Podcasts about antimalware

Computer software to defend against malicious computer viruses

  • 42PODCASTS
  • 63EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 31, 2024LATEST
antimalware

POPULARITY

20172018201920202021202220232024


Best podcasts about antimalware

Latest podcast episodes about antimalware

Computer Talk with TAB
Computer Talk 8-31-24 HR 1

Computer Talk with TAB

Play Episode Listen Later Aug 31, 2024 50:17


Columbus Ohio gas-lighting their residents and silencing a researcher who is simply calling them out. AI Projects failing at 80% , Local Police using AI to reduce reporting time allowing them to be back on the streets, US sues Georgia Tech for lying about its NIST Score and not using Anti-Malware when they said they were,  Gonetspeed, Cams used in Botnet, Using Junk email for sites you don't care about, Can't get my solitaire to work, Erik's Outlook issue.

Tech Gumbo
iPhone Anti-Malware, Google's Robot Constitution, AI-Doctors-Self Diagnosis, AI Bot Sells Vehicle for $1- The Hell Breaks Loose

Tech Gumbo

Play Episode Listen Later Jan 18, 2024 22:13


The Question of the Week:   Are there any good anti-spyware / anti-malware for iPhone 13? The Big Stories: Google creates a Robot Constitution for AI LLM's AI & Doctors in the era of Self Diagnosis GM Dealer uses chat bot, bot tries to sell Tahoe for $1 Then Chatbot went off script with a few political opinions

Hoje no TecMundo Podcast
Influenciadores ganham pra você perder! O caso Blaze, suspeita de golpe

Hoje no TecMundo Podcast

Play Episode Listen Later Dec 18, 2023 9:33


Vamos ver as principais notícias de hoje: 'Carro voador' elétrico que pode transportar duas pessoas é lançado no Brasil, Blaze é suspeita de aplicar golpes de R$ 100 mil em apostadores, trojans bancários afetaram 985 apps para Android   e muito mais!

Craig Peterson's Tech Talk
Digital Media Ownership Debunked: The Tactical Octopus Unveiled

Craig Peterson's Tech Talk

Play Episode Listen Later Dec 15, 2023 85:33


In the ever-evolving landscape of digital media, the illusion of ownership can be shattered with a single tactical move. Recently, the PlayStation community experienced a rude awakening when paid content was abruptly removed - and no refunds were given. This underscores a widespread issue: do you own the digital shows and movies you 'bought'? Topics Explored in the Article: Tactical Octopus Unveiled: Delve into the intricate tactics used in the digital realm that challenge the perception of ownership. IRS Alert: Explore the unexpected connection between the IRS and your digital movie purchases, revealing potential vulnerabilities. Cybersecurity Insights: Understand the broader landscape of cybersecurity and its impact on safeguarding your digital trove. Email Threats: Uncover the silent menace posed by email threats and how they can compromise your perceived ownership of digital content. Phishing Schemes Exposed: Navigate through the perilous waters of phishing schemes, shedding light on how they put your digital movies at risk. HaveIBeenPawned: Explore the eye-opening revelations from HaveIBeenPawned.com and how they relate to the security of your digital media. Troy Hunt's Take: Gain insights from Troy Hunt, a renowned expert, as he unveils the reality behind digital content ownership. Password Managers as Shields: Discover how password managers act as shields, protecting your digital movie collection from potential loss. Online Meetings Vulnerability: Zoom in on the vulnerability of digital media during online meetings, revealing potential risks. Antivirus and Antimalware: Explore the role of antivirus and antimalware tools in fortifying your digital ownership. Windows Defender: Assess the effectiveness of Windows Defender in securing your digital content within the Windows ecosystem. The digital world is full of surprises, and ensuring true ownership of your digital shows and movies requires a strategic approach. From cybersecurity insights to email threats and the role of password managers, this article unravels the layers of complexity surrounding digital ownership. Are you ready to secure what's rightfully yours? Read more on Lifehacker to stay informed and empowered in the digital age. You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on Tuesdays WTAG AM 580 - FM 94.9  Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With  Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM   WGAN  Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday  WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays  Craigs Show Airs 1130 Saturday  On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)

HeroicStories
Do I Need More Than One Anti-malware Tool?

HeroicStories

Play Episode Listen Later Sep 4, 2023 4:20


It's tempting to think more is better when it comes to security software. In reality, too many can cause trouble.

Craig Peterson's Tech Talk
Defend Your Digital Kingdom: The Most Powerful PC Protection Tools

Craig Peterson's Tech Talk

Play Episode Listen Later May 19, 2023 87:02


Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If Windows Defender doesn't quite meet your requirements or you're looking for additional options, we've got you covered. Tune in as we explore other noteworthy choices, such as Bitdefender, Malwarebytes, and Cisco AMP for Endpoints. Each one has its own strengths, so you can choose the one that is right for you. To delve deeper into the topic, be sure to check out our related article on our website. There, you'll find further insights, comparisons, and additional information that will guide you in making the best decision for your PC's security. Access the article below for free, and unlock a wealth of knowledge to enhance your PC protection journey: Discover the Top Antivirus and Anti-malware Solutions for Total PC Protection! You can also catch Craig at the following stations and channels: With Jim Polito at 0836 Tuesdays WTAG AM 580 - FM 94.9  Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With  Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM   WGAN  Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday  WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays  Craigs Show Airs 1130 Saturday  On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)

Cybersecurity Podcast
Ep. 10 - Intrusion Detection System (IDS)

Cybersecurity Podcast

Play Episode Listen Later Mar 13, 2023 17:08


Dopo aver parlato di Antimalware ed EDR è il momento di approfondire la tematica network defence parlando di Intrusion Detection System (IDS)L'episodio sarà fruibile a tutti, e spiegherà la differenza tra i vari tipi di IDS come il signature o anomaly based system.Immancabilmente, anche in questo episodio scopriremo assieme come eludere questo particolare sistema di sicurezza!Seguitemi su Spotify, Itunes, Linkedin ed instagram "@nick.soc" per restare aggiornati sulle nuove pubblicazioni!

MSP Dispatch (Video)
MSP Dispatch 9/6/22: Apple Anti-Malware Update, Experience Preview for M365, and Apple iPhone Event (Video)

MSP Dispatch (Video)

Play Episode Listen Later Sep 6, 2022 27:35


Today's MSP Dispatch covers an update from Apple to combat malware, an experience preview of Microsoft 365, and what to expect from Apple's iPhone Event. Plus, a wildly unfortunate typo garners one crypto trader millions, some tips on defending against ransomware, and a few tales of techs who went rogue. MSP Dispatch is your source for news, community events, and commentary in the MSP channel.  Hosted by: Tony Francisco and Ray Orsini Give us your feedback by emailing news@mspmedia.tv   0:00 Intro 3:06 Apple Anti-Malware Update 8:37 Experience Preview for M365 13:37 What to Expect from Apple's iPhone Event 20:10 Notable Mentions 22:07 Community Events 22:54 Sign-off 25:19 Outtakes Story Links: Crypto Whoops https://www.theverge.com/2022/8/31/23330458/crypto-dot-com-typo-mistake-refund-audit Apple Anti-Malware Update https://arstechnica.com/gadgets/2022/08/apple-quietly-revamps-malware-scanning-features-in-newer-macos-versions/ Experience Preview for M365 https://techcommunity.microsoft.com/t5/microsoft-365-blog/introducing-preview-of-experience-insights-for-microsoft-365/ba-p/3574383 What to Expect from Apple's iPhone Event https://www.theverge.com/23309954/apple-iphone-14-event-rumors-announcements-airpods-pro-watch-ios-16-watchos-9 Notable Mentions Building a Defense Against Ransomware https://www.channelpronetwork.com/article/building-defense-against-rise-ransomware When Techs Go Rogue https://www.channelpronetwork.com/article/when-techs-go-rogue Community Events: 9/7 @ 12:00 pm ET | Build IT Better Discussion Group Presented by Everything MSP 9/7 - 9/8 In Person Event | ChannelPro SMB Forum 2022: Washington, DC 9/8 - 9/9 In Person Event | Robin Robins Cyber Security Marketing Roadshow: Chicago IL, 9/9 @ 10:00 am ET | MSP Dispatch Week Wrap Up Presented by The MSP Media Network Connect with our hosts:  Tony Francisco: https://www.linkedin.com/in/tonyjfrancisco/Ray Orsini: https://www.linkedin.com/in/rayorsini/ Be sure to follow us on social media:  Facebook: https://www.facebook.com/mspmediatv/ Twitter: https://twitter.com/mspmediatv LinkedIn: https://www.linkedin.com/company/mspmediatv/ Instagram: https://www.instagram.com/mspmediatv   Reddit: https://www.reddit.com/r/mspmedia Discord: https://discord.gg/Hc7b55cJPF

