Jeff Evenson

20 Added | 1 Magazine | 7 Likes | 7 Following | 1 Follower | @retiredchief | I do what I can.

Whole Foods latest to fall victim to credit card breach

And the hacks just keep on coming.<p>Whole Foods, one of the country’s most popular grocery chains, is facing a credit card security breach involving …

Whole Foods

This New Wave of Malware Could Blow Last Week's Attack Out of the Water

A new potential malware is spreading throughout insecure systems, and could potentially be worse than recent malware attacks when it finally strikes.<p>Almost two weeks ago a wave of malware attacked computers around the world. The "WannaCry" ransomware infected hospitals in the U.K. and FedEx in the …

How to Use Nessus To Scan a Network for Vulnerabilities

When it comes to network security, most of the tools to test your network are pretty complex. Nessus isn’t new, but it definitely bucks this trend. …

Information Security

This Infographic Shows The Common Ways Scammers Try To Phish Your Account

Chances are if your email or social media account has ever been compromised, you accidentally gave your credentials to the scammers yourself. The …

Identity Theft

Economic Espionage: The Scrupulous and Unscrupulous Competitors

When we think of economic espionage, we hardly every think of our competitors as being a part of the equation. Yet our competition comes to us in …

Wifi Networks Can Now Identify Who You Are Through Walls

Who needs a peep hole when a wifi network will do? Researchers from MIT have developed technology that uses wireless signals to see your silhouette …

Apple Yanks Hundreds Of Data-Swiping Apps From The App Store

Researchers found about 256 apps that violated Apple's privacy policy by collecting personal data.<p>Apple is scrambling to clean up its iTunes App Store for the second time in as many months following another influx of apps that secretly gather personal information.<p>Discovered by analytics firm …

Enthusiasts and Skeptics Debate Artificial Intelligence

Kurt Andersen wonders: If the Singularity is near, will it bring about global techno-Nirvana or civilizational ruin?<p><b>THE GREAT SCHISM</b><p>Artificial intelligence is suddenly everywhere. It’s still what the experts call “soft A.I.,” but it is proliferating like mad. We’re now accustomed to having …

Malicious adware's latest trick is replacing your whole browser

On Friday, infosec celebrity Swift on Security pointed out a new piece of adware called the "eFast Browser." It does the kind of malicious crap that we've all seen quite often over the years: throwing pop-up and pop-under ads on your screen, putting other ads into your web pages, pushing you toward …

Malware

Burner's disposable phone numbers save everything in the cloud

Thanks to <i>The Wire</i> (one of the greatest TV shows ever), we know all about burner phones. These cheap and quickly discarded phones are an easy way to communicate without sharing your permanent number with random folks (or the police). The Burner app for iOS and Android works under the same concept. …

Iranian Cleaver hackers exploit LinkedIn for espionage

The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage purpose.<p>Do you …

Researchers unearth scary new iOS malware, but Apple says it won’t affect devices with iOS 8.4 or later

Gone are the days when iOS malware reports were a rare thing. Following a wave of malware attacks on the iPhone and iPad – including a massive App …

Apps

Tech-Savvy Millennials Stink at Protecting Themselves From Cyber Attacks

Young consumers engage in behavior that opens them up to theft<p>Millennials are suffering from cognitive dissonance when it comes to cyber fraud, …

Cyber-attacks

Apple warning lists top 25 apps infected in massive App Store malware attack

After setting up a special help page that provides information about the massive XcodeGhost malware hack on its website, Apple has listed the top 25 …

Apps

Hide your Online Identity with Whonix

Going through Infosec articles provides us with useful insights into today’s real world scenarios. This article can be treated as an extension of the …

​Biometrics: The password you cannot change

Having the same password for everything is a big no-no in the security world, so what makes biometrics any different?<p>We've all seen the sci-fi films …

Information Systems

Microsoft Outlines Security Protections Using Azure Active Directory

Microsoft officials talked today about how the company's Azure Active Directory (AD) service is using machine learning to thwart cyberattacks.<p>The …

Verizon to world: STOP opening dodgy phishing emails, FOOLS

Phishing and web app security problems remain the most common way for hackers to gain access to sensitive information, according to US telco giant …

Cybersecurity

18-Year-Old Security Flaw Allows Hackers To Steal Credentials From All Versions Of Windows

In 1997, researcher Aaron Spangler discovered a bug in Internet Explorer that allowed an attacker to steal credentials using a protocol known as Windows Server Message Block (SMB). Eighteen years later, a researcher on the Cylance SPEAR research team testing a messaging app with that bug in mind …

IT security