Jump to content

Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 1,046 results

  1. Mine is extremely light, but undoubtedly powerful. Here is my setup: Defensewall ShadowDefender Keyscrambler Sandboxie (custom rules) (A2, SAS, MBAM used rarely, on demand)
  2. Though Encryption is not a new topic, you might have heard it online, while doing purchases, etc. Whats App messages are protected with end-to-end encryption. Your credit card details, id& password, payment information are transferred over an encrypted network. You might have already read these things on various sites and services. So, every time you read about or heard of encryption, what was the first thing that came to your mind? Most of the people would think that encryption is complex, has something to do with security and only computer programmers or geeks can understand it. But it is not that complicated you might be thinking right now. I mean the encryption techniques you may find hard to understand but the basic essence of encryption and decryption is very simple. So, What is Encryption? In simple words, Encryption is the process of encoding a data in such a way that only intended or authorized recipient can decode it. Encryption does not secure the data but it makes your data un-readable to other parties. Which means, even if an unauthorized person or hacker is able to read the network he/she won’t be able to make any sense out of it without the correct decryption key. The science of encryption and decryption is called cryptography. Why is Encryption important? In today’s scenario, we perform a lot of data exchange online. When much of your personal information and financial transactions are processed via the Internet, no business or individual can afford to get their data stolen. Not only the financial data or business files, even the messages we exchanged with our friends, the photos/files shared with family or emails sent to our clients, we need encryption for all of these data. Cybercrime is already at its peak. Nothing is really safe. We witness cases of identity theft on daily basis. Keeping your personal data secure while using the system or at your end can be done. But when the same information is sent over the Internet, you want that information to be only viewed by the particular person and no one else. The data is first sent to the local network and then travels to Internet Service Provider. Finally, a person for whom the information was meant for, finally receives it. Meanwhile, there are numerous of people who can access your information that you are sending. That is the reason why encryption is important. Individuals use it to protect personal information, businesses use it to protect corporate secrets and government uses it to secure classified information. Basic Encryption Techniques For Network Security You Should Know About The strength of encryption is measured by its key size. No matter how strong encryption algorithm is being used, the encrypted data can be subjected to brute force attacks. There are some basic encryption techniques that are used by online services and websites that you should know about. 1. AES (Advanced Encryption Standard) Advanced Encryption Standard is a symmetric encryption technique. Symmetric encryption means it involves secret key that could be a number, word or a string of random letters which is known to both sender and receiver. This secret key is applied to messages in a particular way after which the data becomes encrypted. As long as the sender and recipient know the secret key, encryption and decryption can be performed. AES is extremely efficient in 128-bit form and it uses 192 and 256 bits for encryption purposes. In present day cryptography, AES is widely supported in hardware and software with a built-in flexibility of key length. The security with AES is assured if and only if it is implemented correctly with the employment of good key management. AES-256 bit is a very heavy and strong encryption. Most of the governments use it. 2. Blowfish Encryption Blowfish is symmetric cipher technique ideal for domestic and exportable purpose as this symmetric cipher splits messages into blocks of 64 bit each and then encrypts them individually. Blowfish encryption technique can be used as a drop-in replacement for DES. The technique takes variable length key varying from 32 bits to 448 bits. Blowfish is found in software categories ranging from e-commerce platform from security passwords to various password management tools. It is one the most flexible encryption methods available. 3. RSA Encryption The Rivest Shamir Adleman (RSA) encryption technique is one of the most popular and secure public key encryption methods. This public key encryption technique is also known as asymmetric cryptography that uses two keys, one public and one private. In RSA encryption technique, both public and private key can be used to encrypt the message. But for the decryption of the message, the opposite key that has been used for encryption will be used. Most of the times, the data is encrypted with public key and decrypte using the private key. RSA encryption method assures the confidentiality, authenticity, integrity and non-reputability of electronic communication and data storage. 4. Triple DES Encryption Triple DES encryption method is a more secure procedure of encryption as the encryption is done three times. Triple DES encryption technique takes three keys each of 64bit, so overall key length is 192bis. The data is encrypted with the first key, decrypted with the second key and then again encrypted with the third key. The procedure of decryption is somewhat same as the procedure included in encryption expect that it is executed in reverse. 5. Twofish Encryption Twofish is a symmetric block cipher method, in which single key is used for encryption and decryption. Twofish could be the best choice when among AES techniques as this encryption technique is unique in terms of speed, flexibility, and conservative design. Twofish is new encryption technique which is highly secure and flexible. This encryption technique works extremely well with large microprocessors, dedicated hardware, and 8-bit or 32-bit card processors. Also, twofish encryption technique can be used in network applications where keys tend to change frequently and in various applications with little or no ROM or RAM available. 6. DES Encryption Data Encryption Standard (DES) is symmetric block cipher which uses 56-bit key to encrypt and decrypt 64-bit block of data. The Same key is used to encrypt and decrypt the message, so both the sender and the receiver should know how to use the same private key. DES has been suspended by more secure and advanced AES encryption technique and triple DES encryption techniques. 