Security News

Security News - RSS Feed for this Section

Recently, confidential data from popular photo and video sharing app Snapchat was compromised and was made available online to download freely. Two exploits and Snapchat’s API were published by Australian hackers last week, but were ignored by the Snapchat so here comes the reaction. Anonymous hackers hacked the Snapchat database couple of days back and released the information on a website snapchatdb.info. Snapchatdb.info was suspended due to huge traffic and download requests but the usernames and phone numbers of around 4.6 million Snapchat users were exposed. You can still view the cached version of the website here. Hackers provided a link to download hacked database as SQL dump or CSV file. The main purpose of the hackers seemed to be releasing huge information of millions of phone numbers and usernames to collect donation in return and to alert Snapchat so that they may fix the exploits.

{ read more }

guide to clean pc

I have been using many software / programs to clean PC, detect malware, spyware, trojans, rootkits, viruses, security threats and to remove them. I will mention those all essential effective software here. If you are comfortable with installing, uninstalling software and have got a bit of time then you can trust the following software. Believe me when I say, You should change antivirus program like you change your tooth paste. If you are wondering on why to change your tooth paste then ‘May God help you with your data in your PC’. :)

I have got free antivirus programs to share, free online virus scanners and best free tools to clean PC.

{ read more }

I advise you to visit Microsoft Malware Protection Center regularly to get updated about latest threats, security news and advice. Microsoft has put together a list of AV rogues which are detected by the company’s antivirus products, including Microsoft Security Essentials, Forefront Client Security, etc.

According to Microsoft:

Rogue security software programs typically mimic the general look and feel of legitimate security software, claiming to detect a large number of nonexistent threats and urging the user to “activate” the software to remove them. Some families emulate the appearance of the Windows Security Center or unlawfully use trademarks and icons to misrepresent themselves. Rogue security software spreads through familiar malware distribution mechanisms, like spam and exploits, and through customized tactics, like a fake Webbased security scanner. After installation, some rogue security software families take other actions to evade detection or to frighten the user into paying.

Rogue security software displays false or misleading alerts about infections or vulnerabilities on the victim’s computer and offers to fix the supposed problems for a price. It has become one of the most common methods that attackers use to steal money from victims. These are programs that mask themselves as legitimate security programs offering protection from malware, spyware, and other threats, but actually use social engineering to obtain money from victims, and offer poor or nonexistent protection.

{ read more }

by on May 9th, 2010

Off and on you will find Windows giving error related to missing dll file when you try to start some application or game. What most users do is to search that file name and land at website which will give them dll file to download and use. Well, don’t do that. Websites that allow easy downloads of single DLL files seem like the answer you’ve been looking for when you get one of those annoying “DLL not found” or “DLL is missing” errors. DLL download sites should always be avoided, even though they sometimes provide a quick fix. There are perfectly safe and acceptable ways of fixing DLL problems without resorting to downloading individual DLL files from these sites. Updating your PC drivers, DirectX or software framework can resolve the issue. Usually, the solution to the actual problem is to reinstall the entire software package that the DLL originated from.

There are a number of reasons that you may end up paying more for your easy solution than you might have thought so check out these very important reasons to avoid downloading dll files.

{ read more }

Chat rooms, where many people gather for live interaction, are among the riskiest places on the internet – where kids are most likely to “talk” with strangers. Chatting has become one of the most popular uses of the Internet by everyone. There are many chat programs available free for the downloading and by visiting chat rooms, kids have the chance to meet and form friendships with children from all around the world. As fun as it sounds, it can also be dangerous. You can help make chatting safer for your children by being aware of the dangers. Always know what your child is doing when he or she is using the Internet. You can set parental controls to help make sure they don’t get into web sites intended for adults, but chat rooms are a different matter. Usually all you need to get into a chat room is an Internet connection, the chat program, and an identifying nickname. Some chat rooms are designed especially for children, but others are adult oriented and should never be visited by anyone under the age of 18. Here are a few guidelines to make sure that your child’s chat experience is a safe one:

{ read more }

You can save yourself, friends and family if you know the laws and right measures to take against cybercrimes. The web as we know today is more vulnerable and not safe if we are not careful. All the social networking sites are doing pretty much good job to bring people we know and may not know closer, making our personal identity ‘not personal’.

Specially Kids’ Virtual World Safety Tips, Virtual World Safety Tips for Parents of Teens, Tips to Help Stop Cyberbullying, Tips to Prevent Sexting, Tips for Strong, Secure Passwords, Social Web Tips for Teens, Social Web Tips for Parents, Cellphone Safety Tips, Safety Tips for Video-Sharing, Chat Room Safety Tips, Internet filters have their place, but not for all kids, One family’s tech policy, Clicks & cliques: *Meaty* advice for parents on cyberbullying, Social norming: Increasingly key to kids’ Net safety, Dealing with cyberbullying on YouTube, ‘Soft power’ parenting works better, How to hide your Facebook friends list, ‘How to bully-proof yourself on Facebook’, Avoiding social networking scams are some of the articles at ‘Connect Safely’ you should definitely read.

{ read more }

Sexting fall into the category of cyberethics. Sexting refers to teens sharing nude photos via cellphone or email, but it’s happening on other devices and the Web too at global level. The practice can have serious legal and psychological consequences. Sexting is not a new behavior; it is one that is accelerated by technology. As smart phones become more robust with the addition of cameras, video and internet capabilities, it’s easier to capture all manner of images and with a couple of quick clicks share them with another person or a group of people. As fast as technology changes and infuses our lives, laws and polices take a long time to catch up. In the case of sexting, when young people share intimate photos of others to embarrass, retaliate, or bully there had been no legal framework developed specifically to address the behavior. Law enforcement and prosecutors, left with few choices, have prosecuted for the distribution of child pornography for the sharing of images if people under the age of 18. If convicted, this could mean serving time in prison (5 years) and being registered as a sex offender for life.

In one case, a school administrator in Virginia was arrested and charged with possession of child pornography when in addressing a disciplinary problem in the school that involved a suggestive picture that was being sent around, he asked a student to send the picture to his phone and then put it on his computer. Technically this was a crime; it took more than a year, significant legal fees, and the near ruin of a person’s career.

{ read more }

Have you received any suspicious file, attachment you are unable to recognize via email? Best online security practices describe that do not open and run any attachment from unreliable source and make sure you know the sender is trusted. Normally popular services will mark that file as suspicious and put that email in junk folder. You might still want to know about that file before running it on your PC. Here is an online service which will analyze and detect any threat in files and give you details about any file from multiple antivirus engines.

{ read more }