RDP stands for Remote Desktop Protocol that is used by people that need to access the desktop of a remote Windows computer. Hackers have been gaining access to these remote machines for over a decade thanks in part to weak passwords that are used to “secure” them by just guessing the username and password. Once hackers gain access, they have all the data that is on that computer, but instead of stealing the data, they are launching ransomware. (more…)
Forever 21 implemented encryption and tokenization in 2015, but it appears the security measures were not implemented at some point-of-sale machines. On Tuesday Forever 21 was notified by a third-party that there “may have been unauthorized access to data from payment cards” between March 2017 and October 2017. (more…)
Hello, let me introduce myself. My name is Nickie McNichols.
I am an event organizer/director of the Tampa Bay Ukulele Society. We are a C corp non-profit organization. We have over 1800 members on Meetup, and over 1000 on Facebook. Our efforts are aimed at education, entertainment, and giving back to the community. We graduated 100 kids in our free Ukulele Summer Camp program this year. This is our 3rd year doing free library workshops, teaching ukulele beginners of all ages. These are done at several libraries in Pinellas and Hillsborough counties, and soon to be extended to Pasco and Hernando counties. (more…)
A new antivirus bug called AVGater was discovered by a Vienna, Austria researcher named Florian Bogner. The bug can be exploited by local users only and allows the attacker to have full control over the computer by misusing the restore from quarantine in antivirus. The three access areas of antivirus are the unprivileged domain that consists of the user interface, the SYSTEM that consists of the Windows service, and the Kernel that consists of the operating system kernel (the core of the operating system). The image below depicts the basic functions and communication of antivirus. (more…)
Human traffickers worldwide are increasingly using social media to contact vulnerable victims. Human traffickers know how to search out a needy child or teenagers who may be insecure and wanting attention. The trafficker may appear to take a special interest in the child and tell them what they want to hear…this is called grooming.
Once limited to luring victims in the street, traffickers can now message thousands of people through Instagram, Facebook, Kik, Tagged and Twitter, with WhatsApp and Snapchat some of the latest tools in their arsenal. A trafficker may meet their potential victim on Facebook or other well-known site but ask the child to transfer their conversation to Kik or another less popular site. (more…)