7. IDEA Encryption International Data Encryption Algorithm (IDEA) is another block cipher encryption technique that uses 52 sub keys, each 16-bit long. This technique was used in pretty good privacy version 2. Conclusion Encryption is a standard method for making a communication private. The sender encrypts the message before sending it to another user. Only the intended recipient knows how to decrypt the message. Even if someone was eavesdropping over the communication would only know about the encrypted messages, but not how to decrypt the message successfully. Thus in order to ensure the privacy in electronic communication, various encryption techniques and methods are used. As with the growth of electronic commerce and Internet, the issue of privacy has forefront in electronic communication. In this era of internet, where every kind of data is transferred in digital format, it is important that we know how our data is transferred, saved and used. Everyone must know about these basic encryption techniques. You can share this information with your friends and family to make them aware of encryption techniques. Article source
  3. The final version of TLS 1.3 -- Transport Layer Security -- has been published by the IETF, the Internet Engineering Task Force, and popular browsers such as Firefox support it already (an earlier draft version and soon the final version). Tip: point your browser to the SSL/TLS capabilities test on SSLLabs to find out which versions your browser supports. Check the protocol features on the page to find out which protocols the browser supports. If you want to check out which TLS versions a server supports, run the company's SSL Server Test tool instead. TLS 1.3 is a major update to TLS 1.2 even though the minor increase of the version might indicate otherwise. Transport Layer Security is what is used by devices for secure transactions on the Internet. Basically, if you see HTTPS being used in the browser it is powered by TLS. Whether that is TLS 1.3 already or TLS 1.2 depends on the browser and the site that the browser connects to. Multiple drafts of the new TLS 1.3 specification were released in the past four or so years ever since work began in earnest on the new standard. Browser makers like Mozilla or Google implemented support for various draft versions and the functionality was considered experimental at that time. Some sites did make use of TLS 1.3 already; Mozilla notes that about 5% of Firefox connections use TLS 1.3 already and that companies like Google, Facebook or Cloudflare support TLS 1.3 already. Firefox supports a draft version that is essentially identical to the final published version. Mozilla plans to release the final version in Firefox 63 which the organization plans to release in October 2018. Google Chrome supports an earlier draft version already as well and will support the final version of TLS 1.3 in an upcoming version. Chrome and Firefox include options to manage TLS support in the browsers. Mozilla started to enable TLS 1.3 support in Firefox Stable in 2018. What makes TLS 1.3 special? TLS 1.3 is a major update of the standard that improves speed and security significantly. One of the main advantages of TLS 1.3 is that basic handshakes take a single round-trip compared to TLS 1.2's two round-trips. The time it takes to connect to servers that support TLS 1.3 is reduced because of that which means that web pages that support TLS 1.3 load faster in browsers that support the new standard. Security is improved as well in TLS 1.3 when compared to previous versions. TLS 1.3 focuses on some widely known and analyzed cryptographic algorithms while TLS 1.2 includes support for more algorithms of which some were exploited successfully in the past. TLS 1.3 encrypts most of the handshake next to that which improves privacy when connecting to servers as much of the information that is in the open when TLS 1.2 is used is now encrypted and unreadable while in transit. Cloudflare published a technical overview of TLS 1.3 on the company blog; a good read for anyone interested in the topic. Source
  4. With the peak of the Internet more and more people are getting their business and personal stuff online. But that also has it consequences: it is the privacy and security, or more importantly, lack of. Here are some basic tips to make your life more private and secure: Don’t open shady links. Now that’s an obvious one but often forgotten. ‘X tagged you in this’ or ‘look at this cute photo’ should always be taken with the grain of salt. Especially if you don’t often communicate with that person or that link doesn’t look too good like www.asdgsdg.com/photo.exe' Use quality antivirus software. Use something free like Avast or Microsoft Security Essentials or if you are willing to pay: Eset NOD32. Don’t skimp on this, it could save your digital life. Use a premium VPN. Nowadays you can barely trust your ISP to not log or use your data for potential gains. Especially in the US where they can sell your data to the advertisers. Pretty scary right? Pick something like NordVPN and get military grade security with respect to your privacy. I’ve dug out this coupon code earlier (USENORD60) which gets you 1 year of VPN for $60. A pretty good value I think. Use social media conservatively. Even if you take all the necessary precautions but post on Facebook that you aren’t home right now, it isn’t really safe, is it? Even more, I recommend not using social media, because they track you. Everybody tracks you online. Limit yourself of Google, use Duck Duck Go for searching, Privacy Badger for tracking cookies and HTTPS Everywhere extensions for security, ProtonMail for securely encrypted mail. Also, you could get one of the safest OS out there, Tails. Here are my 2 cents. Hope these tips are useful to someone. If you have any questions do let me know.
  5. Jime234

    Changing my AV

    Hi, I have been using ESET SS since half a decade now, Now I'm thinking about changing my security setup for a change. I was thinking about MSE with WFC and MBAM, will it be good enough ? In the past I have tried out Nortan, Kaspersky, Avast, Avira but they had huge update size or/and I just found them to be annoying... And then I found ESET I just want an AV with small sized update definitions, just like ESET has. If you guys have tried and experienced or know about such an av, then kindly suggest ! Thanks in Advance !!
