fake EFF .org linked to hackers hitting NATO, White House PCs Secure Hunter

Digital rights group takes down Pawn Storm base

The Electronic Frontier Foundation (EFF) has been awarded control of its namesake domain, which was being used to install malware on people’s computers.…

The Register – Security
Secure Hunter Anti -Malware

The post Seized: Fake EFF .org linked to hackers hitting NATO, White House PCs Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Ml8kSW
Secure Hunter

Today is not the day to search for a beautician in Russia Secure Hunter

CTB ransomware blasts 60 high-traffic sites hosted by Rustelekom

Cyphort Labs researcher Nick Bilogorskiy says ransomware authors have infected some 60 Russian websites that collectively attract more than 20 million visitors a month.…

The Register – Security
Secure Hunter Anti -Malware

The post Today is not the day to search for a beautician in Russia Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1S1dxRr
Secure Hunter

Monday, November 16, 2015

Hold on, France and Russia. Anonymous is here to kick ISIS butt Secure Hunter

Terrorists get their wish – they really will be screwed by 72 virgins

As world powers prepare to bomb barbaric ISIS into the medieval age it so dearly craves in the wake of the Paris attacks, Anonymous too has declared war on the terror group.…

The Register – Security
Secure Hunter Anti -Malware

The post Hold on, France and Russia. Anonymous is here to kick ISIS butt Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1MO7DTu
Secure Hunter

Drop the obsession with Big Data, zero days and just… help the business Secure Hunter

Security pros urged to drop the crap, get into the scrap

Black Hat Europe  Haroon Meer, founder of applied research company Thinkst, opened the Black Hat Europe conference last week with a keynote attacking the fashionable obsessions of the security businesses, including blind faith in Big Data and an obsession with zero-day vulnerabilities.…

The Register – Security
Secure Hunter Anti -Malware

The post Drop the obsession with Big Data, zero days and just… help the business Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1RYTbrX
Secure Hunter

Sunday, November 15, 2015

PNG pongs: critical bug patched in ubiquitous libpng Secure Hunter

Crafted image crashes apps, server processes

This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched.…

The Register – Security
Secure Hunter Anti -Malware

The post PNG pongs: critical bug patched in ubiquitous libpng Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1WUEOeR
Secure Hunter

MoD-founded firm Niteworks loses login creds of UK defence folk Secure Hunter

Company is sorry for the ‘inconvenience’

Exclusive  Terrible infosec practices at Niteworks, the MoD-established business networking organisation, have led to unknown attackers gaining email addresses and passwords of British defence community members.…

The Register – Security
Secure Hunter Anti -Malware

The post MoD-founded firm Niteworks loses login creds of UK defence folk Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1lpNed9
Secure Hunter

Saturday, November 14, 2015

Aircraft laser strikes hit new record with 20 incidents in one night Secure Hunter

Dangerous, stupid and highly illegal

The Federal Aviation Administration has warned of a dangerous escalation in laser strikes on aircraft, with Wednesday night alone registering a record 20 incidents.…

The Register – Security
Secure Hunter Anti -Malware

The post Aircraft laser strikes hit new record with 20 incidents in one night Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1WZjUFU
Secure Hunter

Conficker is back – and it’s infecting police body cams Secure Hunter

Malware spotted on law enforcement recording gear

A US IT security company says it found copies of the Conficker malware infecting police body cameras.…

The Register – Security
Secure Hunter Anti -Malware

The post Conficker is back – and it’s infecting police body cams Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1NSdzvx
Secure Hunter

Friday, November 13, 2015

Merseyside DDoS daddy given eight months behind bars Secure Hunter

When bragging of your illegal exploits, leave off your real name

A UK man has been given eight and a half months in prison for launching a series of distributed denial-of-service attacks in 2013.…

The Register – Security
Secure Hunter Anti -Malware

The post Merseyside DDoS daddy given eight months behind bars Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1QBBn7O
Secure Hunter

CloudFlare drinks the DNSSEC kool-aid, offers it on universal basis Secure Hunter

Controversial protocol launched

CloudFlare has rolled out Universal DNSSEC, despite widespread controversy alleging it would provide an excellent platform from which intelligence agencies could spy upon and intercept global internet traffic.…

The Register – Security
Secure Hunter Anti -Malware

The post CloudFlare drinks the DNSSEC kool-aid, offers it on universal basis Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1OIlYD7
Secure Hunter

Thursday, November 12, 2015

Twitter DM character limit liberation spells opportunity for botnets Secure Hunter

Direct message command and control hides in the walla walla rhubarb.

