Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Cybersecurity (Page 2 of 4)

How to See What Malware Windows Defender Found on Your PC

windows_10_hero_2.jpg
If you use Windows Defender Antivirus for malware detection and removal on Windows 10, it’s easy to keep an eye on Defender’s performance with a built-in list of every threat the utility has detected on your PC. Here’s how to view it.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/671235/how-to-see-what-malware-windows-defender-found-on-your-pc/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Benj Edwards

Avast Secure Browser Review

Avast-Browser-Review-Feature.jpg This is a sponsored article and was made possible by Avast. The actual contents and opinions are the sole views of the author who maintains editorial independence, even when a post is sponsored. These days, there are plenty of browsers you can use to access the internet, but the top three see the vast majority of users. Whether you’re a long-time fan of Chrome, a stalwart Firefox user, or are trying out the brand new Microsoft Edge remix, you’ve probably tried and tested the competition. Did you know, however, that Avast now has its own browser? It’s called… Read more13582597.gif

Source: https://www.maketecheasier.com/avast-secure-browser-review/?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+maketecheasier
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Simon Batt

Cisco security breach hits corporate servers that ran unpatched software

Cisco security breach hits corporate servers that ran unpatched software

Enlarge (credit: Prayitno / Flickr)

Six servers Cisco uses to provide a virtual networking service were compromised by hackers who exploited critical flaws contained in unpatched versions the open source software service relies on, the company disclosed on Thursday.

Got updates?

The May 7 compromise hit six Cisco servers that provide backend connectivity to the Virtual Internet Routing Lab Personal Edition (VIRL-PE), a Cisco service that lets customers design and test network topologies without having to deploy actual equipment. Both the VIRL-PE and a related service, Cisco Modeling Labs Corporate Edition, incorporate the Salt management framework, which contained a pair of bugs that, when combined, was critical. The vulnerabilities became public on April 30.

Cisco deployed the vulnerable servers on May 7, and they were compromised the same day. Cisco took them down and remediated them, also on May 7. The servers were:

Read 5 remaining paragraphs | Comments

index?i=NxFLROC4pT0:32UmibZWdbw:V_sGLiPB index?i=NxFLROC4pT0:32UmibZWdbw:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA

Source: https://arstechnica.com/?p=1679668
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dan Goodin

How to Add Exclusions in Windows Defender on Windows 10

windows_10_hero_2.jpg
Windows Defender, integrated into Windows 10, runs in the background and scans your files for malware. To improve performance for tasks like compiling code or running virtual machines, you can add an exclusion and Windows Defender will never scan those files.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/671233/how-to-add-exclusions-in-windows-defender-on-windows-10/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Benj Edwards

How to Set Up a Firewall in Linux

disable-enable-manage-ubuntu-firewall-fe To keep your computer safe, it is advisable to set up a firewall to prevent others from accessing your computer and protect you from network attacks. However, if you are a new Linux user, you might not know how to configure the firewall in your system. You’ll learn here how to set up a firewall in Linux and how to easily add rules to allow access for other devices in your local network or specific ports. UFW = Uncomplicated Firewall We’ll use UFW to manage your Linux firewall since it is easy to use and comes installed by… Read more13556740.gif

Source: https://www.maketecheasier.com/how-to-set-up-firewall-linux/?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+maketecheasier
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Odysseas Kourafalos

Senate passes FISA renewal bill, sends it back to the House

200422-doj-seal-ap-773.jpg

The Senate approved legislation Thursday to renew a handful of key domestic surveillance powers, but only after civil libertarians attached language that the Justice Department warns would “unacceptably degrade” national security.

Now the bill goes back to the House for possibly more tinkering, leaving a cloud over its chances for swift final approval.

The USA Freedom Reauthorization Act of 2020 passed the Senate by an 80-16 vote more than two months after the House approved it by a wide, bipartisan margin. But Thursday’s vote came a day after Senate privacy hawks successfully amended the bill to expand legal protections for certain groups of individuals targeted by federal surveillance — a change that DOJ labeled unacceptable.

“We appreciate the Senate’s reauthorization of three expired national security authorities,” department national security spokesman Marc Raimondi said in a statement. But he said the amended bill “would unacceptably degrade our ability to conduct surveillance of terrorists, spies and other national security threats.”

President Donald Trump, who has accused a government “deep state” of misusing its spying powers, also has not indicated whether he would sign the bill.