  6. Is there any good security software for laptop, Point should be : Good Security. Light weight. Good Detection rate. less falls detection. Please consider :)
  7. Bitdefender 2019 - Stable - Final - Online/Offline Standalone Installers For Windows[x86 & x64] More Info/Official News: https://www.bitdefender.com/news/bitdefender-new-security-line-will-stop-most-sophisticated-attacks-3533.html BD 2019 Home/Home Office Forum: https://forum.bitdefender.com/index.php?/forum/536-bitdefender-2019-products/ BD TS 2019 Support: https://www.bitdefender.com/consumer/support/product/26925/ Improvements in BD 2019: https://www.bitdefender.com/consumer/support/answer/13353/ Changelog - gathered by Wortex/bitdefender forum: https://www.bitdefender.com/media/html/consumer/new/launch2019-opt/ Online Installers: Bitdefender Antivirus Plus 2019 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_antivirus.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_antivirus.exe Bitdefender Internet Security 2019 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_isecurity.exe Bitdefender Total Security 2019 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_tsecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_tsecurity.exe Offline Installers and Install Guide: Bitdefender 2019 Offline Installation Guide: Bitdefender 2019 AV Plus / Internet Security / Total Security - Standalone Installers [Windows]: 32bit [x86] - [Size: 428 MB]: https://download.bitdefender.com/windows/desktop/connect/cl/2019/all/bitdefender_ts_23_32b.exe 64bit [x64] - [Size: 456 MB]: https://download.bitdefender.com/windows/desktop/connect/cl/2019/all/bitdefender_ts_23_64b.exe Bitdefender Agent - 2019 - Universal [Same Agent for AV Plus / IS / TS]: Screenshots: Install Notes: Precaution Note: If you've already installed older version of Bitdefender[incl. 2016 version], we are sure that you'll lose your settings. Please take note of configuration, settings. whitelisted files and links. Also read the support page link above for upgrade/install Bitdefender 2019. Download and Install Bitdefender Agent. When it starts downloading the install files, Stop/Close it immediately. Note: Check whether there the Agent is installed only once in "Add/Remove Programs" or "Programs & Features". Note: Check in "Program Files" for folder named "Bitdefender Agent". Now, start installing offline installer and proceed with installation. Note: Please choose respective download link based on architecture x86/x64 for smooth installation. Note: Don't worry about AV Plus/IS/TS. The installer automatically modifies the installation depending on the license you entered. Once installation is done, configure accordingly for best protection and to avoid files from getting deleted. Configure Whitelist files and links if you have any. It is better to keep note of the configured settings for future use. User Guide: Bitdefender Antivirus Plus 2019: https://download.bitdefender.com/resources/media/materials/2019/userguides/en_EN/bitdefender_av_2019_userguide_en.pdf Bitdefender Internet Security 2019: https://download.bitdefender.com/resources/media/materials/2019/userguides/en_EN/bitdefender_is_2019_userguide_en.pdf Bitdefender Total Security 2019: https://download.bitdefender.com/resources/media/materials/2019/userguides/en_EN/bitdefender_ts_2019_userguide_en.pdf Uninstall Tool: Uninstall Tools Home: https://www.bitdefender.com/site/view/uninstall_consumer_paid.html Uninstall Tool For Bitdefender 2018 Products: https://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2018_UninstallTool.exe NOTE: Bitdefender 2018 Uninstall Tool require KB2999226. If you didn't install, you'll get error "api-ms-win-crt-runtime-l1-1-0.dll" missing. You can download it here - KB2999226 Uninstall Tool For Bitdefender 2017 Products: http://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2017_UninstallTool.exe NOTE: Bitdefender 2017 Uninstall Tool require KB2999226. If you didn't install, you'll get error "api-ms-win-crt-runtime-l1-1-0.dll" missing. You can download it here - KB2999226 Uninstall Tool For Bitdefender 2016 Products: http://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2016_UninstallTool.exe Uninstall Tool For Bitdefender 2015 / 2014 / 2013 Products: http://www.bitdefender.com/files/KnowledgeBase/file/The_New_Bitdefender_UninstallTool.exe Uninstall Tool For Bitdefender 2012 Products and Earlier: http://www.bitdefender.com/files/KnowledgeBase/file/BitDefender_Uninstall_Tool.exe @[email protected] my revealed new ac extn method - modified as Jedi II 2018 TR tool by Jedi/Polylak work with 2019? If not, check TR release 2019. Thanks.