MSP Dispatch (Audio)
MSP Dispatch 9/6/22: Apple Anti-Malware Update, Experience Preview for M365, and Apple iPhone Event (Audio)

MSP Dispatch (Audio)

Play Episode Listen Later Sep 6, 2022 27:35


Today's MSP Dispatch covers an update from Apple to combat malware, an experience preview of Microsoft 365, and what to expect from Apple's iPhone Event. Plus, a wildly unfortunate typo garners one crypto trader millions, some tips on defending against ransomware, and a few tales of techs who went rogue. MSP Dispatch is your source for news, community events, and commentary in the MSP channel.  Hosted by: Tony Francisco and Ray Orsini Give us your feedback by emailing news@mspmedia.tv   0:00 Intro 3:06 Apple Anti-Malware Update 8:37 Experience Preview for M365 13:37 What to Expect from Apple's iPhone Event 20:10 Notable Mentions 22:07 Community Events 22:54 Sign-off 25:19 Outtakes Story Links: Crypto Whoops https://www.theverge.com/2022/8/31/23330458/crypto-dot-com-typo-mistake-refund-audit Apple Anti-Malware Update https://arstechnica.com/gadgets/2022/08/apple-quietly-revamps-malware-scanning-features-in-newer-macos-versions/ Experience Preview for M365 https://techcommunity.microsoft.com/t5/microsoft-365-blog/introducing-preview-of-experience-insights-for-microsoft-365/ba-p/3574383 What to Expect from Apple's iPhone Event https://www.theverge.com/23309954/apple-iphone-14-event-rumors-announcements-airpods-pro-watch-ios-16-watchos-9 Notable Mentions Building a Defense Against Ransomware https://www.channelpronetwork.com/article/building-defense-against-rise-ransomware When Techs Go Rogue https://www.channelpronetwork.com/article/when-techs-go-rogue Community Events: 9/7 @ 12:00 pm ET | Build IT Better Discussion Group Presented by Everything MSP 9/7 - 9/8 In Person Event | ChannelPro SMB Forum 2022: Washington, DC 9/8 - 9/9 In Person Event | Robin Robins Cyber Security Marketing Roadshow: Chicago IL, 9/9 @ 10:00 am ET | MSP Dispatch Week Wrap Up Presented by The MSP Media Network Connect with our hosts:  Tony Francisco: https://www.linkedin.com/in/tonyjfrancisco/Ray Orsini: https://www.linkedin.com/in/rayorsini/ Be sure to follow us on social media:  Facebook: https://www.facebook.com/mspmediatv/ Twitter: https://twitter.com/mspmediatv LinkedIn: https://www.linkedin.com/company/mspmediatv/ Instagram: https://www.instagram.com/mspmediatv   Reddit: https://www.reddit.com/r/mspmedia Discord: https://discord.gg/Hc7b55cJPF

The Security Ledger Podcasts
Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen

The Security Ledger Podcasts

Play Episode Listen Later Aug 18, 2022 34:50


We speak with Mikko Hyppönen on the sidelines of the DEF CON Conference in Las Vegas to talk about his new book, “If its Smart it Vulnerable." The post Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesEpisode 241: If Its Smart, Its Vulnerable a Conversation wit Mikko HyppönenFeel Good Ukraine Tractor Story Highlights Ag Cyber RiskDEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

Insider Research im Gespräch
Warum Endpoint Protection die Cloud braucht, mit Martin Mangold von DriveLock SE

Insider Research im Gespräch

Play Episode Listen Later Jun 28, 2022 34:28


Endpoints stehen im Fokus der meisten Cyberattacken, nicht nur im Home-Office und bei mobiler Arbeit. Ein einfacher Endpoint-Schutz mit Anti-Malware und Firewall reicht nicht mehr aus. Wie kann die Cloud bei der Erkennung und Abwehr der Endpoint-Angriffe helfen? Das Interview von Oliver Schonschek, News-Analyst Insider Research, mit Martin Mangold von DriveLock SE liefert Antworten.

Tech Gumbo
Anti-Virus vs. Anti-Malware, U.S. stops Russian Malware Cyberattacks, A.I. in Business

Tech Gumbo

Play Episode Listen Later Apr 28, 2022 22:10


The Question of the Week- What is the difference between Anti-Virus vs. Anti-Malware S. stops Russian Malware Cyberattacks Mark Cuban says use AI in Business Explaining AI and Business applications

The CyberCast
CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!

The CyberCast

Play Episode Listen Later Apr 26, 2022 48:34


Abstract: With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to securing your MSP and clients.   Malware defenses must be able to operate in a dynamic environment through automation, timely and rapid updating, and integrate with other processes like vulnerability management and incident response.  Anti-Malware technologies have become an after thought in many organizations, a technology that they've always had, always used, and never really thought about.  Effective malware protection includes traditional endpoint malware prevention and detection suites, along with enrichment from vendor, vulnerability or threat data. 

Caffe 2.0
2349 Ospite: VirIT, l'antivirus italiano di TG Soft, con Enrico Tonello

Caffe 2.0

Play Episode Listen Later Mar 12, 2022 49:00


A volte si ritrovano.VirIT di TG Soft lo conoscevo dai tempi di Fidonet. E infatti sono loro.Una storia bellissima, Enrico e' un fiume in piena che ci ha raccontato già moltissimo della sua esperienza.Come nasce un antivirus italiano ? Come prende le certificazioni ? Come si distingue dagli altri ? Come il marketing americano influenza un successo strepitoso italiano ?Un incontro di quelli umanamente bellissimi, regalatevi questi 50 minuti insieme. Meritano.

Data Center Therapy
#066 - The Man in Black, from VMware's Carbon Black

Data Center Therapy

Play Episode Listen Later Sep 23, 2021 37:56


We know, we know, EVERYbody's talking about ransomware lately.  Given that there's so many bad actors, and so many easily tricked users, though, how can we not talk about it?  At least talk about a different technical approach to anti-virus and anti-malware software, we say.  Tell us what makes it different and how it can be proactive, and not just reactive like most solutions out there. Ask and ye shall receive!  Matt “The tinfoil doesn't seem to be working!” Yette and Matt “I DROPped that packet, didn't I?” Cozzolino welcome to the virtual studios a very special guest with a highly unique background.  John Nelson, Global Field Solutions Engineer from VMware's Carbon Black acquisition joins the Matts and shares his experiences.  Were you expecting a Pennsylvania State Police Corporal, or a Computer Forensics specialist for the United States government to join Data Center Therapy for an episode?  Neither were we! John and the Dynamic DCT Duo talk about: When companies talk about Machine Learning with respect to endpoint scanning, what does that REALLY mean? How is Carbon Black different than anti-virus or anti-malware scanning software? What kinds of bad-guy methodologies are out there to subvert typical scanning strategies, and what kinds of counter-strategies are there to harden or secure endpoints? This one's both entertaining and a shockingly deep dive into the somewhat dark, but not-so-mysterious-anymore world of cybersecurity.  Give it a listen and be sure to like, share and subscribe at all the usual doobleydoos.  If you'd like help implementing or learning more about Carbon Black in your virtual infrastructure and more, please reach out to your local IVOXY Account Manager.  Stay safe, stay ahead of the baddies, look into this Neuralyzer, and do join us on our next episode of Data Center Therapy!

ColoRadio-
Acronis - Meet The New Name In Cyber Protection - "Your Moment In Tech"

ColoRadio-"Your Moment In Tech"

Play Episode Listen Later Sep 21, 2021 4:51


“Acronis True Image” has changed its name to “Acronis Cyber Protect Home Office”. Candid stopped by to tell us the difference between the new and the old versions. And why Acronis made the change as well as what else is new on this segment of “Your Moment In Tech”, enjoy! (acronis.com) And OBTW Anti Virus ='s Anti Malware. #ColoRadio #acronis # Malware #antivirus

Mike Tech Show
MTS-2021-06-03 #784

Mike Tech Show

Play Episode Listen Later Jun 4, 2021


Anti-Malware plugin for WordPress, OneDrive icons, Norton, Asus ZenWiFi AX6600 XT8

ProactiveIT Cyber Security Daily
Episode 297 - Agent Tesla Takes Out Microsoft’s Anti-Malware Interface

ProactiveIT Cyber Security Daily

Play Episode Listen Later Feb 3, 2021 16:24


Good Morning and Welcome to the ProactiveIT Cyber Security Daily number 297.  It is Wednesday February 3rd 2021.  I am your host Scott Gombar and Agent Tesla Takes Out Microsoft’s Anti-Malware Interface Apple Releases Security Updates US federal payroll agency hacked using SolarWinds software flaw Babyk Ransomware won't hit charities, unless they support LGBT, BLM Trickbot malware now maps victims’ networks using Masscan Netgain ransomware incident impacts local governments Agent Tesla Trojan ‘Kneecaps’ Microsoft’s Anti-Malware Interface Intel agency warns of threats from China collecting sensitive US health data Montefiore Medical Center and Bethesda Hospital Fire Employees for HIPAA Breaches

Pontón en MVS
Anti malware, antivirus o diferentes métodos de protección a nuestros dispositivos e información - 05 ENE 21

Pontón en MVS

Play Episode Listen Later Jan 5, 2021 50:28


PensieroSicuro
#122 - Endpoint Detection and Response (EDR) il presente ed il futuro dell'anti virus

PensieroSicuro

Play Episode Listen Later Jan 1, 2021 12:38


In questo episodio Adelmo ci aiuterà a capire come funziona un antivirus e in che modo la trasformazione in Endpoint Detection and Response (EDR) li abbia resi sempre più intelligenti e funzionali.