The vote occurred mere hours after the announcement that Sen. Richard Burr (R-N.C.), who in March argued passionately against letting the authorities lapse, will temporarily step down as chairman of the Senate Intelligence Committee amid a probe into his stock trades.

House Speaker Nancy Pelosi didn’t say during her weekly news conference Thursday when the chamber would take up the amended measure.

A Democratic leadership aide told POLITICO that it won’t be considered on Friday when the House convenes to vote on the latest Covid-19 relief package. The aide said the leadership was “assessing next steps.”

The FISA renewal bill includes new privacy protections that Attorney General William Barr had helped negotiate and would impose new requirements on the FISA court system. Those were inspired in part by Trump’s allegations that the Obama administration improperly used the spying tools to wiretap his former campaign adviser Carter Page during the initial probe of Russian interference in the 2016 election.

The bill would also permanently end an already deactivated NSA program that had allowed the agency to obtain, with judicial approval, Americans’ phone records in terrorism probes.

Thursday’s successful passage came months after the House voted to reauthorize the authorities with modest changes. The Senate, however, couldn’t reach an agreement for quick passage of the House bill in March amid objections from the chamber’s privacy advocates. The chamber eventually adopted a 77-day extension as a short-term solution, but the House never took it up.

The intelligence tools the authorities enabled have remained offline ever since.

The measure now kicks back to the House, where progressives and libertarians could use the Senate’s changes as leverage to reopen debate on the legislation and try to amend it even further. That’s especially a possibility for those GOP members who have demanded that the chamber reopen for business as usual despite the pandemic.

Sen. Mike Lee (R-Utah), who along with Sen. Patrick Leahy (D-Vt.) secured the amendment expanding legal protections, called the legislation a “good bill.”

“We got some good reforms here. They are consistent with many of the aims that House members who negotiated the last House bill had in mind,” Lee told POLITICO before the final vote. He had previously lobbied Trump to veto the measure if it reached his desk unaltered.

“I’m certainly not going to tell them what to do with it,” Lee added, though he suggested he might support something similar to a proposed amendment from Sens. Ron Wyden (D-Ore.) and Steve Daines (R-Mont.) that would have protected Americans’ internet browsing and search histories from federal surveillance. It came up just one vote shy of the 60-vote threshold.

Rep. Zoe Lofgren (D-Calif.) said the Leahy-Lee amendment “took us a step closer to properly protecting Americans’ civil liberties, and it’s clear we need to go farther.” She had successfully scuttled the House’s first surveillance package in February just hours before the House Judiciary Committee was due to mark it up.

On Thursday, she specifically cited the Wyden-Daines amendment, saying that “it’s now the House’s responsibility to curb this violation of Americans’ rights. I know it’s still within our grasp as lawmakers to push for the significant privacy reforms we need.”

Other House members also seem itching for a fresh surveillance fight.

“Although I am pleased that the Lee-Leahy Amendment passed, I oppose the bill without further amendment. If permitted by House rules, I will offer amendments,” Rep. Warren Davidson (R-Ohio) said in a statement to POLITICO. He and Lofgren co-sponsored an alternative renewal bill to the one the House passed.

Source: https://www.politico.com/news/2020/05/14/senate-passes-fisa-renewal-259064
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Martin Matishak

How to Unlock Android Phone’s Safe Folder

Featured-Unlock-Android-Phone-Safe-Folde Do you have any favorite pictures or files on a phone you don’t want others to view? On certain Android handsets, there is a built-in safe feature that allows you to encrypt and hide these private files using a pattern or PIN. Retrieving these files can sometimes be tricky, as the exact location of the safe is hidden from view in specific phones. By mistake, you may find yourself locked out of your own personal data. If you’re wondering how to recover your files from such an inaccessible Android safe folder, follow the methods below to unlock your Android safe folder…. Read more13532762.gif

Source: https://www.maketecheasier.com/unlock-android-phones-safe-folder/?utm_medium=feed&utm_source=feedpress.me&utm_campaign=Feed%3A+maketecheasier
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Sayak Boral

What Is a Man-in-the-Middle Attack?

free-wifi-trap.jpg
A man-in-the-middle (MITM) attack occurs when someone sits between two computers (such as a laptop and remote server) and intercepts traffic. This person can eavesdrop on, or even intercept, communications between the two machines and steal information.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/668989/what-is-a-man-in-the-middle-attack/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Matthew Hughes

« Older posts Newer posts »