  8. UPDATE 1 UPDATE 2 ------------------------------------------ 1) - Spycar What is Spycar? Spycar is a suite of tools designed to mimic spyware-like behavior, but in a benign form. Intelguardians created Spycar so anyone could test the behavior-based defenses of an anti-spyware tool. Spycar runs only on Windows, the same platform most targeted by spyware developers. What does Spycar do? The following links are Spycar. Clicking on each of the links will make Spycar try to take some benign action on your system. When you first run it, Spycar will ask you to name a test profile, a small file where we'll store state information about a given series of Spycar tests you perform. Then, when you click on each link, Spycar works by pushing a Windows executable to your browser. Currently, Spycar runs only on Windows, and its browser-centric alterations focus on IE, although it can be triggered by any Windows browser (Firefox-altering Spycar modules will be released soon!). Spycar does not include any exploits, so you must click "OK" in the message that appears in your browser to run the given Spycar function. If, after you click "OK", your anti-spyware tool blocks the given Spycar action, good for you! If not, this benign alteration will occur. Then, when you have clicked each of these links, you can click on the Results/Clean-Up link to have the Spycar tool called TowTruck automatically measure how your anti-spyware tool did, and to restore your machine to the pre-Spycar settings. Note that we designed Spycar as a series of different links and associated executables. We did not make it a monolithic one-click-to-conduct-all-actions programs, because an anti-spyware tool may shut down a given program early on in its cycle, without letting Spycar accurately test later modules. That's why you have to click on each link, giving your anti-spyware tool a fair shot at stopping each individual action. Spycar Tests Spycar Homepage 2) -Shields UP Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer's data to the entire world at this very moment! GRC Shields UP Test 3) - DNS Nameserver Spoofability Test Can you trust your Domain Name Servers? You and your web browser would believe you were at your banking site. You entered the URL correctly, or used a reliable link or shortcut. Everything would look right. But you would be logged onto a malicious foreign web site which was ready and able to capture your private banking information. DNS Spoofability test 4) -Symantec Security Check Symantec Security Test 5) -PC Security Test PC Security Test is a free program for Windows that checks computer security against viruses, spyware and hackers. With a few mouse clicks, users can easily control the efficiency of their protection software (anti-virus programs, spyware scanners and firewalls). PC Security Test simulates virus, spyware and hacking attacks and monitors the responses of your protection software. Don't worry, no real viruses are involved !After the tests are complete, PC Securtiy computes a security index and provides tips on improving PC security. Download PC Security Test Homepage 6) -PC Flanks Battery of Tests PC Flanks Tests 7)- Security Scan from Audit My PC scans done - Firewall Scanner , Privacy Scanner , Exploit Scanner Audit My PC 8 ) -Test My PC Security Battery of Tests . Test My PC Security has a wide range of downloadable firewall leak and HIPS tests so you can find out just how good your security software is. Firewall Leak Tests – Firewall leak tests are written to test how effective the firewall component of your security software is at detecting and blocking outgoing connection attempts. If a program is able to connect to the internet without your knowledge then it is capable of transmitting any private data you may have on your machine. The techniques used by these programs are sophisticated but are representative of real world threats – so your firewall needs to block them. HIPS Tests – Tests designed to check how well your security software protects your internal system from attack by malicious executables such as viruses. A good HIPS system will restrict access to your critical operating system files, registry keys, COM interfaces and running processes. It should block untrusted processes from modifying the memory space of other programs and stop malware whenever it tries to install itself. Firewall Leak and HIPS tests – These tests are designed to test both of the above at the same time (both the Firewall and Host Intrusion Prevention components of your software). Download Complete Set of tests (Zip ) Individual Tests Home Page 9) -Belarc Advisor - Free Personal PC Audit The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, CIS (Center for Internet Security) benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Download BelArc Security Advisor BelArc Home Page 10) - Qualys Browser Check Perform a security analysis of your browser and its installed and missing plug ins and / or any other security patches or any other security issues . Qualys Browser Check 11) - Browser Spy BrowserSpy.dk is a collection of online tests that shows you just how much personal information can be collected from your browser just by visiting a page. BrowserSpy.dk can tell you all kinds of detailed information about you and your browser. Information ranging from simple stuff like the name and version of your browser to more detailed stuff like what kind of fonts you have installed and what hardware you're running on. You name it, BrowserSpy.dk shows it! When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. BrowserSpy.dk is a service where you can check just what information it's possible to gather from your system, just by visiting a website.Privacy to the ultimate test! Browser Spy 12) - Eicar Test File The Eicar Test file , your anti virus should alert you to both the files when you click on them . if it doesnt , let them download , and then extract them or use them or scan your pc with your AV scanner . if working , your AV scanner should alert you this ( FAKE ) threat ... Eicar2com test Zip eicar.com 13) - Firewall Leak Tester Download Firewall Leak Test Leak Test Home Page 14) - Zemana Logging Tests . These test programs simulate the activities of different loggers. If your security software is protecting you proactively, then the simulation should trigger a warning message. No warning means no proactive protection... and probably no protection at all! If the simulation does not trigger a warning, then your current security software does not protect you . http://zemana.com/SecurityTests.aspx 15) - Spy Shelter Security Test Tool Download Spy Shelter Test Spy Shelter Home Page 16) - BufferZone Security Test Tool In the following demo, we will simulate what will happen when you receive a malicious file. It could come in through any number of ways: browsing, as an email attachment, from a USB storage device, just to name a few. We will attempt to prove that none of your security system's defense layers will identify or alert you to our intrusion attempt. Note: This is only a demo and no actual damage will be caused to your PC. Download Test File BufferZone Test Homepage 17) - Matousec Security Software Testing Suite Security Software Testing Suite (SSTS) is a set of tools used for testing Windows security software that implement application-based security – i.e. most of the Internet security suites, HIPS, personal firewalls, behavior blockers etc. SSTS is based on the idea of independent programs that attempt to bypass various features of the security software. Each test of SSTS is directed against a single feature or against a few closely connected features of the security software. Download SSTS. Matousec SSTS Homepage 18) - RUBotted - Test if your PC is Acting like a BOT . RUBotted monitors your computer for potential infection and suspicious activities associated with bots. Bots are malicious files that enable cybercriminals to secretly take control of your computer. As more bots secretly take control of computers and use these infected machines in malicious activities, bot networks are becoming more resilient. The emergence of new bot families and the continued proliferation of some of the threat landscape's most notorious botnets only reinforce the need for a reliable solution against botnets. It is capable of detecting known and unknown variants of known botnet families including some of the most notorious botnets today: ZBOT/ZeuS – bank information stealerKOOBFACE – most successful Web 2.0 botnetWALEDAC – infamous spamming botDownload RUBotted RUBotted Homepage 19) Comodo Tests ( Thanks to Alienforce1) Comodo Parent Injection Leak Test Suite (contains 3 Tests) The CPIL suite contains three separate tests especially developed by Comodo engineers to test a firewall's protection against parent injection leak attacks Download CPIL -- -------------------- Comodo HIPS and Firewall Leak Test Suite (contains 5 tests) Comodo's latest suite of tests cover a wider range of exploits and will tell quickly inform you if your computer is vulnerable to Root kits, Background Intelligent Transfer attacks and process injection attacks. Download HIPS and Firewall Test 20) Phish Test Verify the authenticity of a URL with this online live tool . suspect a link to be Phishy test it here . and see if its been reported a web forgery or not . other way to use the tool is to check your system for Phishing safety . copy a link from the website which has already been reported to be a web forgery . open it in your browser and see if you get any alerts . PhishTank PS-- please read all the instructions on a tests web site thoroughly and completely before running or performing a test . the post can not be held responsible for any loss of data , loss of system stability , system crashes , BSOD, system failures or for that reason , any thing that may arise while or after performing a test .!! nothing serious , just a random precautionary statement , all tests are safe . go ahead and try them and test your system ...
