Recent Posts

Pages: [1] 2 3 ... 10
General Software / Re: CCleaner Updates
« Last post by hayc59 on Today at 03:32:09 pm »
CCleaner vv5.49.6856 Released
12 Nov 2018

Whats New
• Minor bug fixes
• Small UI improvements
Windows and Browser Cleaning
• Added and improved cleaning to the Common Language Runtime (CLR) folders
• Extended the cleaning of Windows error reporting temporary folders
• Fixed Firefox cleaning rules which were causing corrupted profiles for some users

Download CCleaner 5.49
Other Builds
Whats New

Caution: Many companies are adding or bundling prechecked offers of other software with their installation processes.
UNCHECK any unwanted, prechecked software installs that may be offered.
Author: November 12, 2018Mohit Kumar

Windows 10 users don't have to wait much longer for the support of latest WPA3 Wi-Fi security standard, a new blog post from Microsoft apparently revealed.

The third version of Wi-Fi Protected Access, in-short WPA3, is the next generation of the wireless security protocol that has been designed to make it harder for attackers to hack WiFi password.

WPA3 was officially launched earlier this year, but the new WiFi security standard won't arrive overnight. Most device manufacturers could take months to get their new routers and networking devices certified by the Wi-Fi Alliance to support WPA3.

Meanwhile, technology providers have already started working on software and firmware updates to support the new WPA3 standard, including Microsoft.

Full Article Here:
Author: November 12, 2018Mohit Kumar

Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make.

Here's what they found were the most important factors for making sure you earn as much as possible:

Full Article Here:
Author:  Help Net SecurityNovember 12, 2018

There have been 3,676 publicly disclosed data compromise events through September 30. Breach activity continues at a consistent pace for 2018, which although significant in level, will likely not reach the numbers we saw in 2017, according to the 2018 Q3 Data Breach QuickView report by Risk Based Security.

Incidents by data type exposed

The number of reported breaches shows some improvement compared to 2017 and the number of records exposed has dropped dramatically,” said Inga Goddijn, Executive Vice President for Risk Based Security. “However, an improvement from 2017 is only part of the story, since 2018 is on track to have the second most reported breaches and the third most records exposed since 2005. Despite the decrease from 2017, the overall trend continues to be more breaches and more mega breaches impacting tens of millions, if not hundreds of millions, of records at once.”

Full Article Here:
Author:  Help Net SecurityNovember 12, 2018

Ping Identity surveyed more than 3,000 people across the United States, United Kingdom, France and Germany to find out what they expect from brands when it comes to the safekeeping of personal information.

The survey reveals many consumers are making drastic changes to the ways they interact with companies and secure their own personal data following a breach:

    78 percent of respondents would stop engaging with a brand online and more than one third (36 percent) would stop engaging altogether if the brand had experienced a breach.
    Nearly half (49 percent) would not sign up and use an online service or application that recently experienced a data breach.
    Almost half (47 percent) have made changes to the way they secure their personal data as a result of recent breaches and over half (54 percent) are more concerned with protecting their personal information today than they were a year ago.

Full Article Here:
Security & Technology News / Technology/ The best free drawing software
« Last post by Antus67 on November 11, 2018, 02:11:28 pm »
Author: Kevin Parrish

Although there are ways to try out Adobe Photoshop for free, it’s not cheap to enjoy long-term. Photoshop alone costs $120 per year and Illustrator is even more expensive.

But Adobe’s popular titles aren’t your only options. The following solutions are highly competitive with Illustrator and Photoshop, but don’t break the bank. They are backed by a community of developers who believe you should have the best tools possible through an open-source platform.

The best

Inkscape is likely the more widely used vector-based drawing software since its introduction in 2003. Thirteen years later, it’s still in a “preview” release, but a great free professional-grade alternative to Adobe Illustrator nonetheless. It’s backed by an international community who can get you started, and will help with any problems you may encounter with the open-source software.

Just like Illustrator, Inkscape has everything a digital artist needs to create near-photo quality illustrations. Your basic toolset includes creating straight lines, freehand lines, shapes, 3D boxes, Bezier curves, spirals, and so much more. You can add layers, color fills, and even effects to your drawing such as blurs, bevels, shadows, textures, glows, and so on.

Full Article Here:
Security & Technology News / Bug Bounty Hunter Ran ISP Doxing Service
« Last post by Antus67 on November 11, 2018, 02:02:09 pm »
Author: Brian Krebs

A Connecticut man who’s earned bug bounty rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites secretly operated a service that leveraged these same flaws to sell their customers’ personal data, KrebsOnSecurity has learned.

In May 2018, ZDNet ran a story about the discovery of a glaring vulnerability in the Web site for wireless provider T-Mobile that let anyone look up customer home addresses and account PINs. The story noted that T-Mobile disabled the feature in early April after being alerted by a 22-year-old “security researcher” named Ryan Stevenson, and that the mobile giant had awarded Stevenson $1,000 for reporting the discovery under its bug bounty program.

The Twitter account @phobia, a.k.a. Ryan Stevenson. The term “plug” referenced next to his Twitch profile name is hacker slang for employees at mobile phone stores who can be tricked or bribed into helping with SIM swap attacks.

Full Article Here:
Author: Mirko Zorz, Editor in Chief November 9, 2018

Large, modern enterprises strive to achieve maximum productivity, so it’s no wonder most take advantage of the flexibility provided by remote working. People working from home or in places like coffee shops, hotels and public transport has become normal.

If you work in the information security industry, chances are you’ve experienced work outside of the office: working on the airplane on your way to a client, checking in on the status of your project while attending a conference, or you might work from home at least one day every week like 70% of people around the globe, according to a study released by serviced office provider IWG.

As the cybersecurity skills gap shows no signs of closing, it’s not uncommon for companies to run teams with team members and security personnel located around the globe. Two-thirds of IT, security and other nontechnical employees said it’s difficult for their organization to find qualified cybersecurity professionals. That’s why, to meet the changes of today’s fast-paced threat landscape, remote work for infosec professionals is not just a perk, but also a necessity.

Full Article Here:
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by schmidthouse on November 11, 2018, 12:21:05 am »
Is update check turned on? No notice w/4.64 running.

Maybe because it's only offered here at present?
I got 4.64 from the website, as well as 4.65, so we can rule that out.

FWIW the 4.65 installer file identifies itself as with a mouse hover.

Yup noticed that myself
4.65 running great on latest Win 10  OS's
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by Telos on November 11, 2018, 12:10:20 am »
Is update check turned on? No notice w/4.64 running.

Maybe because it's only offered here at present?
I got 4.64 from the website, as well as 4.65, so we can rule that out.

FWIW the 4.65 installer file identifies itself as with a mouse hover.
Pages: [1] 2 3 ... 10