recentpopularlog in

csrollyson : malware   72

Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come | WIRED
MUSTread: Cyberspace is not a target, it's a medium to attack critical infrastructure of whole countries
cyber  war  russia  ukraine  usa  story  example  2017  Q2  hack  power  electric  grid  election  attack  security  military  malware  howto  railroad  alabama  Sandworm  poland  government  pension  defense  crashoverride  utility 
october 2017 by csrollyson
Russia just used Trump’s favorite social network to hack the US government | ZeroFOX
How #Russia tries to make #democracy a liability: #Socialmedia #malware attack on USA DoD
social  media  news  russia  usa  defense  department  government  2017  Q2  attack  cyber  crime  war  employee  howto  example  malware  phishing  spear  bot  2ghcj 
may 2017 by csrollyson
In-Depth Analysis of a Criminal Organization Targeting WordPress Websites
Excellent: brief analysis of criminal org attacking #wordpress sites to sell counterfeit sport apparel
criminal  counterfeit  sport  apparel  analysis  q1  2017  ukraine  china  spam  malware  wordpress  attack  security  host  website  example  ecommerce  copyright 
march 2017 by csrollyson
404 to 301 Plugin Considered Harmful - Wordfence
Do you use this? => #Wordpress #plugin uses #cloaking, distributes #malware
wordpress  plugin  q3  2016  cloak  malware  spam  warn  2execguide  2csrollyson 
august 2016 by csrollyson
This Week's Top 20 Attacked Themes and Who is Attacking Them - Wordfence
Is your #WordPress theme on this list of "most attacked?" If yes, what to do #kudos @wordfence
wordpress  q3  2016  malware  attack  theme  list  rank  howto  2execguide  2csra  2csrollyson  2ghcj  2cdo  advice 
august 2016 by csrollyson
Google Investigation: Ad Injection Is Affecting Millions | Digital - AdAge
#PPI networks #malware by another name: @google report has the latest #ux #cx
q3  2016  google  report  advertising  injection  user  experience  malware  yahoo  skype  opera  PPI  cco  2snr  2execguide  2sbs  2csra 
august 2016 by csrollyson
Clever Attack Uses the Sound of a Computer’s Fan to Steal Data | WIRED
Research: ingenious hacking method on #military & air-gapped systems cyber security
security  hacker  research  Q2  2016  israel  military  malware  airgap  attack  ciso  cio  2csra  2snr 
june 2016 by csrollyson
Wordfence Forensic Team and Site Cleaning Officially Launches - Wordfence
PSA> Have you been #hacked? Simple service gets you clean, online & prevention #kudos #wordpress (I'm a client)
wordpress  security  hack  service  launch  q2  2016  exceptional  remedy  clean  prevention  2snr  2csra  2csrollyson  malware  server  analysis  code 
june 2016 by csrollyson
How Attackers Gain Access to WordPress Sites - Wordfence
MUSTread if you host #WordPress instances/sites: Attacker stats + how-to checklist for keeping secure
wordpress  security  survey  Statistics  q1  2016  howto  guide  plugin  bruteforce  blog  software  platform  website  malware  phishing  hack  theme  hosting  exceptional  list  2csra  2execguide  2sbs  2eglii  2snr 
march 2016 by csrollyson
Fake Frappa-Photos: The Great Coffee Instagram Scam
Helpful glimpse into #Instagram scams, yep, it's the latest darling of malware distributors #kudos
instagram  q1  2016  scam  malware  security  starbucks  example  photo  social  media  criminal  2execguide 
march 2016 by csrollyson
Social Media Security Blog | ZeroFOX
Great security blog, tons of useful info & reports featuring #social #media, #engineering
security  phishing  malware  blog  howto  cdo  cco  reference  research  global  virus  clickbait  social  media  engineering  2csra 
january 2016 by csrollyson
For discerning hackers, malware is so last year | InfoWorld
Grim & predictable: Hackers #social #engineer into corp systems using legit creds, leave few tracks
security  Enterprise  malware  Q3  2015  social  engineering  intrusion  breach  hack  theft  phish  2ghcj  2csra  2cdo 
september 2015 by csrollyson
IDG Connect – Will Google’s certificate change hurt China’s e-economy?
Interesting: Analysis & speculation into #Google rejection of #China certificate authority
china  government  google  hightech  politics  malware  hack  q2  2015  certification  ecommerce  chrome  spy  mitm  ddos  analysis  2ghcj 
april 2015 by csrollyson
Did Lenovo install malware on laptops?
Scandalous: #Lenovo installs malware on machines to serve ads, opens malware exploit
chrome  lenovo  malware  security  policy  Q1  2015  scandal  laptop  web  bank  SSL  compromise  2snr  2sbs 
february 2015 by csrollyson
Criminal Card Games - NYTimes.com
Complains about increasing #data breaches; offers no solutions
pointofview  data  malware  Enterprise  breach  q3  2014  target  homedepot  tjmaxx  retail  pointofsale  credit  card  i.t.  security  privacy 
september 2014 by csrollyson