  9. Incident slammed as the 'greatest breach in the history of telecommunications in Spain' SPANISH OPERATOR Telefonica has suffered a security breach that exposed the personal data of millions of customers. The breach allowed anyone to access the billing data of other customers, according to a report at El Espanol, which noted that the incident is similar to a serious failure that hit Spain's system in July 2017 that left personal data accessible to intruders without a high level of technical skill. To access the data of other customers, users only had to be logged into the system, access their invoice and make a small change in the URL, according to the report. From here, anyone could access the personal data of "millions" of Telefonica customers, including landline and mobile numbers, national ID numbers, addresses, banks, names, billing history and records of calls and other data. All of these data could be downloaded in CSV format files. "Although this involved accessing random data, it would have been possible to design a program that would collect information in large quantities from the operator's systems and then analyze it," El Espanol notes. The breach came to light after a Movistar customer reported the screw-up to Spanish consumer rights group FACUA, which has since filed a complaint with the Spanish Agency for Data Protection (AEPD) and is calling the incident the "greatest security breach in the history of telecommunications in Spain." Spain's AEDP is responsible for enforcing the EU's newly-introduced GDPR rules, under which Telefonica could face a fine between €10m and €20m, or 2 to 4 per cent of its annual turnover. However, Spain's data protection law limits these fines to between €300,000 and €600,000. FACUA has slammed the reduced fines as "absolutely ridiculous" and is calling on the Spanish government to update the regulation. Telefonica told El Espanol that "no fraudulent access has been detected " adding that it's made "all the competent authorities" aware of the breach. < Here >
  10. Once again, a medical company has suffered a cyber attack with suspicions for a possible data breach. This time, it is a US-based diagnostic laboratory LabCorp. Though the investigations are still underway, authorities suspect that the LabCorp system was possibly hacked by some unknown hackers to gain access to the private medical data. LabCorp System Hacked Causing Nationwide Website Shut Down The medical diagnostic laboratory LabCorp suffered a hacking attempt earlier this week. The hackers possibly hacked the company’s system to gain access to the private records. Upon noticing a suspicious activity, the IT officials shut down the company’s system. LabCorp disclosed details in an SEC filing: “During the weekend of July 14, 2018, LabCorp detected suspicious activity on its information technology network. LabCorp immediately took certain systems offline as part of its comprehensive response to contain the activity.” After the system shut down on Sunday morning, the patients could not access their test results and other required details over the weekend. However, the firm assures that the workers are trying their best to restore the system. “Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed today, and we anticipate that additional systems and functions will be restored through the next several days.” Possible Data Breach Suspected – Investigations Underway After the incident, the firm took quick actions to stop the suspicious activity. They also began investigations to find out the extent of this cyber attack. “LabCorp has notified the relevant authorities of the suspicious activity and will cooperate in any investigation.” For now, LabCorp has not released any general explanation about the incident, nor does it currently suspect any data breach. LabCorp is among the largest US diagnostic laboratories holding records of millions of patients. As stated on their company website, “The company provides diagnostic, drug development and technology-enabled solutions for more than 115 million patient encounters per year. LabCorp typically processes tests on more than 2.5 million patient specimens per week and supports clinical trial activity in approximately 100 countries.” This is quite impressive and in the event of a data breach, one can anticipate the extent of damages caused to millions of patients globally. For now, it seems that should a data breach of occurred it could be a massive acceleration of the medical data breaches which have happened recently at NHS and MedEvolve. We shall keep you updated about the matter as we continue to find out more. < Here >
  11. I noticed that even though I put HTTPS in my URL-bar, whenever I click a link nsaneforums would force HTTP_ again. Now everyone should only post when HTTPS is on for security reasons, else "they" know your username and what you posted. There are many browser addons that force HTTPS to be on, however the EFF approved HTTPS Everywhere is the most popular one. Sadly by default it doesn't recognize nsaneforums, so here is how to add a new rule: When you do this you always will use HTTPS on nsaneforums, protect your username and make your ISP / government not be able to read what you post! Be safe friend, always encrypt!
