Over at the Naked Security blog, analyst Fraser Howard has delivered some insights into the Redkit exploit kit that being used to distribute malware. It was used in the NBC website hack earlier this year as well as spam attacks that were launched in the aftermath of the Boston Marathon bombings. It’s worth a look if you’re interested in the inner workings of this piece of malware.
Computers picture Image from Shutterstock
Hi Lifehacker, Recently I’ve had a series of break and enter attempts made against my home. Whilst none have been successful yet, my biggest concern is the police and I have minimal evidence of what has happened. There is no CCTV in/around the street, no witnesses and I personally haven’t got a look at the person(s) involved. The police are going to send a forensics team this time to try and pull prints.
If your windows or sliding doors have locks that slide vertically or horizontally, a simple paint trick will help you tell at a glance and from a distance if they’re locked. Reddit user HandCannon painted the bottom of the sliding glass door lock white, so it’s easy to tell when the lock is in the locked position.
They say a fool and his money are soon parted — but the idiom could just as easily apply to lonely hearts. Romance fraud is currently one of the hottest enterprises in the cybercrime industry, with thousands of lovelorn Aussies being hoodwinked out of their cash on a daily basis. We spoke to detective superintendent Brian Hay from the Queensland Fraud Sqaud and Sabour Bradley; the host of the new documentary series Head First which tackles romance fraud in its first episode (airing on ABC2 tonight). Here are their top tips on how to avoid the cyber “love” crime honey trap.
The daily deals site LivingSocial has been hacked, revealing more than 50 million people’s usernames, names, birth dates, passwords, and email addresses. Here’s what you need to know.
Decisions about implementing cloud solutions are often stalled by concerns over security issues. Microsoft’s Cloud Risk Decision Framework provides a structured way to assess the risks and benefits of cloud solutions and choose the right combination of technologies for your business.