Tech means Business
The network's new shape in 2021, with Cisco Secure

Tech means Business

Play Episode Listen Later Dec 14, 2020 13:01


This podcast is produced in conjunction with CiscoCybercriminals never let up. Even schools and hospitals remained targets at the height of the coronavirus pandemic. For most people, working at home was the reality of their year, and as Kerry confirms, most organizations will be adopting a much more generous working-from-home stance from 2021.There are practical pointers in this episode on how to stay safe and some home truths (literally) too about the reality of mixing home and work lives online.No one solution answers all the questions when it comes to cyberattacks, but with an integrated approach, you can cover all the bases. The problems come from when teams have to co-ordinate all the moving parts across what are now hugely-distributed networks.Educating everyone about online cyber hygiene is of enormous importance too, as many of us have probably fallen prey to having clicked phishing links in the past. As our home and work lives continue to converge, how do we ensure we are not putting ourselves and our companies at risk?Kerry's written some great blog posts that should be essential reading:https://news-blogs.cisco.com/apjc/2020/10/22/changing-cyber-culture-disruption-is-an-opportunity-for-transformation/  https://www.cisco.com/c/en_au/products/security/secure-remote-worker-solution.htmlHe's on LinkedIn, too:https://sg.linkedin.com/in/kerrysingletonHosted by Joe Green, who's here:https://www.linkedin.com/in/josephedwardgreen/

Todo por la Tarde
Luis Lubeck (Antimalware Day - ESET)

Todo por la Tarde

Play Episode Listen Later Nov 3, 2020 22:22


(03.11.20) En el marco del Antimalware Day, hablamos con Luis Lubeck, Security Researcher de Eset Latam. #TPLT

Techstination
Acronis True Image 2021 integrates computer security with backup

Techstination

Play Episode Listen Later Sep 16, 2020 2:00


Techstination, your destination for gadgets and gear.   I’m Fred Fishkin.  Acronis…has moved to integrate computer security with its well known back up software with True Image 2021.   The True Image line has earned a great reputation over the years…in helping with everyday back ups and simplifying the...

Lockdown Lessons
Antimalware Efficacy and Testing with Grayson Milbourne

Lockdown Lessons

Play Episode Listen Later Aug 28, 2020 11:22


Ever wonder how third-party endpoint security evaluations are conducted? Who does the testing, how’s it done and how is success determined? We tackle those questions head on in this episode of Lockdown Lessons

Techstination
Acronis True Image 2021 integrates computer security with backup

Techstination

Play Episode Listen Later Aug 20, 2020 12:43


Techstination interview: Acronis True Image 2021 integrates computer security with backup

Techstination
Acronis True Image 2021 integrates computer security with backup

Techstination

Play Episode Listen Later Aug 20, 2020 12:43


Techstination interview: Acronis True Image 2021 integrates computer security with backup

Telecom Reseller
Podcast: Curbing cyberattacks with AI-enhanced anti-malware

Telecom Reseller

Play Episode Listen Later Jun 15, 2020 24:38


Cyberattacks already cause problems for channel partners and their clients. 68% of organizations report an increase in attacks on their endpoints in the last 12 months. Recent events have compounded our challenge with an explosion of remote endpoints needing protection. In this podcast Pat Hurley, Senior Partner, and Growth Enablement Leader at Acronis tells us about a response: Acronis Cyber Protect Cloud. Hurley describes how Acronis Cyber Protect Cloud that combines backup, AI-enhanced anti-malware, vulnerability assessments and patch management, in one management interface that’s easy to learn and manage. Visit https://www.acronis.com/en-us/cloud/cyber-protect/.

Craig Peterson's Tech Talk
Welcome! Malware, Anti-Virus, Anti-Malware, Right Defenses for Protection and more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later May 30, 2020 9:57


Welcome! Today Craig’s got a deep dive into the whole world of malware, antivirus, anti-malware, what you can do about it. Having the right defenses including different types of security for protecting different things. It is important to have a properly configured, multilayered defense approach. Artificial intelligence systems for cyber defense don't live up to the hype surrounding them. Why using layered approaches is important and they should be from a single integrated, unified vendor. The importance of training your employees especially if you are a regulated industry Also: What makes up 81% of data breaches The $15 billion industry you need to be worried about How cybercriminals are now targeting your employees. Eight ways cybercriminals are making your firewalls and antivirus absolutely useless. The importance of Firewall network address translation. Why offsite devices are another big target Why the bad guys are jailbreaking and rooting as many company devices as they can get their hands on. Why Length of login credentials and PINs matter Password Management and Multi-factor Authentication For more tech tips, news, and updates visit - CraigPeterson.com --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Security Voices
Machine Learning & Connected Cars with Security Journeyman Josh Lemos

Security Voices

Play Episode Listen Later Jan 4, 2020 74:38


Our 1st episode of 2020 is a story in three parts, beginning with hard fought wisdom of a veteran security practitioner, then diving deep into machine learning (ML) before wrapping up with how both security and AI apply to connected vehicles. The first part of our 74 minute conversation with Josh Lemos is the backstory of how he started his career in cybersecurity as a consultant... and left services to join ServiceNow as a practitioner. His time at ServiceNow lays out a solid formula for fixing application security inside a growth company who can little afford to slow down-- or suffer the pain of the inevitable breach if the situation doesn’t improve.​Jack & Dave’s conversation with Josh on ML lays down many of the basics and is intended to be a rough primer for future episodes where we will further explore the topic. We discuss how ML projects often take much more preparation than originally planned and topics that range from class imbalances, the differences between supervised/unsupervised ML, a starter’s toolkit and what to expect along with some rookie mistakes to avoid.As part of Cylance/Blackberry, Josh has recently been involved with connected vehicle projects where standard security techniques for detecting executable malware on laptops and servers can start to look like child’s play in comparison to effort required to properly diagnose events across the diverse hardware and software found in a modern car.  Before wrapping with our speed round, we look ahead at areas where ML may be able to make leaps forward in both vehicles and across cyber security.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Odd Double Base64 Endoded "BS_REAL_IP" Header https://isc.sans.edu/forums/diary/Unusual+Activity+with+Double+Base64+Encoding/25458/ DNS Archeology With PowerShell https://isc.sans.edu/forums/diary/More+on+DNS+Archeology+with+PowerShell/25452/ iOS Appstore Malware https://www.wandera.com/mobile-security/ios-trojan-malware/ British Law Enforcement Misses Malware Reports Due to Anti-Malware https://www.theregister.co.uk/2019/10/24/hmicfrs_report_cyber_crime/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Odd Double Base64 Endoded "BS_REAL_IP" Header https://isc.sans.edu/forums/diary/Unusual+Activity+with+Double+Base64+Encoding/25458/ DNS Archeology With PowerShell https://isc.sans.edu/forums/diary/More+on+DNS+Archeology+with+PowerShell/25452/ iOS Appstore Malware https://www.wandera.com/mobile-security/ios-trojan-malware/ British Law Enforcement Misses Malware Reports Due to Anti-Malware https://www.theregister.co.uk/2019/10/24/hmicfrs_report_cyber_crime/

Caffe 2.0
1429 Attrezzi: antivirus, antimalware ed estensioni dei browser

Caffe 2.0

Play Episode Listen Later Oct 23, 2019 8:32


Quale antivirus ? Piu' che uno, vale la pena conoscere il metodo per sceglierlo.Oggi gli attacchi sono multipli. Vediamoli.Vocali e email a Spataro:Email: info@caffe20.itwww.t.me/iusondemandwhatsapp 3245312167Per ascoltare:Alexa: apri caffe' due punto zeroApp: Radiotape.com app iOS e Android eWebapp - lite app www.radiotape.com per Hermit (Android)Webplayer: www.caffe20.it/playComunity:Telegram: cerca caffe20 e scegli il canale delle news e il gruppo di discussione