  12. Researchers at the University of Chicago have found that there are a lot of misconceptions about incognito mode among users. Many users believed that employers or ISPs wouldn’t be able to observe their data and most of them think that browsing in the private mode would protect them from viruses and malware. The University published their results which included 450 subjects answering the questions about the incognito mode and private mode in browsers. If you don’t know how private or incognito mode works – typically browsers suggest using that option will help you stay anonymous online but that’s not the actual case here. Google Chrome says that it will not collect your browsing history, cookies and site data for more information entered into the forms but it will not hide your history from your ISP or employers. Here is the list of misconceptions that were noted during the study: “46.5% of subjects ‘thought bookmarks saved in private mode would not continue in later sessions,’ when they actually do. “40.2% of subjects thought websites would not be able to determine a user’s location,” while in private mode. You can make it harder to estimate your location if you use a VPN. “27.1% of subjects considered private mode offered more protection against viruses and malware than standard [mode.]” This is a misconception since any files you download and open on your computer could still be affected with malware or viruses. “22.0%, 37.0%, and 22.6% of participants falsely believed that ISPs, employers, and the government would be unable to track them when they used private mode.” If you’re on someone’s network, chances are they can see what you’re doing. More than 56.3% of the subjects thought that browsing in private mode would hide your search history but Google will still log the user’s search and also save a copy of that query. < Here >
  13. Login passwords for tens of thousands of Dahua devices have been cached inside search results returned by ZoomEye, a search engine for discovering Internet-connected devices (also called an IoT search engine). Discovered by Ankit Anubhav, Principal Researcher at NewSky Security, a cyber-security company specialized in IoT security, these passwords are for Dahua DVRs running very old firmware that is vulnerable to a five-year-old vulnerability. People are still running DVRs with ancient firmware This vulnerability is CVE-2013-6117, discovered and detailed by Jake Reynolds, a security researcher with Depth Security. According to the researcher's blog post and to Anubhav, who explained the exploitation process to Bleeping Computer yesterday, an attacker can initiate a raw TCP connection on a Dahua DVR on port 37777 to sent a special payload. Once a Dahua device receives this payload, it responds with DDNS credentials for accessing the device, and other data, all in plaintext. The vulnerability has been known since 2013 and has been since patched, but many Dahua device owners have failed to update their equipment, and even to this day have continued to deploy DVRs running the antiquated firmware online. Dahua passwords indexed in ZoomEye But while this sounds pretty bad, things are actually worse. Earlier this week, Anubhav discovered that IoT search engine ZoomEye has been indexing these Dahua devices in a peculliar manner. "The matter of fact is that a hacker doesn't need to exploit this vulnerability because as ZoomEye scans port 37777, it passes these special bytes and cache the output in plaintext, so a hacker just needs to go to ZoomEye, create a free account, and scrap results to get the credentials," Anubhav told Bleeping Computer in a private conversation. Anubhav has attempted to get in contact with the ZoomEye team to have this cached passwords removed or blurred from results. A request from Bleeping Computer earlier today has also gone without a response. The NewSky researchers says that he learned of the trick from a post published by the author of the BrickerBot IoT malware, the one who was on a crucade last year, bricking unsecured devices in an attempt to have them go offline instead of being added to IoT botnets. Anubhav says he was told by the BrickerBot author that he used CVE-2013-6117 to hijack and brick Dahua DVRs in the past. "Fresh devices keep on being added on ZoomEye, so even if Janitor [the BrickerBot author] bricked some in past, this issue still persists as ZoomEye currently lists recently added devices," Anubhav told us. Tens of thousands of devices unearthed with just three searchers A quick search from Bleeping Computer has unearthed a worrisome number of vulnerable devices. For example, we found nearly over 15,800 Dahua devices with a password of "admin", over 14,000 with a password of "123456," and over 600 with a password of "password". That's around 30,000 Dahua devices running older firmware and ready for the taking, and we found them with just three queries. < Here >
  14. Lots of government people are focused on IoT security, such as this recent effort. They are usually wrong. It's a typical cybersecurity policy effort which knows the answer without paying attention to the question. Government efforts focus on vulns and patching, ignoring more important issues. Patching has little to do with IoT security. For one thing, consumers will not patch vulns, because unlike your phone/laptop computer which is all "in your face", IoT devices, once installed, are quickly forgotten. For another thing, the average lifespan of a device on your network is at least twice the duration of support from the vendor making patches available. Naive solutions to the manual patching problem, like forcing autoupdates from vendors, increase rather than decrease the danger. Manual patches that don't get applied cause a small, but manageable constant hacking problem. Automatic patching causes rarer, but more catastrophic events when hackers hack the vendor and push out a bad patch. People are afraid of Mirai, a comparatively minor event that led to a quick cleansing of vulnerable devices from the Internet. They should be more afraid of notPetya, the most catastrophic event yet on the Internet that was launched by subverting an automated patch of accounting software. Vulns aren't even the problem. Mirai didn't happen because of accidental bugs, but because of conscious design decisions. Security cameras have unique requirements of being exposed to the Internet and needing a remote factory reset, leading to the worm. While notPetya did exploit a Microsoft vuln, it's primary vector of spreading (after the subverted update) was via misconfigured Windows networking, not that vuln. In other words, while Mirai and notPetya are the most important events people cite supporting their vuln/patching policy, neither was really about vuln/patching. Such technical analysis of events like Mirai and notPetya are ignored. Policymakers are only cherrypicking the superficial conclusions supporting their goals. They assiduously ignore in-depth analysis of such things because it inevitably fails to support their positions, or