So long, iOS -- jailbreakers have found their home: Android | Mobile Technology - InfoWorld
Parallels #Android w #Windows for #malware on #jailbreak #Mobile: I have corroborated this separately #fb
android  ios  windows  mobile  jailbreak  malware  virus  Operating_systems  Q3  2014  comparison  apple  google  itunes  play  store  2csrollyson 
august 2014 by csrollyson
NSA 'hijacked' criminal botnets to install spyware | Article | Technology | Reuters.com
Logical: NSA coopting botnets as surveillance infrastructure [new snowden document]
surveillance  Q1  2014  snowden  nsa  botnet  malware  hijack  spy  2ghcj 
march 2014 by csrollyson
6 Ways Health Care Providers Can Reduce Medical Device Security Risks - Deloitte CIO - WSJ
Malware & security risks in #healthcare smart networked devices #IoT - How-to post recommends security strategies #fb
IoT  healthcare  smart  device  malware  hack  security  medicine  ubiquitous  computing  network  cyber  hospital  clinic  howto  deloitte  collaboration  digital  CDO  control  procurement  2cdo  2csra 
february 2014 by csrollyson
WordPress › Support » Eli's Anti-Malware Removal is BY FAR the best
Story and endorsement for "Eli's anti-malware" [Get Off Malicious Scripts]
wordpress  malware  tool  software  service  plugin  review 
july 2013 by csrollyson
Removing Malware from a WordPress Site
Short malware remediation how-to includes recommended tools, plus process #kudos #fb
wordpress  malware  virus  howto  removal  prevention  tool  software  2csrollyson 
july 2013 by csrollyson
Ongoing WordPress Security Attacks, The Details and Solutions | iThemes
MUSTREAD: how-to post on growing trend of Wordpress bruteforce attacks—and how to stay ahead of them #fb
wordpress  security  malware  howto  plugin  brute  force  attack  software  exceptional  password  management  administration 
april 2013 by csrollyson
The cyber war is real -- and our defenses are weak | Security - InfoWorld
Passionate plea to address security w Internet infrastructure not fixes; some links but no proof points
security  pointofview  malware  war  government  usa  israel  china  prc  iran  internet 
february 2013 by csrollyson
Obama Ordered Wave of Cyberattacks Against Iran - NYTimes.com
Exposé of USA/Israel cyberwar against Iran's nuclear material enrichment program at Natanz
usa  obama  iran  nuclear  stuxnet  malware  exposé  Israel  natanz  SAP  centrifuge  Bush  CIA  cyber  war  sabotage  2006  2008  2010  2ghcj 
june 2012 by csrollyson
Inside Facebook security: defending users from spammers, hackers, and 'likejackers' | The Verge
Excellent description of Facebook's basic security/antispam/antimalware processes.. understandable by any user #kudos
facebook  security  enterprise  competency  spam  malware  2execguide 
may 2012 by csrollyson
Malware wake-up call for Mac users | Security - InfoWorld
Argues that macos has "arrived" and Mac users should prepare for many more malware attacks; simple logic, would help to have more specifics
macosx  malware  pointofview  q2  2012  virus  security 
april 2012 by csrollyson
[Infographic] Social Media Security Basics
Very general but might be useful to some; nice summary of major attacks; light on how-to though
social  media  business  platform  security  infographic  facebook  twitter  google  linkedin  exploit  malware  howto  password  spam 
march 2012 by csrollyson
OMGWTF: Passwords of 93,000 Politicians, Reporters, Bloggers Leaked - Falkvinge on Infopolicy
Hacker publishes username & password combinations of Swedish politicians executives journalists in major security breach Thx @alexdc
email  security  password  sweden  politician  executive  journalist  malware  hacker  q4  2011  privacy  2ghcj  breach 
october 2011 by csrollyson
Special report: Government in cyber fight but can
Sobering recap of USA cyber war challenges, capabilities: a new trend
q2  2011  cyber  war  usa  russia  israel  hack  software  malware  contractor  partner  2ghcj 
june 2011 by csrollyson
Coming soon to a Mac near you: serious malware | ZDNet
Sounds nasty but doubt the source; good to think about in any case
macosx  malware  prediction  q2  2011 
may 2011 by csrollyson
Stuxnet: Smarter -- and deadlier -- than the average worm | Security Central - InfoWorld
Brief on Stuxnet, malware that targets industrial systems: rootkits on the plant floor #fb
malware  cyberwar  terrorism  industry  cdc  iran  2010  q4  2ghcj  2snr 
october 2010 by csrollyson
Facebook's Bikini-Wearing Worm - Forbes.com
Another Facebook malware; worth a read to raise yr awareness thx @infosourcer !
Facebook  2fb  Security  Malware  Virus  News  2009 
november 2009 by csrollyson
How to prevent your website from getting hacked. Repair damaged site.
Superb malware virus bot attack explanation and remediation guide- in plain language
wordpress  malware  guide  exceptional 
july 2009 by csrollyson

Copy this bookmark:





to read