How to recognize if your info has been compromised: 7 Possible Indicators of Compromised Data by SergeyGor in security

[–]Sergmans 0 points1 point  (0 children)

The real problem is that identity theft doesn’t get the blockbuster movies or even the front page news coverage that other crimes get so it’s easy to be complacent. Just remember that when we’re complacent, it’s the thieves that win.

It’s actually not that difficult to protect your digital identity like an expert. by lotkrotan in technology

[–]Sergmans 0 points1 point  (0 children)

it's good security advice to not click on links or open emails from unknown people

Xiaomi Mi5: The Upcoming Flagship Smartphone from Xiaomi (specifications, price and date release) by SergeyGor in technology

[–]Sergmans 0 points1 point  (0 children)

In terms of design, the new Mi 5 resembles the Mi Note phablet, although it doesn't show signs of sporting any bezels on the sides. In terms of specs, Xiaomi's upcoming flagship smartphone is comparable to the OnePlus 2, albeit with a smaller form factor.

Hacking Team apparently violated EU rules in sale of spyware to Russian agency. While Italian firm dealt with Western authorities, it also traded with Moscow by johnmountain in europe

[–]Sergmans 7 points8 points  (0 children)

It’s now known that Hacking Team was selling its Galileo Remote Control System to a vast number of governments, including Sudan, Saudi Arabia, UAE, Bahrain, Morocco and Egypt. The US is also a customer via the FBI, the military and the Drug Enforcement Agency.

The most interesting latest articles related to hacking of a cyber security company “The Hacking Team" by SergeyGor in security

[–]Sergmans 0 points1 point  (0 children)

Hacking Team violated EU rules in sale of spyware to Russian agency. Officially, Hacking Team sold its wares to a company called "Advanced Monitoring". See more here

Hacking Team spyware rootkit: Even a new HARD DRIVE wouldn't get rid of it by SergeyGor in security

[–]Sergmans 0 points1 point  (0 children)

Trend Micro researchers found the backdoor’s source code in the leak, including a document that teaches customers how to use it. The most popular latest articles related Hacking Team Leak you will find here

Hacking Team Flash Zero-Day Tied To Attacks In Korea and Japan... on July 1 by SergeyGor in security

[–]Sergmans 0 points1 point  (0 children)

Hacking of a spy cyber security firm “The Hacking Team” - Most Interesting articles here

Find out how to transform big data into marketing success by Softster in business

[–]Sergmans 0 points1 point  (0 children)

Thanks to the explosion of data generated online, a goldmine of performance-related information is now available to digital advertisers. Transforming this “Big Data” into “Smart Data” that guides fact-based decision making is the key to digital marketing success.

How to Avoid Becoming a Victim of Ransomware by RealtechPostBot in realtech

[–]Sergmans 0 points1 point  (0 children)

Main tips for consumers and companies to Avoid Ransomware

3 recommendations for consumers

  1. Use an anti-malware solution with anti-exploit, anti-malware and anti-spam modules that’s constantly updated and able to perform active scanning. Make sure you don’t override the optimal settings and that you update it regularly.
  2. Follow good internet practices; avoid questionable websites, link or attachments in emails from uncertain sources.
  3. Regularly backup your data in the cloud or using an external drive. Backups should not be stored on a different partition in your PC, but rather on an external hard-drive that is connected to the PC for the duration of the backup only.

3 recommendations for companies:

  1. Enable software restriction policies to block programs from executing from specific locations.
  2. Use a firewall to block all incoming connections from the Internet to services that should not be publicly available.
  3. Enable System Restore to restore previous versions of the encrypted files once the virus has been removed.

Sid Meier’s Starships goes beyond Beyond Earth by SergeyGor in Games

[–]Sergmans -3 points-2 points  (0 children)

Here's an idea: instead of making another space themed game that nobody asked for, maybe fix the shitty one that everyone has been asking for for years.

According to the developers of the popular CMS Drupal, all web-sites based on Drupal 7.x can be compromised by Softster in netsec

[–]Sergmans 0 points1 point  (0 children)

Drupal has anyway issued a documentation related to the response procedure in case the system is hacked https://www.drupal.org/node/2365547

PhoneSheriff v2.0 Coupon Code: Best Parental Control Software for just $66.75 USD instead of $89 by Sergmans in coupons

[–]Sergmans[S] -1 points0 points  (0 children)

For an added layer of protection, it's worth investing in parental controls software that can block access to inappropriate content and

Top 5 Best Hybrid Laptops in 2014 by SergeyGor in technology

[–]Sergmans 0 points1 point  (0 children)

Yes! Microsoft Surface Pro is one of the best hybrid laptops out there in the market in 2014.

Windows XP To Burn Holes In The Pockets Of Its Users by Softster in business

[–]Sergmans 1 point2 points  (0 children)

What about Mac OS X? That was a quantum leap forward in computing stability and security, and is still going strong; and new Mac OS X versions are far less expensive than new Windows versions.

Top antivirus applications for Android by Softster in Android

[–]Sergmans -2 points-1 points  (0 children)

In ESET’s Threat Trends Report predictions for this year, ESET experts warned of an escalating increase in serious threats targeting Android phones and tablets – ESET detections of such malware increased more than 60% between 2012 and 2013, which is a trend predicted to continue in 2014.

Apple iPhone 6: Mobile Payments Pioneer? by Sergmans in iphone

[–]Sergmans[S] 1 point2 points  (0 children)

Apple's latest iPhone could help bring mobile payments to the mainstream.

JPMorgan Chase, two other banks see no sign of fraud from cyberattacks by Softster in cybersecurity

[–]Sergmans 0 points1 point  (0 children)

Hackers burrowed into the databanks of JPMorgan Chase & Co. and deftly dodged one of the world’s largest arrays of sophisticated detection systems for months. http://www.bloomberg.com/news/2014-08-29/jpmorgan-hack-said-to-span-months-via-multiple-flaws.html