London security researcher Paul Amar has built a tool capable of exploiting Twitter’s extended direct messaging function for covert botnet command and control.…

The Register – Security
Secure Hunter Anti -Malware

The post Twitter DM character limit liberation spells opportunity for botnets Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1MF89Db
Secure Hunter

Fraudsters are using you and this Ammyy of malware downloads Secure Hunter

Miscreants learning the lessons of the cyberspies

Users of Ammyy Admin may have been unwittingly downloading malware along with their remote desktop software.…

The Register – Security
Secure Hunter Anti -Malware

The post Fraudsters are using you and this Ammyy of malware downloads Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1NMSYJ2
Secure Hunter

Wednesday, November 11, 2015

Latest Android phones hijacked with tidy one-stop-Chrome-pop Secure Hunter

Chinese researcher burns exploit for ski trip.

PacSec: Google’s Chrome for Android has been popped in a single exploit that could lead to the compromise of any handset.…

The Register – Security
Secure Hunter Anti -Malware

The post Latest Android phones hijacked with tidy one-stop-Chrome-pop Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1WSO9ON
Secure Hunter

F-Secure makes SENSE of smart home IoT insecurities Secure Hunter

Helping kettles and light bulbs toughen up their anti-hacking attitude

F-Secure is looking to go that extra mile in consumer security with the launch of an anti-hacker appliance for the Internet of Things.…

The Register – Security
Secure Hunter Anti -Malware

The post F-Secure makes SENSE of smart home IoT insecurities Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1PC9881
Secure Hunter

Tuesday, November 10, 2015

Edge joins Explorer in bumper crop of security patches Secure Hunter

No zero days but plenty to be getting on with

It’s Patch Tuesday the second day of the week in the month of November and Microsoft and Adobe have pushed out their security updates. Joining the perennial favorites Flash and Internet Explorer comes new kid on the block, Edge.…

The Register – Security
Secure Hunter Anti -Malware

The post Edge joins Explorer in bumper crop of security patches Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/20LhRKk
Secure Hunter

Outrageous OPSEC: What happens when skiddies play natsec Secure Hunter

Rocket Kitten phishermen self-d0x with hard-coded credentials

CheckPoint has raided the servers of a bumbling alleged Iranian hacking group using credentials hardcoded into malware, using its access to name suspected members.…

The Register – Security
Secure Hunter Anti -Malware

The post Outrageous OPSEC: What happens when skiddies play natsec Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1iQEdI4
Secure Hunter

Monday, November 9, 2015

BLAKE2 hash authors post code as RFC Secure Hunter

Strong, fast, but NIST is wary

The authors of a NIST-commended (but left on the shelf) hashing suite have put their work forward for IETF (Internet Engineering Task Force) consideration.…

The Register – Security
Secure Hunter Anti -Malware

The post BLAKE2 hash authors post code as RFC Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1SdRSoL
Secure Hunter

GCHQ’s infosec arm bins advisor accreditation scheme Secure Hunter

Too busy listening in to phone calls to listen to customers?

GCHQ’s communications security arm, CESG, has been accused of leaving a gaping hole in the government security advisor profession by axing its accreditation scheme.…

The Register – Security
Secure Hunter Anti -Malware

The post GCHQ’s infosec arm bins advisor accreditation scheme Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1Oz7LIw
Secure Hunter

Sunday, November 8, 2015

TalkTalk claims 157,000 customers were victims of security breach Secure Hunter

Cheapo telco revises down attack figure, shares climb 4%

TalkTalk has once again attempted to downplay the seriousness of the attack on its systems by claiming on Friday morning that only four per cent of its customers – nearly 157,000 people – were affected by the security breach.…

The Register – Security
Secure Hunter Anti -Malware

The post TalkTalk claims 157,000 customers were victims of security breach Secure Hunter appeared first on Secure Hunter Anti-Malware.



http://ift.tt/1kEj0lY
Secure Hunter