directly contradicts them. IoT security is going to be solved regardless of what government does. All this policy talk is premised on things being static unless government takes action. This is wrong. Government is still waffling on its response to Mirai, but the market quickly adapted. Those off-brand, poorly engineered security cameras you buy for $19 from Amazon.com shipped directly from Shenzen now look very different, having less Internet exposure, than the ones used in Mirai. Major Internet sites like Twitter now use multiple DNS providers so that a DDoS attack on one won't take down their services. In addition, technology is fundamentally changing. Mirai attacked IPv4 addresses outside the firewall. The 100-billion IoT devices going on the network in the next decade will not work this way, cannot work this way, because there are only 4-billion IPv4 addresses. Instead, they'll be behind NATs or accessed via IPv6, both of which prevent Mirai-style worms from functioning. Your fridge and toaster won't connect via your home WiFi anyway, but via a 5G chip unrelated to your home. Lastly, focusing on the vendor is a tired government cliche. Chronic internet security problems that go unsolved year after year, decade after decade, come from users failing, not vendors. Vendors quickly adapt, users don't. The most important solutions to today's IoT insecurities are to firewall and microsegment networks, something wholly within control of users, even home users. Yet government policy makers won't consider the most important solutions, because their goal is less cybersecurity itself and more how cybersecurity can further their political interests. The best government policy for IoT policy is to do nothing, or at least focus on more relevant solutions than patching vulns. The ideas propose above will add costs to devices while making insignificant benefits to security. Yes, we will have IoT security issues in the future, but they will be new and interesting ones, requiring different solutions than the ones proposed. Source
  15. Hacking incidents in 2018 have shown us that cyber security is a growing concern, in part due to the amount of new technology available to the masses. Whilst great efforts are being made to counter such threats, they too are advancing in a never ending ‘cat and mouse’ game. Here are some of the high profile hacks so far in 2018: Universities Hacked A total of 9 Irani hackers were accused of hacking into 144 US universities, and 176 universities in 21 other countries. A total of 31 TB of data was stolen altogether which accounted for almost $3 billion. The hacks were done using phishing attacks, malware and spyware. University professors and students were tricked to click on shady links and credentials were leaked. One example of this can he found here Data Exposed To Public A few cloud based firms were hacked and their data was exposed to public. Exactis was hacked where around 340 million records were made available for the public. No credit card or financial information was present but 2TB of personal information was made public. An example can be found here Under Armour App A fitness pal app was hacked and personal information such as usernames, addresses, contact information, emails and passwords of around 150 million users were revealed in February 2018. The security team took the app down before remediating the issue. Further info can be found here Olympics Hacked Winter Olympics were hacked that caused issues with the event. Many consider this app a government move. Further information can be found here Routers Hacked Russian hackers hacked into more than 500,000 routers using a malware called VPN FILTER. The malware was a bot that spied on the users and stole data. Further information can be found here Bottomline With the other half of 2018 to come security firms must up their game to prevent such attempts in the future. < Here >
  16. Gentoo have finished their investigation of the hack that affected their project last week on GitHub. The point of vulnerability has turned out to be a weak Administrator password. upon compromise the hackers added the Linux killer command “rm -rf /” so when users cloned the project to their computers all their data will be erased. After the unknown individuals gained control over the Gentoo Organisation’s GitHub repository they locked out the administrators. Then the hacker group began adding the killer command to the various repositories. Gentoo is one of the oldest versions of the Linux operating systems, unlike most, this distribution has pre-built software packages and also uses the package management to download new software and in some cases source code to build the programs in the clients itself. Fortunately there are various mitigations that were preventing the code from running on client machines. The main master Gentoo repository is not affected therefore users who have used the rsync or websync were not affected. The logs also indicated that attackers have brute forced using many accounts before discovering the administrative password and altering legitimate code. The evidence also suggested that the Administrator has been using the same password in all their accounts which might have aided in the successful exploitation. The GitHub repos of Gentoo organisation were unavailable for five days and the organisation has made sure the all the employees are using unique and complex passwords for their work accounts and also made sure that every employee has opted for the 2FA. The organisation is still working on ways to restore the pull requests that were deleted by the attackers. < Here >
  17. A person's fingers leave thermal residue on keyboard keys that a malicious observer could record and later determine the text a user has entered on the keyboard, according to a recently published research paper by three scientists from the University of California, Irvine (UCI). "It’s a new attack that allows someone with a mid-range thermal camera to capture keys pressed on a normal keyboard, up to one minute after the victim enters them," says UCI Computer Science Professor Gene Tsudik, one of the three researchers who worked on the paper. "If you type your password and walk or step away, someone can learn a lot about it after-the-fact," Tsudik said. Thermanator attack can recover passwords, PINs The UCI team calls this attack Thermanator, and they say it can be used to recover short strings of text, may it be a verification code, a banking PIN, or password. Attackers need to be able to place a camera with thermal recording features near a victim, and the camera must have a clear view of the keys for the Thermanator attack to work. But when these conditions are met, an attacker, even a non-expert one, can recover a collection of keys the victim has pressed, keys which it can later assemble into possible strings to be used in a dictionary attack. Passwords can be recovered up to 30 seconds after input In laboratory experiments, the research team had 31 users enter passwords on four