Craig Peterson's Tech Talk
Microsoft Protects Windows Defender by Preventing Tampering and more on Tech Talk With Craig Peterson today on Maine's WGAN Saturday Show [10-19-19]

Craig Peterson's Tech Talk

Play Episode Listen Later Oct 18, 2019 12:58


Welcome Back!   Microsoft Windows has some built-in Anti-Malware.  It is called Windows Defender.  However, some cyber criminals found ways to defeat it and so now Microsoft has a new feature to prevent that from happening.  Listen in to find out more and how it can help you. For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: New Tools Keep CyberThieves From Disabling Your Cyber Protections --- Automated Machine-Generated Transcript: Craig Craig Peterson here. Welcome back. We are live and of course, we are live on WGAN. And I love it when you guys send me an email, I got a few comments from our friends over listening on WGAN and some more people who are online as well. I love hearing from you and you can always just send me an email with a question etc me ME at Craig peterson.com. So let's get into this. This is I think, very, very good news for everybody who is using Microsoft or maybe those people who are security people who are using Microsoft or who are the support people they're supporting using Microsoft. Microsoft has something called defender and they also have a firewall that's built into Windows, there are a lot of misc and figuration frankly, with the whole Windows Firewall and, and the way Microsoft turns on services and has certain services loaded up and running all the time, I have some major disagreements with Microsoft on that. And that's what our hardening course is all about. But let's talk about Microsoft defender. If you are going to do nothing else, at the very least make sure you have Windows Defender turned on. And up to date. Microsoft has taken some of the best techniques, the best technologies to protect windows and combine them into this free package that comes with the latest versions of Windows, the Windows 10 that has the best version of it. They've had this around the action for a little while, but they keep improving it. And that brings us to help net security article about the new feature that Microsoft has added to Windows Defender. If, if you're like most people, you know, you're just somebody who's become the de facto, IT security specialist. Right? You're probably the de facto IT person, right? You're the person that people go to when they have a problem when they have a question, right? And so you got to figure out who do you go to? What can you trust and that's man, that's hard to do? Nowadays, you can search for any topic and see a million videos online about it. So let me give you the bottom line here. If you're going to do nothing else, turn on Windows Defender and turn on automatic Windows updates. That'll get you about 80% safe. So it's very, very good, right. If you want to get to 95 or 99.9% safe, there's a lot of other things you have to do and it can get expensive. But those two things are the biggest things that you can do. And you can do them easily you can do them quickly. Now, Windows Defender and one of the drawbacks to it is that you could make changes to the security settings, and potentially malware or hackers could make changes to it. So one of the things Apple has done for quite a while now is Apple has really tried to harden their OS even further and prevent the ability to make changes to all kinds of system-wide software like Catalina introduced some serious serious protections and caused a lot of applications to break. And that's been true in Microsoft's world as well. You can't just run XP code anymore on Windows 10, which is frankly a good thing. But what Microsoft Windows Defender has done now is it is added tamper protection to Windows That is absolutely phenomenal. Okay, very, very good. And when the features turned on and you should turn it on, this prevents malware, from disabling the virus and threat protection, real-time and cloud-delivered protection. And it also stops viruses and malware from turning off behavior monitoring or removing Security Intelligence updates. It's really really important to make sure it is turned on because this could save you big time. So here's a quote straight from Health Net security and from Microsoft. I don't have a name this is from there on Microsoft 365 Device Management Portal. tamper protection essentially locks Microsoft defender and prevents your security settings from being changed through apps and methods such as configuring settings and Registry Editor on new Windows machine, changing settings through power. Shell command lets editing or removing security settings through group policies, and so on. Obviously, it's something you should do now if you're running an Active Directory, you can push some of these settings out to all of the clients or new network, which I would suggest you do. home users, by the way, will still be able to switch tamper protection off by the Windows Security app. If you have admin permissions on the computer, enterprise users will not be able to do that. There are quite a few differences between the enterprise versions of Windows and the home versions. The home versions don't have all of the security settings even to begin with the enterprise versions you can schedule when you want software updates to be installed. The home versions you can't I got a call from a law firm who had a deposition that was due in the court by 4 pm. And it was like 230 and their machine decided to do update And they could not override it, because they were running the home edition of Windows not knowing the difference, right? Again, another example of a managed services provider not doing their client any good, which was certainly the case here. Tamper protection can be available to organizations that have Microsoft defender ATPE, five. Now, this again gets complicated. We've had this happen before we go into a company will do a security audit, we'll put together an action plan for them. And we'll say okay, well, we advise you to subscribe to this Microsoft service and we'll usually sell it to them. And there are various levels or different levels of Microsoft service for the basic office 365 or also for your windows licenses. There's a lot of different services that are out there. So a TP five is a level Microsoft has more than ten-thousand SKUs, if you can believe that 10,000 different products, so you have to really know what you're doing when you're buying the Microsoft licenses. So we'll go into an organization and will say, Okay, well, it's going to be this much per month, per desktop. And people will ask their smart uncle, hey, Uncle, you know, I'm been talking to this managed security services provider. And they say it's going to cost this much per machine per month, and those are Microsoft Office and Windows only cost you five to $10 a month. What are they charging them for? Well, yeah, that's true. If you're getting the home version if you're not going to get any of the extra features. Yeah, that's very true. But it is not true if you want the professional version. So tamper protection, ATP five or higher, and only for endpoints that run the latest versions of Windows, which is Windows 10 1903. Which, by the way, is being dedicated, I think this week or next week. Alright, so there's a lot of stuff to understand. I know this is confusing. If you want help with any of this reach out to me, and my team will be glad to help you out and talk to you talk you through it. If you want my services to hire great. If not, that's fine, too. We are really here to help just email me and II at Craig Peterson calm because I understand this stuff is very, very complicated. So kudos to Microsoft for doing that. I think it's important, we need to understand that we need our systems to be safe. And that's one of the things that Windows Defender help so make sure you have that in place. Now another thing that I see very commonly when we're out in doing these assessments, these cyber health assessments or the security assessments and action plans Is that Moore's better? Have you got that, you know, basically, if, if I am going to run antivirus, and I bought Norton, let's say, and I got it at Staples, if I want better security, I'm going to get something else? So maybe you have Microsoft defender turned on. And then you also go out and you get bit defender and you get some anti-spyware software and you get Norton and you know what, it'd be even better, I'm sure if I went and got semantics software, or if I went and got you to know, you name it. There are a lot of them out there antivirus and anti-malware packages that don't tie together. Okay, so it's going to make your life more confusing, but potentially even worse than that. What is going to end up doing is it's going to have all of these pieces of anti-malware software anti-virus off We're competing with each other. So we go out and we'll see that there are two or three different pieces of software out there. And they are fighting with each other. And they're complaining about each other because of it to all to each antivirus software package. The other antivirus software package looks like it's a virus because of what it can do, what it does do this signature that has onboard, etc, etc. So you see what, where I'm going here, you're much better off using a single end-to-end product that is going to keep you save this going to keep all of your systems safe. That's going to also alert you when something's going on. Because these point products that we're talking about my point product is like Microsoft defender, it runs on one computer it has one point of information, so it knows what it is seen. Now some of these pieces of software like When Microsoft defender does look in memory, others don't they only understand desk, etc, etc. But it's a point product, it's looking at one machine, versus what you need to be doing in this day and age where you're looking at all of the machines in concert. So you can see that there is an attack underway where the attack is coming from what kind of attack it is, where not only are the machines in your office working in concert, but they're tied into smart switches that can turn off the spread of ransomware. If someone brings ransomware into your office, right, because you don't want that to spread, you want to stop it right away. And one of the easiest ways to do that is if you have software that can turn that switch off automatically that port on the switch to shut off to isolate that machine that's trying to spread the ransomware or it's trying to spread a virus. And then beyond the switch. You have a smart next-generation firewall that's watching everything that's going on stopping things from getting in, watching the internal networks communicating with the switches communicating with the desktops, then going out even further. And all of these firewalls data are tied together. So we know right now China, North Korea, you name it is running an attack against us businesses in this way, watches forward and updates within seconds. That's what you want. You don't want all these point products fighting against each other to get complicated. Again, if you have any questions, just reach out to me at Craig Peterson calm and make sure you subscribe to my newsletter, Craig peterson.com slash subscribe. I'll keep you up to date on all the things you need to know. So stick around after the top of the hour will be back. We'll be talking about the Tor Browser. Is it the world's safest browser? What does it mean? What is it doing? All of that right here. So stick around. We'll be right back. Transcribed by https://otter.ai   --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

