background preloader

AVG Antivirus and Security Software - Antivirus and Internet Security

AVG Antivirus and Security Software - Antivirus and Internet Security

http://www.avg.com/ca-en/homepage

collective-intelligence-framework - a framework for warehousing intelligence bits CIF is a cyber threat intelligence management system. CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route). The most common types of threat intelligence warehoused in CIF are IP addresses, domains and urls that are observed to be related to malicious activity. More can be found by continuing on to What is CIF? and some history Due to the various content "licenses" for each of the feeds (malwaredomains, zeustracker, etc) We do NOT offer this as a service, we can't give you an api-key to "test with".

A Guide to Safeguarding Your Social Media for Small Business Chances are that your small business employees and marketers are using social media in their personal lives and maybe even to promote your company as well. However, in a world where hackers exist, social media security breaches and data leaks are a reality that every small business must guard against. How can you protect your social media for small business against these threats? Follow this guide to safeguarding your social properties. Establish Social Media Ground Rules Your company should establish a policy of what types of information about the company or company's employees can be posted on social media sites. Even if employees set their information to private, hackers may be able to access this information and obtain your company's confidential data.Click to Tweet: #Socialmediabranding is important but danger lurks on the net, @YPsmallbiz provides some tips to keep your pofile safe

Your Email Password Might Be For Sale. Change It, Now. For sale: 360 million email passwords. Is yours one of them? Hold Security, a Milwaukee outfit that helps businesses stay secure, found millions of email passwords for sale while researching the black market sites that sell them. They announced the 360 million figure earlier this week. “In the first three weeks of February, we identified nearly 360 million stolen and abused credentials and 1.25 billion records containing only email addresses,” says the announcement. Securing your email password is particularly important, because most services use email to recover forgotten passwords. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it.

Major security hole allows Apple passwords to be reset with only email address, date of birth (update) Apple yesterday rolled out two-step verification, a security measure that promises to further shield Apple ID and iCloud accounts from being hijacked. Unfortunately, today a new exploit has been discovered that affects all customers who haven't yet enabled the new feature. It allows anyone with your email address and date of birth to reset your password — using Apple's own tools. We've been made aware of a step-by-step tutorial (which remains available as of this writing) that explains in detail how to take advantage of the vulnerability. The exploit involves pasting in a modified URL while answering the DOB security question on Apple's iForgot page. It's a process just about anyone could manage, and The Verge has confirmed the glaring security hole firsthand.

Most Common Passwords Roleplay. Learn to play songs by ear! Free Ear Training.[Video Tutorial] How to build google chrome extensions Update: See my analysis of the most common passwords from singles.org and other hacked databases. Web Proxies - sorted by country and software I have detected that you are using AdBlock Plus or some other adblocking software. I need money to operate the site and almost all of that comes from our online advertising. If you feel like you should give something back then please turn off your adblocking software, thanks. Your ip address is like your signature in the internet world.

CWE/SANS TOP 25 Most Dangerous Software Errors What Errors Are Included in the Top 25 Software Errors? Version 3.0 Updated June 27, 2011 The Top 25 Software Errors are listed below in three categories: The New 25 Most Dangerous Programming Errors The Scoring System 3 Best Resources To Find Known Sites With Spyware & Viruses Malware causes worldwide economic damage in the multi-billion dollar range and even though users are ever more aware of good security practices, it continues to be a head-to-head race between malicious software and the defense against it. Many users catch malware through browsing online. Thus not visiting known sites with spyware and viruses in the first place is an effective way to keep the computer safe. This articles shows you 3 resources that will lower your risk of visiting malicious sites by accident. Although you can search online domain lists for unsafe websites, a browser plugin is by far the most convenient way to automatically identify and avoid malicious websites.

Zero-day exploits: Should the hacker gray market be regulated? Courtesy Adriel Desautels. Behind computer screens from France to Fort Worth, Texas, elite hackers hunt for security vulnerabilities worth thousands of dollars on a secretive unregulated marketplace. Ryan Gallagher is a journalist who reports on surveillance, security, and civil liberties. Follow 7 Ways to Stop NSA Spying on Your Smartphone – Tom's Guide Recently uncovered PowerPoint slides used by the National Security Agency and its British equivalent indicate that the spy agencies have been intercepting personal data sent by "leaky" smartphone apps. The New York Times, the Guardian and ProPublica all reported that documents provided by former NSA contractor Edward Snowden showed that the agency and Britain's GCHQ collected data transmitted "in the clear" by "Angry Birds," Facebook, Flickr, Flixster, Google Maps, LinkedIn, Photobucket and Twitter. In addition to the vast amount of personal data being transmitted unencrypted across open cellular networks by the apps themselves, the agencies were reportedly able to get even more intrusive information — including a person's religion, sexual orientation and marital status — from third-party advertising networks that placed ads in smartphone apps.

9 Tips to Stay Safe on Public Wi-Fi Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Burp Suite Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.

Related: