Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $19,867
22%  
Woo hoo!! And the first 22% is in!! Thank you all very much!! God bless.

Keyword: computersecurity

Brevity: Headers | « Text »
  • It's not just your browser: Your machine can be fingerprinted easily

    01/12/2017 7:17:47 PM PST · by markomalley · 19 replies
    The Register ^ | 1/13/16 | Richard Chirgwin
    It just got a lot harder to evade browser fingerprinting: a bunch of boffins have worked out how to fingerprint the machine behind the browser, using only information provided by browser features.Like so many ideas, it's obvious once someone's thought of it: activities that aren't processed in the browser are treated the same whether the page is rendered in (say) Chrome, Firefox, IE or Edge. The group – Yinzhi Cao and Song Li of from Lehigh University in Pennsylvania, and Erik Wijmans Washington University in St. Louis – have worked out how to access various operating system and hardware-level features...
  • Need Computer Help

    10/09/2016 7:01:12 PM PDT · by hsmomx3 · 45 replies
    self
    My computer has been running fine until now, malwarebytes runs each day as does Windows Defender. I turned my computer off today and came home, turned it on and I get a message that says: The stub received bad data...so far this is when I try to get into malwarebytes program and windows defender. NOt sure about other programs. All of my updates seem to have disappeared. What is a program I can use online to check for a virus? I am not computer savvy when it comes to computer problems. Thanks. Running Windows 10.
  • More than 80% of healthcare IT leaders say their systems have been compromised

    08/27/2015 6:31:37 PM PDT · by markomalley · 6 replies
    Computerworld ^ | 8/27/15 | Lucas Merian
    Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.Sixty-six percent of the IT executives at healthcare plans who were surveyed said they...
  • How your smartphone's battery life can be used to invade your privacy

    08/04/2015 6:33:19 AM PDT · by TigerLikesRooster · 24 replies
    The Guardian ^ | Tuesday 4 August 2015 | Alex Hern
    How your smartphone's battery life can be used to invade your privacy A group of researchers have demonstrated how to track users with nothing more than their remaining battery power, which could compromise privacy Alex Hern Tuesday 4 August 2015 08.18 BST A little-known feature of the HTML5 specification means that websites can find out how much battery power a visitor has left on their laptop or smartphone – and now, security researchers have warned that that information can be used to track browsers online. The battery status API is currently supported in the Firefox, Opera and Chrome browsers, and...
  • How Obama’s Poor Judgment Led to the Chinese Hack of OPM

    07/27/2015 7:53:58 AM PDT · by detective · 8 replies
    The Daily Signal ^ | July 27, 2015 | Paul Conway
    The maxim that “personnel is policy” transcends partisan affiliations and political labels. Every president, including President Barack Obama, has the authority to staff federal agencies with loyal political appointees.
  • Chinese Hack of U.S. Employee Database Worse Than First Reported

    06/18/2015 1:12:30 PM PDT · by detective · 23 replies
    The New American ^ | June 17, 2015 | C. Mitchell Shaw
    As we learn more about the recent cyber-attacks on U.S. federal employee records by Chinese hackers, it is becoming increasingly clear that the problem is much worse than many previously thought. In testimony before the House Oversight and Government Reform Committee, officials within the Office of Personnel Management (OPM) admitted on Tuesday to major lapses in basic cyber-security protocols that left government systems vulnerable to at least two attacks. Those attacks allowed hackers to breach sensitive personal data about nearly all employees of the federal government and millions of persons with security clearances, according to a report by the Associated...
  • IRS botches computer security, risks taxpayer info: audit

    03/19/2015 2:58:16 PM PDT · by PROCON · 8 replies
    washingtontimes.com ^ | March 19, 2015 | Stephen Dinan
    The IRS sometimes uses old software without key security patches that leave its computer systems vulnerable and could endanger taxpayers’ private information, the Government Accountability Office said Thursday. GAO investigators raised the issue last year, identifying 69 weaknesses. The IRS said it had corrected two dozen of them, but the new audit found just 14 of them were actually fixed, leaving dozens of weaknesses still to be resolved. Part of the problem is that the IRS hasn’t even always followed its own guidelines for assessing risks and creating information security plans, the GAO said.
  • White House: Hillary Sent Classified Emails Despite Her Claim to the Contrary

    03/11/2015 7:06:16 AM PDT · by rightistight · 49 replies
    Pundit Press ^ | 3/11/15 | Aurelius
    Before Hillary Clinton’s news conference yesterday, Jen Psaki, the spokesperson for the United States Department of State, stated that the White House could not immediately released the former Secretary of State’s emails because “it will take several months” to redact all the classified things she sent. Despite this, Ms. Clinton then stated in her press conference, “I did not email any classified material to anyone on my email. I’m certainly well aware of the classification requirements and did not send classified material.” Someone is not telling the truth. Either Ms. Psaki lied in order to prevent the immediate release of...
  • Physical security of the Clinton e-mail sever

    03/10/2015 9:00:22 PM PDT · by 2ndDivisionVet · 159 replies
    And Still I Persist… ^ | March 10, 2015 | Bruce F. Webster
    I’ve raised in prior posts (here and here) the issue of physical security of the clintonemail.com e-mal server, which is why were it was located and how it was set up matters. Last night, Mitch LaKind — who has experience setting up secure military e-mail servers — wrote me about the detailed issues surrounding Clinton’s approach. I’ll let him speak for himself (emphasis mine, though): As a former contractor to the Air Force, I personally managed the Microsoft Exchange servers that were installed at Thule Air Base. My experience with Microsoft Exchange goes back to 1997, when the earliest versions...
  • “FREAK” flaw undermines security for Apple and Google users, researchers discover

    03/03/2015 1:22:01 PM PST · by Swordmaker · 17 replies
    The Washington Post ^ | March 3 at 12:42 PM | By Craig Timberg
    Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw resulted from a former U.S. government policy that once forbid the export of strong encryption and required that weaker “export-grade” products be shipped to customers in other countries, say the researchers who discovered the problem. These restrictions were lifted in the late 1990s, but the weaker encryption got baked into widely used software that proliferated around the world...
  • How Lenovo's dangerous Superfish adware put its customers at risk

    02/20/2015 1:19:16 PM PST · by smokingfrog · 31 replies
    Consumer Reports ^ | 2-20-15 | Donna Tapellini
    The Internet is lighting up with warnings about Superfish, an adware program that came preinstalled on many Lenovo laptops in the past six months. Like a lot of the bloatware that comes on new computers, Superfish exists to help push advertising, not to serve any real consumer need. That would be annoying enough, but Superfish seriously undermines the user's safety, according to many security experts. Superfish is a piece of third-party software that Lenovo installed to, as it says in its apology to consumers, “enhance the shopping experience.” That means it's meant to help advertisers target potential customers. But security...
  • Today is The Last Day to Get 2GB of Free Google Drive Storage

    02/17/2015 7:06:15 AM PST · by lbryce · 17 replies
    Business Insider ^ | February 17, 2015 | Steven Tweeedie
    Please seem my comments below Google Drive is offering its users 2GB of free storage for completing a simple security checkup. It only takes a couple of minutes to complete, but the offer only lasts until Feb. 17. Designed to make sure everything about your account is shipshape, the security checkup runs through a checklist of security features examining your account recovery information, recent activity, account permissions, and your 2-step verification settings. To access the security checkup, head on over to your Google account page. Next, click "Get Started" button to begin the checkup.
  • Microsoft rescues XP users with emergency browser fix

    05/01/2014 10:50:49 AM PDT · by dayglored · 71 replies
    Reuters ^ | May 1, 2014 | Jim Finkle
    Microsoft is helping the estimated hundreds of millions of customers still running Windows XP, which it stopped supporting earlier this month, by providing an emergency update to fix a critical bug in its Internet Explorer browser. Microsoft Corp rushed to create the fix after learning of the bug in the operating system over the weekend when cybersecurity firm FireEye Inc warned that a sophisticated group of hackers had exploited the bug to launch attacks in a campaign dubbed "Operation Clandestine Fox. ...
  • Stop using Microsoft's IE browser until bug is fixed, US and UK warn

    04/28/2014 6:24:40 PM PDT · by markomalley · 52 replies
    CNET ^ | 4/28/2014 | Seth Rosenblatt
    It's not often that the US or UK governments weigh in on the browser wars, but a new Internet Explorer vulnerability that affects all major versions of the browser from the past decade has forced it to raise an alarm: Stop using IE. The zero-day exploit, the term given to a previously unknown, unpatched flaw, allows attackers to install malware on your computer without your permission. That malware could be used to steal personal data, track online behavior, or gain control of the computer. Security firm FireEye, which discovered the bug, said that the flaw is being used with a...
  • Computer Security Software Opinion

    04/21/2014 7:05:52 AM PDT · by GYPSY286 · 31 replies
    None | April 21, 2014 | Gypsy286
    Favored Computer Security Software-What's the best and most economical?
  • Apple Says iOS, OSX and “Key Web Services” Not Affected by Heartbleed Security Flaw

    04/11/2014 5:58:05 PM PDT · by Swordmaker · 36 replies
    ReCode.net ^ | April 10, 2014, 1:42 PM PDT | By Mike Isaac
    Apple said Thursday that its mobile, desktop and Web services weren’t affected by a major flaw in a set of security software used by hundreds of thousands of websites. The flaw, codenamed “Heartbleed” and first reported by Web security firm Codenomicon, was discovered in a technology called “OpenSSL” — a set of encryption software used by Web companies to safeguard user information. Sites that use OpenSSL will display a small “lock” icon in the top left-hand corner of your Web browser’s address bar (though not all sites showing this lock use OpenSSL); the technology is used on more than two-thirds...
  • NSA Paid a Huge Security Firm $10 Million to Keep Encryption Weak

    12/20/2013 4:16:47 PM PST · by James C. Bennett · 99 replies
    Gizmodo ^ | 20 dec 2013 | Gizmodo
    Reuters reports that the NSA paid massive computer security firm RSA $10 million to promote a flawed encryption system so that the surveillance organization could wiggle its way around security. In other words, the NSA bribed the firm to leave the back door to computers all over the world open. Thanks to documents leaked by Edward Snowden, we already knew the NSA played a central role in promoting a flawed formula for generating random numbers, which if used in encryption, essentially gives the spies easy access to computing systems. A piece of RSA software, bSafe, became the most significant vector...
  • How The NSA Deploys Malware: An In-Depth Look at the New Revelations

    10/09/2013 10:34:00 AM PDT · by shego · 23 replies
    EFF ^ | 10/8/13 | Dan Auerbach
    We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to infect the computers of targeted users. The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a...
  • How to remain secure against NSA surveillance

    09/06/2013 4:15:48 AM PDT · by shego · 41 replies
    The Guardian ^ | 9/5/13 | Bruce Schneier
    Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.... At this point, I feel I can provide some advice for keeping secure against such an adversary.... 1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them.... 2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections--and it may have explicit exploits...
  • (Vanity) BEST free antivirus/security program?

    09/03/2013 1:08:21 PM PDT · by Doogle · 96 replies
    me | 09/03/13 | me
    Need to download a FREE program...need recommendations..