THE TEXORCIST LIVE PODCAST
Increasing Smart AI Surveillance

THE TEXORCIST LIVE PODCAST

Play Episode Listen Later Oct 16, 2019 107:02


Former US Central Intelligence Agency analyst and subcontractor, Edward Snowden, and the WikiLeaks revelations show the astonishing measures taking place globally to monitor the behavior, feelings, and attitudes of everyone. Snowden lifted the lid on "Tempora", an electronic surveillance program operated by Britain's eavesdropping agency GCHQ (General Communications HeadQuarters). He also revealed the US government uses a software program called "Boundless Informant" which details and maps by country the vast data gathered by the ultra secretive National Security Agency from private phones and computer systems. Many secret software programs, search engines, spyware, malware, and other related data mining methods are being used 24/7 on everyone who accesses the Internet on any device, including cellphone calls. Anti-Malware, Anti-Spyware, and other protection software can easily be bypassed by most hackers. With computer algorithms and artificial intelligence systems developing increasing sophistication, as human oversight decreases, everyone should be very concerned about the potential for unaccountable secret intelligence agencies to take our information, privacy, and ultimately our freedom.

SolarWinds TechPod
Email Security

SolarWinds TechPod

Play Episode Listen Later Apr 25, 2019 32:53


Email security. Do a Google search and you'll find it's one of the biggest concerns facing businesses today. Join Ashley Bono, SolarWinds MSP Product Marketing Manager, and SolarWinds Mail Assure product team members Dreas von Donselaar and Mia Thompson as they discuss the evolution and weaponization of email spam...and the tools you can use to keep the bad actors out of your inbox.   Related Links:  SolarWinds Mail Assure  Comments about this episode? Have an idea for future topics? Tweet us @solarwinds using #TechPod  Who is behind this TechPod episode?  Anne Chaconas (executive producer), Luke Pearson (production/engineering), Ashley Bono (host), Dreas von Donselaar and Mia Thompson (guests)  This podcast is provided for informational purposes only. Information and views expressed in this podcast may change and/or may not be applicable to you. SolarWinds makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.  The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks of) their respective companies.  © 2019 SolarWinds Worldwide, LLC. All rights reserved. 

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Using Active Directory (AD) To Find Hosts That Are Not in AD https://isc.sans.edu/forums/diary/Using+AD+to+find+hosts+that+arent+in+AD+fun+with+the+IPAddress+construct/24762/ Microsoft Anti Malware Crashing Windows https://social.technet.microsoft.com/Forums/en-US/18ab60a3-3b26-4a07-b68d-84085ce66ce5/scep-crashing-pcs?forum=ConfigMgrCompliance&prof=required Reduction in DDoS Attacks https://www.nexusguard.com/threat-report-q4-2018

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Using Active Directory (AD) To Find Hosts That Are Not in AD https://isc.sans.edu/forums/diary/Using+AD+to+find+hosts+that+arent+in+AD+fun+with+the+IPAddress+construct/24762/ Microsoft Anti Malware Crashing Windows https://social.technet.microsoft.com/Forums/en-US/18ab60a3-3b26-4a07-b68d-84085ce66ce5/scep-crashing-pcs?forum=ConfigMgrCompliance&prof=required Reduction in DDoS Attacks https://www.nexusguard.com/threat-report-q4-2018

Caffe 2.0
1141 Ospite: ildottoredeicomputer nome omen ... ci parla di: MRT - Antimalware per Windows 10

Caffe 2.0

Play Episode Listen Later Mar 5, 2019 4:16


Gradito ospite di ieri, torna oggi.Una piccola riflessione e la sua pillola di sicurezza per tutti noi !Grazie ! www.ildottoredeicomputer.it

COMMERCE NOW
Security Management - A Changed Approach

COMMERCE NOW

Play Episode Listen Later Sep 25, 2018 10:17


Overview:  As the tax against self service endpoints evolve to be more complex, and many financial institutions struggle to keep up, there's a growing demand for security management services in the industry. In this podcast, you will hear about this trend and what it means for financial institutions.  Resources:  Blog: A look at how ATM security has changed … and how it hasn’t ATM Security Management: Know Your Options COMMERCE NOW (Diebold Nixdorf Podcast)   Diebold Nixdorf Website Transcription: Amy Lombardo:                00:00                     Hello again, and thank you for joining us on this episode of Commerce Now. As the tax against self service endpoints evolve to be more complex, and many financial institutions struggle to keep up, there's a growing demand for security management services in the industry. Today I have the pleasure of being joined by Julie Osborne, our Global Vice President of Diebold Nixdorf's Service Portfolio, and Martin Nearhos, Principal Security Architect for the Global Services Portfolio Division as well. We're going to hear about this trend and what it means for financial institutions. So, hello Julie and Martin. Thanks for being with me here today. Julie Osborne:                   00:38                     Thanks Amy, it's a pleasure. Thanks for having me. Martin Nearhos:               00:41                     Yeah, thanks Amy. Happy to be here. Amy Lombardo:                00:44                     Okay. I'm really excited here, because I'm based here in the US, but I'm talking to two subject matter experts who are in our Singapore office. It's great to just have this global view on this security topic. So, let's dive in here. Let's start with just a high level question on why do you think financial institutions are having difficulty managing their self service security? Martin Nearhos:               01:10                     That's a good question. Maintaining the security of the customers' assets and information has always been a high priority for the industry, but threats against the self service banking channel have evolved. It's now much harder to keep up. A tax against ATMs have traditionally been isolated to geographic regions, and slow moving out of those regions, but this is no longer the case. We're now seeing increasingly complex attacks, such as various forms of jackpotting, taking place across the globe, and at the same time the threat of traditional physical attacks hasn't really gone away. It's a lot to combat. Julie Osborne:                   01:47                     If I might just add to what Martin said, financial institutions usually don't have the time or in-house expertise to keep security measures up to date. As retail banking paradigms shift, banks and credit unions are under a lot of pressure to do more with less, and even if financial institutions wanted to hire in-house security specialists, as businesses and governments fight cyber security threats, these resources tend to be really expensive and in high demand. Also, as we all know, this constant pressure to stay compliant with security regulations and industry standards, ATM security service providers can help relieve the burden of staying on top of changes and staying protected against attacks. Amy Lombardo:                02:28                     Okay. Got it. Martin, if I can ask this to you before we jump into this whole idea of doing more with less, since you're located in the Asia Pacific region, are there certain types of attacks that you're seeing on the rise today? We talked a lot about jackpotting in the Americas, but could you give us an idea of maybe what you're seeing over in your region? Martin Nearhos:               02:51                     The Asia Pacific region is quite diverse. You've got many different markets at many levels of maturity, so it varies. Locally you won't get, say Singapore, there's a certain limit to attacks, whereas in other countries very close by, you've got a much broader range of attacks. It's complex and it doesn't move. Amy Lombardo:                03:15                     Got it. Yeah. It sounds like no matter where you are, just keeping on top of that security is always going to be top of mind here. Martin Nearhos:               03:22                     Yep. Amy Lombardo:                03:23                     Okay. Let's talk about this idea of doing a little more with less. When we're looking at it from a financial institution standpoint, can we talk a little bit about why they should be looking into outsourcing their ATM service and management? Julie Osborne:                   03:37                     Oh, absolutely Amy. I might take that one. It's becoming increasingly popular for FIs to work with organizations that have intimate knowledge of the ATM channel, and offer specialized security services as part of ATM fleet management arrangements. They will want someone who can offer 24/7 secure operation centers for monitoring, and who can also take care of all necessary maintenance, hardware and software upgrades, and updates for them. Some FIs don't have the capability in house to reliably maintain secure ATM environments, and others would just simply rather have someone else handle it because it is a specialist capability, as I said. So, if FIs are looking to take the burden off themselves and effectively manage the security services of the ATM  fleet, with an ATM security service provider such as Diebold Nixdorf, they should look for a provider who can deliver the following three things.                                                                                 First, you'd want optimized security through 24/7 monitoring, proactive threat elimination, and an in depth understanding of emerging threats, to try and protect against attackers. Second, you'd want increased efficiency, freeing the FI from day to day ATM security management responsibilities, or streamlining processes. Third, you want a service that will effectively manage operational risk, to provide real time threat insights, and offer remote troubleshooting, and has a deep understanding of the industry requirements. Ultimately, I think the best approach is a multilayered security protection approach that offers real time information to ensure ATM networks are protected and available, whilst also providing the information FIs need for a [inaudible 00:05:17] ATM security audits. Amy Lombardo:                05:19                     Okay, got it. Those three points were really helpful here, especially in looking to determine your outsourcing, your Managed Security Services, but what does an engagement actually look like for an financial institution? What are some of the specific options, and what would it take to get a program like this up and running? Martin Nearhos:               05:41                     I can take that. If you're an existing customer, and you're already ready using sort of self service fleet management, which is just a suite of services designed to run multi-vendor self service devices cost effectively, the customer can sort of decide what level of protection makes sense for their organization, based on their risk profile and their operational risk. If you're a new customer, we'd look at all the fleet details that required. The ATM make, the model, physical location, that would all be analyzed. Then the customer would select the appropriate security service, and again, it's based on their business and operational risk. We suggest that whatever FIs choose is a core security service. The services offered should, at the very least, provide everything needed to comply with industry standards and requirements such as those developed by the Payment Card Industry Security Standards Council.                                                                                 It should also include the hardening of various aspects of the ATM with remote monitoring and software patch deployment. It would also include things like device monitoring, secure connectivity, managed firewall, peripheral device control, anti malware, antivirus, and of course intrusion detection and prevention. Then the FI can have the option to build upon that basic level of services for such things as protection against complex logical system attacks. Although I would recommend this sort of protection to everyone, we know that financial institutions want to prioritize their investments in advanced security, and they just can't do it all at once. With these types of services, FIs can then rely on the security service provider to proactively monitor the ATM for suspicious activity, protecting terminals more effectively in real time, responding quickly when attacks are detected, and engage with customers to resolve the incident, and take the burden of managing the self service fleet off the FI, who, as we've already said, may be stretched pretty thin on resources. Amy Lombardo:                07:42                     So Martin, if I can ask you a question here just based off of the compliance portion, the regulation portion of what you mentioned, I would think that's pretty important, almost as a value added services as well, that your security partner could provide you almost with the consultation, the education, on what all these requirements might mean for your institution. Am I thinking about that the right way? Martin Nearhos:               08:11                     You are. There's some industry standards that, across everywhere, but what happens is you get into regional areas. Some have slightly different requirements, so as a global offering, it's quite difficult, but we have specialists in all the major regions that could offer that service. Amy Lombardo:                08:29                     Okay. Thank you. Okay, so to close out this topic, have you heard how customers are responding to these types of Managed Security Services in the industry today? Are they able to focus more on their customers without the burden of managing their own ATM security services then internally? Julie, how about you take that one? Julie Osborne:                   08:51                     Thanks Amy. Actually we have. We've seen some very positive results from the financial industry. Threats against the self service channel aren't going away anytime soon, but with Managed Security Services, financial institutions can spend less time trying to prevent attacks, and spend more time with their customers growing their businesses, and ultimately that's where we want them to be. Martin Nearhos:               09:11                     And, just as the FI is focusing on on their customer, the security service provider, but it's got to focus on continuing to evolve and develop, because the expectations will continue to rise, and FIs will expect to be offered more value in the future as well. Amy Lombardo:                09:29                     Well great. This sounds like a no-brainer to me. I would want to stay protected and just not have that burden internally. Thanks Julia and Martin for being with me here today, and to our listeners for tuning into this episode of Commerce Now to learn more about Managed Security Services, and how FIs can better protect themselves. Log Onto DieboldNixdorf.com. Until next time, keep checking back on iTunes or your favorite podcast listening channel for new topics on Commerce Now.    

