Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Cybersecurity (Page 1 of 6)

Zoom Users Can Now Secure Accounts with Two-Factor Authenticatoin

0160e020.jpg
One of the beneficiaries of the global pandemic is, without a doubt, video conferencing companies. Zoom has seen its business skyrocket as more and more people work from home, and with that came security scrutiny. The company hasn’t been resting on its laurels, though, and now it’s introducing two-factor authentication (2FA) for your accounts.

Read This Article on Review Geek ›

Source: https://www.reviewgeek.com/53603/zoom-users-can-now-secure-accounts-with-two-factor-authenticatoin/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Josh Hendrickson

The Ultimate Defense: What Is an Air Gapped Computer?

cutting-an-ethernet-cable.jpg
When reading about cyber-security, you’ll probably see talk about “air-gapped” computer systems. It’s a technical name for a simple concept: A computer system that’s physically isolated from potentially dangerous networks. Or, in simpler terms, using a computer offline.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/687792/the-ultimate-defense-what-is-an-air-gapped-computer/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Chris Hoffman

How to Use the Snort Intrusion Detection System on Linux

59b60e83.png
Run Snort on Linux and protect your network with real-time traffic analysis and threat detection. Security is everything, and Snort is world-class. This pig might just save your bacon.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/6424/how-to-use-the-snort-intrusion-detection-system-on-linux/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dave McKay

Tesla worked with the FBI to block a million dollar ransomware attack

63e92570-e86b-11ea-8fff-9f36cd920670Earlier this week, the FBI arrested a 27-year-old Russian citizen for attempting to carry out a ransomware attack against a US company. It turns out that company was Tesla, Electrek reports.According to a complaint shared by the Department of Justice…

Source: https://www.engadget.com/tesla-fbi-ransomware-attack-nevada-gigafactory-141547760.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

Jack Daniel’s Hit with Ransomware, Decade of Data Stolen

news-jack-daniels-ransomware-featured.jp It doesn’t matter the size of your company or what your business is – you are still susceptible to a cyberattack. The Jack Daniel’s distributor found that out when it was hit with a ransomware attack. Read on to find out what the ransomware operators spirited away with and what the alcohol distributor did right that helped limit the impact. Ransomware Attack on Jack Daniel’s Brown-Forman is headquartered in Louisville, Kentucky. Its most famous brand name is Jack Daniel’s Whiskey, though the company also distributes Woodford, Old Forester, Collingwood,… Read more13823589.gif

Source: https://tracking.feedpress.com/link/12555/13823589/jack-daniels-ransomware-data-stolen
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Laura Tucker

Google Drive flaw may let attackers fool you into installing malware

34a0dec0-e4ab-11ea-bdf6-47f73e4c98bbGoogle Drive may have a way for hackers to trick you into installing rogue code. System administrator A. Nikoci has told The Hacker News about a flaw in Drive’s “manage versions” feature that could let attackers swap a legitimate file with malware. T…

Source: https://www.engadget.com/google-drive-manage-versions-security-flaw-194323948.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

Is Your Browser a Good Enough Password Manager?

qmtjhr1f8y4hcdrfu13o.jpg

Web browsers were once used simply for browsing the web. But now they can perform all kinds of tricks, including managing passwords. With new features like password suggestions and data breach warnings being added all the time, are these built-in password managers ready to take on the dedicated third-party tools?…

Read more…

Source: https://gizmodo.com/is-your-browser-a-good-enough-password-manager-1844685005
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: David Nield

How to Lock Your Windows PC After Signing In Automatically

windows-10-lock-screen-asking-for-pin.jp
On Windows, automatic sign-in is convenient because you can have your PC launch programs when it starts. You can even have your PC automatically boot at specific times. For improved security, you can have Windows 10 automatically lock itself and require a password after automatic sign-in.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/684639/how-to-lock-your-windows-pc-after-signing-in-automatically/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Chris Hoffman

NSA and FBI warn that new Linux malware threatens national security

NSA and FBI warn that new Linux malware threatens national security

Enlarge (credit: Suse)

The FBI and NSA have issued a joint report warning that Russian state hackers are using a previously unknown piece of Linux malware to stealthily infiltrate sensitive networks, steal confidential information, and execute malicious commands.

In a report that’s unusual for the depth of technical detail from a government agency, officials said the Drovorub malware is a full-featured tool kit that was has gone undetected until recently. The malware connects to command and control servers operated by a hacking group that works for the GRU, Russia’s military intelligence agency that has been tied to more than a decade of brazen and advanced campaigns, many of which have inflicted serious damage to national security.

“Information in this Cybersecurity Advisory is being disclosed publicly to assist National Security System owners and the public to counter the capabilities of the GRU, an organization which continues to threaten the United States and U.S. allies as part of its rogue behavior, including their interference in the 2016 US Presidential Election as described in the 2017 Intelligence Community Assessment, Assessing Russian Activities and Intentions in Recent US Elections (Office of the Director of National Intelligence, 2017),” officials from the agencies wrote.

Read 13 remaining paragraphs | Comments

index?i=YGyISEBP9Tk:Rjph41yoUbo:V_sGLiPB index?i=YGyISEBP9Tk:Rjph41yoUbo:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA

Source: https://arstechnica.com/?p=1698939
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dan Goodin

How to Hide Files with Google’s Safe Folder on Android

files-safe-folder-1.png
Smartphones are incredibly personal devices, and they can contain sensitive information. If you’re worried about prying eyes finding something they shouldn’t, you can hide and lock files behind a four-digital pin with Safe Folder in the Files by Google Android app.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/684738/how-to-hide-files-with-googles-safe-folder-on-android/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Joe Fedewa

« Older posts