Sunday, February 07, 2016

Monday, February 01, 2016

Have You Been Hacked ?

Use this Service from Roboform to check if you have been hacked, it covers many leaks and hacked databases. hope you use different passwords for different sites.

Saturday, December 26, 2015

Panopticlick !

When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software.

Panopticlick is a research project of the Electronic Frontier FoundationLearn more

Monday, December 14, 2015

Security Features Check !!!

The Anti-Malware Testing Standards Organization (AMTSO™) was founded in May 2008 as an international non-profit association that focuses on the addressing the global need for improvement in the objectivity, quality and relevance of anti-malware testing methodologies.

The website hosts a number of easy to use tools to ensure that endpoint security products are configured to protect you from viruses, drive-by-downloads, potentially unwanted applications (PUA), archived malware and phishing and cloud attacks across major operating systems both desktop and mobile.

Feature Settings Check for your favorite Anti-Malware Desktop solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.

Feature Settings Check for your favorite Android based Anti-Malware Solution. With the different checks you can verify if the corresponding feature is configured properly within your Anti-Malware solution.

NOTE: None of the files downloaded nor pages visited are malicious by any means. It is only by industry-agreement that these innocent files are detected, solely for the purpose for the users to verify that their Android based Anti-Malware Solution is configured correctly and reacting as expected


Friday, January 23, 2015

Google reveals 3 Apple OS X Zero-day Vulnerabilities

Project Zero has yet again revealed three more zero-day vulnerabilities this time on OS X. The team has published three zero-day exploits for Apple’s OS X, with sufficient information for an experienced hacker to exploit the bugs in an attack. The details about the zero-days were released after alerting Apple to them. All three require physical access and cannot be exploited remotely.

Google reveals 3 Apple OS X Zero-day Vulnerabilities

Google's Project Zero is an initiative that identifies security holes in different software and calls on companies to publicly disclose and patch bugs within 90 days of discovering them. The company’s tight 90-days disclosure policy encourages all software vendors to patch their products before they could get exploited.

Friday, January 16, 2015

Malwarebytes Anti-Exploit!

"Popular software programs contain millions of line of code. Hackers exploit flaws (vulnerabilities) in the code to deliver malware. Except when they can't. Malwarebytes Anti-Exploit wraps four layers of security around popular browsers, preventing exploits from compromising vulnerable code. Not an antivirus, and compatible with most antivirus, Malwarebytes Anti-Exploit is a small, specialized shield designed to protect you against one of the most dangerous forms of malware attacks. And it's free."

Better and faster compared to running the browser in a sandbox. Available only on Windows.

Download >> hosts a collection of lists that provide information on the components of legitimate and potentially unwanted programs. They are maintained by superb members of the Internet community, for the benefit of the community at large.

 + Check out this kool script (in python) that parses to the site.

Friday, January 09, 2015

ISTR Annual Report

2014 Internet Security Threat Report, Volume 19

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

Overview and Analysis
98 pages, 11.5 MB (PDF)

Additional Stats and Information
116 pages, 3 MB (PDF)