National Cyber Security Radio By Gregory Evans
Guess Who? - The Story Behind The Best Anti-Malware Software In The World.

National Cyber Security Radio By Gregory Evans

Play Episode Listen Later Aug 25, 2018 30:00


Gregory Evans of National Cyber Security Radio interviews a special guest who has changed the game in the "Malware" industry.   This interview is not just for computer nerds, couples who think that their spouse might be spying on them.  How spyware gets installed on your personal computer.   How to delete spyware from your computer, tablets and cell phones.  Find out how many people get arrested for makiing or installing malware. ------------------------------------------------------------- LEARN HOW TO BECOME A CERTIFIED CYBER CRIME CONSULTANT.   Go to National Cyber Security University

Computer Talk with TAB
Computer Talk 3/17/18 Hr 1

Computer Talk with TAB

Play Episode Listen Later Mar 20, 2018 40:01


Automated burger flipping robot "Flippy" turned off because it was too fast for humans. With spate of faux products, ranchers ask cattlemen to define meat. GrayKey tool unlocks iPhones for law enforcement; leverages a security vulnerability in iPhones to do so. Google bans ads for unregulated currencies. A listener wants to "disconnect" her Goopgle Mail accouount from her YouTube account. Should you use the free or premium edition of Malwarebytes' Anti-Malware? What are the differences between thev frnd paid versions of Malwarebytes. A listener wonders about investment opportunities through "converged cable access" with potential higher Internet speeds. Troubleshooting a computer that completely shuts down after a period of inactivity by changing Power Options for sleep and hibernation in Windows. Seeking a "seamless" way to switch from AOL to another e-mail responder, and notifying your mail contacts of your new provider.

Computer Talk with TAB
Computer Talk 2/17/18 Hr 2

Computer Talk with TAB

Play Episode Listen Later Feb 17, 2018 37:43


What it means when you cannot "safely disconnect" a USB hard drive from your computer due to a file that is in use by Windows; and what to do when this happens. A caller wants to play music from her Chromebook laptop in her car, we explain how to do so. A listener seeks recommendations for a 2-in-one "convertible" laptop/tablet computer, and a "port replicator" device to connect multiple monitors. We like the HP Elite x2 as a convertible, with the addition of a port replicator to connect additional monitors if needed. A laptop user with Cox e-mail set up on a POP server ends up having e-mail deleted from his laptop, and looks for a way to stop deletion from happening. A Firefox user wants to block advertisements using Adblock Plus, we provide a link to the extension on our website. We help a user with a potential web browser hijack use Malwarebytes' Anti-Malware to help find the problem, as well as try to determine why a mysterious "G" drive is appearing. A listener with an Apple iPad mini wonders if the OpenDNS service can be used with Apple devices in order to surf the web more safely. A business user is receiving forwarded spam to his e-mail address; we think the e-mail password may have been compromised and e-mail passwords need changing. As well, the safety of Russian based Kaspersky anti-virus is called into question out of security concerns. Finally, mysterious retina recognition software seems to have appeared on a gaming laptop.

Finding Genius Podcast
Polyswarm — Paul Makowski, CTO — Decentralized Marketplace Where Security Experts Create Anti-Malware Machines

Finding Genius Podcast

Play Episode Listen Later Feb 9, 2018 18:28


One of today's biggest problems with the threat intelligence market, which encompasses companies such as McAfee, Symantec, and others involved in keeping computer viruses and malware at bay, is the cyclical nature of the market–a newcomer arrives and innovates with a new idea, then relaxes, and another newcomer must come in to keep innovation alive. PolySwarm hopes to change this by creating a decentralized marketplace that rewards security experts, end-users, and ambassadors like McAfee and Symantec with Nectar tokens when they correctly help to predict and determine whether potential malware is actually a threat. Providing this economic incentive will help to tighten that cyclical loop, as well as encourage experts to continually be improving their skills and anti-malware machines. PolySwarm is currently running a malware bounty contest, awarding up to $300k in Nectar tokens for users to upload suspect files that their malware detection program can read as malicious, with higher amounts of tokens being awarded for more unique malware strains. They hope to release a full version of their marketplace by the end of the year. For more information, visit www.polyswarm.io.

Computer Talk with TAB
Computer Talk 2/3/18 Hr 1

Computer Talk with TAB

Play Episode Listen Later Feb 6, 2018 40:30


Erik and Bob take your computer questions. Apple co-founder Steve Jobs doesn't "believe anything" Elon Musk or Tesla says. Twitter has a huge bot problem with people having "fake" followers. Ride-sharing service Uber has a tip limit. A Mac user wants to find a good anti-virus program for the Mac as an alternative to cable-company provided software. We offer some alternatives and suggestions to keep Mac computers safe. A listener who wants to sever ties and "cut the cord" with his cable company gets suggestions to improve his unsatisfactory streaming Internet experience. Malwarebytes' Anti-Malware detects a Probably Unwanted Malware (PUM) on a listener's computer. We explain how to deal with such a detection, and the use of System Restore to fix malware infections. Yet another listener with streaming Internet problems looks for ways to improve performance by checking his wireless connection to see if it is using the latest wireless performance standards. How to deal with a "This copy of Windows is not genuine" message appearing on a computer.

Computer Talk with TAB
Computer Talk 1/20/18 Hr 2

Computer Talk with TAB

Play Episode Listen Later Jan 20, 2018 35:35


Dealing with aging iPhone battery issues. A listener seeks advice on finding help and advice in purchasing a new computer and smartphone. Using Google Project fi could lower the cell phone bill for some users. A dual-monitor laptop user is looking for a better solution to hook up a wireless keyboard an mouse; a device called a port replicator may be a viable option for this connection. The Commodity Futures Trading Commission sues several Bitcoin currency operators, alleging fraud. An e-mailer wonders what services to use in addition to Microsoft Security Essentials to keep a computer secure; we recommend running Malwarebytes' Anti-Malware on a monthly basis. To stop robocalls and calls from telemarketers; we recommend a service called Nomorobo. Get a Star Wars drone for under $75. A caller wonders if there is any way to add a full screen monitor to a smartphone to view a smartphone screen without eye stain. A caller wonders how to deal with a "Fatal Error in HP Connection Manager." An e-mailer seeks recommendtions for a small laptop he can take on vacation.

InSecurity
Anti-Malware Testing for Dummies

InSecurity

Play Episode Listen Later Oct 22, 2017 18:24


Third-party testing of anti-malware solutions has long been fraught with issues that often make the results of little use to those in the process of evaluating the right product for their particular business needs. Ultimately, in-house testing in your own environment is the only reliable way to know if an anti-malware product is the right fit for your environment. If you don't have experience testing anti-malware products, creating an in-house testing environment can be a daunting endeavor. The recently published book Next-Generation Anti-Malware Testing for Dummies was designed to assist in understanding how to setup an in-house testing environment, safely obtain live malware samples, and perform tests that address real-world tactics attackers are using today. In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guests Carl Gottlieb - Founder/Consulting Director at Cognition and Founder of TestMyAV.com - and Chad Skipper – VP of Product Testing and Industry Relations at Cylance – the authors of the book.

Computer Talk with TAB
Computer Talk with TAB 5/27/17 Hr 2

Computer Talk with TAB

Play Episode Listen Later May 27, 2017 33:06


A listener wonders why he can get Internet access when his Internet modem is disconnected. A Mac user would like recommendation for a laptop to be used only for banking. How to deal with fake virus popups in your web browser. Troubleshooting wireless signal issues with Internet connections. Fixing scanning and faxing problems with Brother Laser Printers after upgrading to Windows 10. A listener notes that the newest version of Malwarebytes' Anti-Malware is faster, but is it as effective? Will updates to Windows occur if you do not turn your computer off at night?

Finding Genius Podcast
Lastline.Com – Anti Malware Technology Keeping Computer Security Threats Away

Finding Genius Podcast

Play Episode Listen Later May 24, 2017 39:47


Tens of thousands of viruses, in different shapes and sizes threaten computers everyday. That's why Giovanni Vigna CTO and Co-Founder of Lastline.com, explains how their company prevents malware from affecting computer security. Lastline.com is not a traditional anti-virus, but much more than that. To put it in Vigna's words, nowadays viruses come “packaged” in many different formats such as PDFs or Doc Files. There is no way of knowing if the file is corrupted or not, unless you open it and see the effect. So how to protect yourself? Thanks to Lastline.com, there is a technology called Sandbox, which opens the file in a secure environment and checks the status without the file affecting your computer. Learn, subscribe, review FutureTech podcast.

Computer Talk with TAB
Computer Talk with TAB 4/22/17 Hr 2

Computer Talk with TAB

Play Episode Listen Later Apr 22, 2017 38:22


Erik and Bob continue with your queries. Defragmentation dilemmas: Is defragmentation possble on a "tablet" device? The dangers associated with defragmentring solid state hard drives to improve performance. Fixing problems opening attachments in Windows Live Mail in Windows 7. Apple working on devices to transform diabetes care and treatment. Fixing Problems with Windows Update issues in Windows 10. A power user gets advice on buying a new graphics card. A listener asks for advice on whether to upgrade his Windows 7 computer or buy a new one with Windows 10. Using Malwarebytes' Anti-Malware and OpenDNS to surf the web more safely. We discuss updating web browsers to help make online banking more secure. Advice on fixing problems with printing on an HP Officejet 6500.

Bateria2x100
#50 – In Reply to JM & David

Bateria2x100

Play Episode Listen Later Sep 17, 2016 12:27


In reply JM & David WhatsApp se ha actualizado por una vez muy muy rápido y ya da soporte para SIRI. Sino os funciona : Ajustes->Siri->Compatibilidad con aplicaciones Seguridad en nuestro NAS y WORDPRESS: LATCH : https://latch.elevenpaths.com Anti-Malware from GOTMLS.NET (https://wordpress.org/plugins/gotmls/) Además : Sorteo de 3 licencias para CloudMounter : Una app que nos permite … Seguir leyendo #50 – In Reply to JM & David →

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Locky Ransomware Updates https://blog.avira.com/locky-ransomware-goes-autopilot/ https://blogs.forcepoint.com/security-labs/locky-distributor-uses-newly-released-quant-loader-sold-russian-underground https://isc.sans.edu/forums/diary/Is+2+out+of+3+good+enough+for+AntiMalware/21485/ Critical Update For Cisco WebEx Server https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem Dualtoy Malware Attacks iOS and Android http://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/ Certificate Pinning Issue in Firefox/Tor Browser https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95#.9jnte0u52

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Locky Ransomware Updates https://blog.avira.com/locky-ransomware-goes-autopilot/ https://blogs.forcepoint.com/security-labs/locky-distributor-uses-newly-released-quant-loader-sold-russian-underground https://isc.sans.edu/forums/diary/Is+2+out+of+3+good+enough+for+AntiMalware/21485/ Critical Update For Cisco WebEx Server https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-wem Dualtoy Malware Attacks iOS and Android http://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/ Certificate Pinning Issue in Firefox/Tor Browser https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95#.9jnte0u52

Paul's Security Weekly (Podcast-Only)
Paul's Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Jun 2, 2016 94:29


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

snoop dogg lyne antimalware james lyne paul's security weekly
Paul's Security Weekly (Video-Only)
Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Jun 2, 2016 45:22


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

Paul's Security Weekly TV
Security Weekly #459 - Interview with James Lyne

Paul's Security Weekly TV

Play Episode Listen Later Apr 8, 2016 45:22


We interview James Lyne from SANS. He comes from a background in cryptography but over the years has worked in a wide variety of security problem domains including anti-malware and hacking. James spent many years as a hands-on analyst dealing with deep technical issues and is a self-professed "massive geek".

Risk Roundup
Traditional Anti-Malware Software Effectiveness

Risk Roundup

Play Episode Listen Later Feb 26, 2016 89:32


Igor Volovich, CEO of Romad Cyber Systems participates in Risk Roundup to discuss the Traditional Anti-Malware Software Effectiveness Are Traditional Anti-Malware Software Effective? As each year brings more complex security threats, advanced malicious code, and unexpected security vulnerabilities, there is a serious attempt to secure cyberspace, geospace, and space (CGS). However, in the escalating arms […] The post Traditional Anti-Malware Software Effectiveness appeared first on Risk Group.

Bitni pogovori
Episode 123: Reminder, da pritisneš gumb

Bitni pogovori

Play Episode Listen Later Feb 5, 2016 63:40


Ko Nejc končno najde shopping app. Povezave AirMail AirMail MacStories ocena AnyList (shopping app) Nejčev workflow za clipart v omnifocus Applov marčevski dogodek iPhone 7 brez štrleče kamere Program zamenjave napajalnika Apple za priključitev na zidno vtičnico z izmeničnim tokom Applovo prvo finančno četrletje 2016 Anti-Malware za OS X Crashlands Slabi USB-C kabli ti lahko uničijo računalnik Special Guest: Alan Rener.

Cowboy Wisdom Radio
Cowboy Wisdom Radio

Cowboy Wisdom Radio

Play Episode Listen Later Feb 14, 2014 32:00


Jupiter Jim Word Press Website Designer is my guest. Website: http://jupiterjim.com Jupiter Jim graduated Phi Beta Kappa from Princeton, majoring in psychology.  He has been designing websites since 2000, been a CIW Certified Master Site Designer since 2003 and has been using WordPress exclusively all day, every day since January 2010. Out of approximately 25 million websites ranked worldwide by Alexa.com, JupiterJimsMarketing Team.com ranks about 110,000 worldwide and about 43,000 within the United States, which is no small feat. Click here for more information about Jupiter Jim. Jupiter Jim's Marketing Team Blog covers the following topics: Building WordPress Blogs.Marketing Your WordPress Blogs.Monetizing Your WordPress Blogs.Using the Thesis Theme for WordPress BlogsComputer Software to help your computer and your life run smoother.Computer Security — Anti-Virus, Anti-Spyware, Anti-Malware to keep your data from being lost and your business from being destroyed. This blog will help anyone who wants to build and market a WordPress blog. It is targeted towards people who own Small Businesses, Home-Based Businesses, Small Office Home Office (SOHO) Businesses, and Network Marketers. I wanted to create a blog that shares information on how to build and market your blog successfully. However, I also noticed that none of the Internet Marketing blogs or websites talk about the best software to use to keep your contacts, and passwords, and your lists, and projects organized properly.

Cowboy Wisdom Radio
Cowboy Wisdom Radio

Cowboy Wisdom Radio

Play Episode Listen Later Nov 20, 2013 34:00


Jupiter Jim Word Press Website Designer is my guest. Website: http://jupiterjim.com Jupiter Jim graduated Phi Beta Kappa from Princeton, majoring in psychology.  He has been designing websites since 2000, been a CIW Certified Master Site Designer since 2003 and has been using WordPress exclusively all day, every day since January 2010. Out of approximately 25 million websites ranked worldwide by Alexa.com, JupiterJimsMarketing Team.com ranks about 110,000 worldwide and about 43,000 within the United States, which is no small feat. Click here for more information about Jupiter Jim. Jupiter Jim's Marketing Team Blog covers the following topics: Building WordPress Blogs.Marketing Your WordPress Blogs.Monetizing Your WordPress Blogs.Using the Thesis Theme for WordPress BlogsComputer Software to help your computer and your life run smoother.Computer Security — Anti-Virus, Anti-Spyware, Anti-Malware to keep your data from being lost and your business from being destroyed. This blog will help anyone who wants to build and market a WordPress blog. It is targeted towards people who own Small Businesses, Home-Based Businesses, Small Office Home Office (SOHO) Businesses, and Network Marketers. I wanted to create a blog that shares information on how to build and market your blog successfully. Most people are so busy updating their blog, website, facebook, twitter and building their email lists, they forget about the importance of keeping their computer running smooth and safe, until it's too late!  I am trying to help you prevent computer security disasters.  

DiscussIT - The South African Podcast Portal
ZACon IV 2012 - Anti-malware Technique Evaluator (ATE) - Pwning AVs

DiscussIT - The South African Podcast Portal

Play Episode Listen Later Oct 28, 2012


ZACon IV Talk 4160;Download the160;160;Full Audio Fileaudiohttp://www.discussit.co.za/_media/_audio/itsp/ZACON_IV_04.mp3/audio...

361 Podcast
NQ Mobile: Mobile device anti-malware and 'intrusion detection' software

361 Podcast

Play Episode Listen Later May 2, 2012 13:55


Ewan and Ben visited the IT security show 'INFOSEC' to investigate the state of mobile security. We interviewed representatives from several exhibitors and discuss the challenges for mobile operators, businesses and consumers around mobile security, noting how immature the market still is.

Crypto Basic Podcast: Teaching You The Basics of Bitcoin and the World of Cryptocurrency. CryptoBasic

HELP SUPPORT THE PODCAST! Patreon - $1 an episode would be the best thing ever and keeps us afloat. Join our Discord right here Subscribe Via iTunes Binance Jersey referral link - Well we don’t technically use this, because we can’t. Non-US only. Ledger Nano S or Ledger Nano X - This is where you buy the hardware wallet that we're always talking about on the show - we all use a Ledger Nano S. Cash App has Bitcoin - If you sign up through that link the show gets $5 and so do you! Stop the presses. The easiest to use money transfer application (yes it's easier than Venmo) now as a built in way to buy and sell Bitcoin. They even have a no - fee debit card you can use. CryptoBasic Podcast Email 405.440.3260 Theme Music - Neledrax by Earradiate (2017) LINKS TO TOPICS FROM THE SHOW EPISODE 163 Date of Release: 3/1/19 What have we released? Substratum Delisting Round Table Interview #2 with Luke Mulks from Brave Rapid Fire NASDAQ BTC and ETH indices went Live. Elon Musk says whoever owns the early BTC deserves a Nobel prize in delayed gratification. But he still only owns .25 BTC so don't get too excited. Cryptopia releases its final hack estimates at 9.4% of its total assets. Maybe there's hope? There was a sweet bull market as BTC rose above 4k. ANNNNND It's gone. BAT Announces partnership with TAP Network Coinomi Wallet situation Coinomi Response A reddit named Warith Al Maawali came forward with claims that his entire life savings was lost on Coinomi. He isn't the only reddit user, there's 3 others that all had the same thing happen. Coinomi is a wallet for anyone not familiar. Their tagline is "Your Trusted Blockchain Interface" He actually made a website that has all of his proof, screenshots, research, and findings. The end result is that they were sharing your passphrase with a third party on Google's servers, for spell checking purposes. In plain text. Coinomi claims that it wasn't plain text, and that it was encapsulated inside a HTTPS request. The user claims that this can only be exploited by whoever created the exploit or anyone else that uses the backend at Google. Coinomi only says Google. They also say that it was only if you restored a desktop wallet. Also it totally wasn't a bug in their code (what?!) it was a plugin issue. Based on the screenshot of their e-mail, they did in fact admit that this was a problem. They even told the user he was eligible for a bounty, but they haven't taken any responsibility (at this time) to give him his crypto yet. This guy says he did everything right - he had it only running on a virtual machine behind a firewall with Anti-Malware and Anti-Virus protection. It was still compromised by a bug. They even went as far as to say "Don't worry we've blacklisted the funds they'll never get to exchanges". Guess what? The code wasn't open source. Coinomi also suggests he saw the problem and stole his own funds, and say that he was holding them ransom by threatening to go public. They also mention Luke Childs, Jonathan Sterling going public with their findings as irresponsible. (again what?!) They call him a blackmailer. They also admit there's an issue. Coinomi released the entire chat log of their support ticket. Warith was a dick, but they were asking him for a bunch of dumb shit and stalling too. Over-Under? Money Laundering Cases in Japan Involving Crypto December last year Report suggested Japan had over 6,000 money laundering cases involving cryptocurrency in first 9 months of the year (+1000 from regualtors). 7096 Between Apr-Dec 2017 only 669 cases so 10 fold increase What % of Japans money laundering cases in 2018 do you think that 7096 represents? SPOILER DONT PEEK =) 1.6%, 417,465 Cases Bullish or Bullshit - Epic Games (Fortnite) CEO Shows Support for EOS on Twitter. Well, since we're on the topic of EOS - Two Stories Their Github commits have gone wayyyy down. Longhash reports that less than 3% of their total commits have happened in the last 3 months. 4000 commits in a year - but 114 in the last 3 months. This isn't unique to EOS, it's just way worse there. ETH is at a 20%ish ratio, and Tron is at around 15%. One argument - they don't need to update as frequently because the blockchain has matured. EOS has failed to build a Byzantine fault tolerant blacklist, so someone stole $7M So basically, in order to blacklist bad actors there's a centralized authority called the ECAF. The ECAF wasn't democratically elected, they were just assigned at inception. I assume that's the "power vested in me" people. Basically the 21 block producers were getting annoyed at all the blacklisted addresses that were being submitted and decided it wasn't salable, so they were looking for an alternate solution. Apparently, this was a vulnerable solution if even ONE of the 21BPs incorrectly setup their blacklist. Games.eos did set it up wrong. So one of the blacklisted accounts with around $7M US was able to spread that money around indiscriminately. ONE So much for that. So what's their solution? They don't have one yet, but they're considering nulling out the keys on blacklisted accounts. Apparently they've discarded the ECAF - and are getting a new one. Well, since we're on the topic of EOS - "Another Story Ft. TRON & Sun" Chinese Government body ranks TRON 2nd Best Cryptocurrency...behind EOS. Story starts with a tweet from Sun braging about the rating from The Center for information and Industry Development (CCID) Apparently some of this rating is because of TRONs large transactions per day & tps Appropriate Vitalik Quote "When a blockchain project claims ‘We can do 3,500 TPS because we have a different algorithm,’ what we really mean is ‘We are a centralized pile of trash because we only have 7 nodes running the entire thing.’” Upside should be getting lots of Dapps and apparently TRON going aggro on it spending $100 million on TronArcade and launched a "$2 billion initiative called Project Genesis" to grow its Dapp market. One more before Mailbag. Mailbag What are your top useful use cases and top useful projects as of February 2019? in the sense that they're providing value to the crypto space just by developing and/or don't look like they'll collapse in a strong breeze. thebiggerboat