different keyboard types. UCI researchers then asked eight non-experts to derive the set of pressed keys from the recorded thermal imaging data. The test showed that thermal data recorded up to 30 seconds after the password entry is good enough for a non-expert attacker to recover the entire set of keys pressed by a victim. Attackers can recover partial key sets when the thermal data is recorded up to one minute after the key presses. Researchers say that users who type using a "hunt and peck" technique of pressing one key at a time with two fingers while continually looking at the keyboard are more susceptible to having their key presses harvested by this technique. UCI researchers: Passwords must go One of the conclusions of this research is that over the years several academics have devised several types of attacks for recording passwords in various ways, such as through mechanical vibrations, electromagnetic emanations, and more. The research team argues that it may be time to move away from passwords as a means to secure user data and equipment. "As formerly niche sensing devices become less and less expensive, new side-channel attacks move from 'Mission: Impossible' towards reality," researchers said. "This is especially true considering the constantly decreasing cost and increasing availability of high-quality thermal imagers." < Here >
  18. Q: Is it true that Windows 10 is more secure than Windows 7? A: Microsoft has made a concerted effort to get users to upgrade to Windows 10 since it was released in 2015 and touting security and performance have been their primary tactics. Despite their best efforts, Windows 7 continues to be a very popular operating system, especially with businesses, but that will have to change in the near future. Mainstream support for Windows 7 actually expired in early 2015 with extended support slated to end in January of 2020. The primary difference in these support levels is that when mainstream support ends, performance improvements, new features and free support also end. Extended support means that Microsoft will only provide bug fixes and security updates. Essentially, anyone running Windows 7 should be planning to transition to another supported OS over the next year and a half. Security comparison Microsoft has attempted to use scare tactics in the past to convince users to upgrade, but they have been called out on some of their claims by many in the tech community. However, a third-party security company recently published data on their users supporting Microsoft’s claims that Windows 10 is more secure. Webroot reported that only 15% of the total known malware files in 2017 were found on Windows 10 systems while 63 percent of the known malicious files were found on Windows 7 systems. There are a number of reasons for this pronounced imbalance, but a major difference is that Windows 10 forces automatic updates while Windows 7 allows users to fully control when updates are installed. There’s no doubt that Microsoft attempted to ‘harden’ Windows 10 against many of the known exploit strategies used by malicious code writers, which is also a likely contributor. A great example of this was seen during the WannaCry ransomware attacks last year as the vast majority of victims were running Windows 7 and Windows 10 users were completely unaffected. Since Windows 7 was originally released in 2009, hackers have had a longer time to discover exploits and create clever tactics to compromise users. Knowing of these tactics, Microsoft created Windows 10 with completely new code, making many of the Windows 7 specific exploits harmless to it’s users. Performance improvements Windows 10 was designed to startup faster and recognize substantially more RAM, so you may notice a slight increase in performance over Windows 7 on the same hardware. We’ve seen Windows 10 work very well on lots of older computers as well, especially if you add a little extra RAM while upgrading. If you really want to bump up the performance on an older computer, swap out the old hard drive for a new Solid State Drive (SSD) because your hard drive is always the biggest bottleneck to overall performance. More like Windows 7 One of the biggest complaints from those upgrading from Windows 7 to Windows 10 is the overall look and feel. While you can never get Windows 10 to look and feel exactly like Windows 7, there are lots of little tweaks that can help minimize the differences so that it’s little more comfortable during your transition. Source
  19. How third-party services can knock out three out of four online properties Internet infrastructure may be fairly resilient thanks to its distributed nature, but the web we've built on top of it appears to be rather fragile. In a paper distributed last week through the ArXiv preprint server, researchers for Carnegie Mellon University find that third-party services such as domain name service (DNS) providers, content delivery networks (CDNs) and certificate authorities (CAs) represent an attractive target for attackers looking to maximize the impact of their hacking. Citing how the 2016 DDoS attack that downed managed DNS provider Dyn affected dependent sites like Amazon, Netflix and Twitter, the researchers – Aqsa Kashaf, Carolina Zarate, Hanruo Wang, Yuvraj Agarwal and Vyas Sekar – say the majority of top websites have a similar Achilles' Heel. "Our analysis paints a somewhat bleak situation on the state of modern web ecosystem," they observe, noting that most web services have little or no redundancy when using third-party infrastructure services and that a handful of these services represent potential single points of failure. The findings call into question the comprehensiveness of enterprise disaster planning scenarios. Most large business have some degree of system redundancy set up to deal with data center outages. But how many have implemented third-party service redundancy? Harvard University researchers raised this point, specifically in the context of DNS, earlier this year. The CMU boffins note that about 73 per cent of the top 100,000 websites – by Alexa stats – are vulnerable to diminished availability as a result of potential attacks on DNS, CDN and CA services. What's more, they observe that the amount of third-party services providing these critical functions is so limited that if the ten most popular providers of content delivery, domain name service and SSL certificate validation (OCSP servers) experienced an outage, between a quarter and almost a half of the top 100,000 websites would be affected. In addition, indirect or transient dependencies expand the possible points of failure: Critical third-party services can depend on other services and when one service is out it can have a downstream effect. For example, the researchers explain, the Dyn outage affected websites that relied on the Fastly CDN, because Fastly depended on Dyn. The researchers contend these indirect dependencies can increase the set of vulnerable web services by a factor of ten. Based on their findings, the researchers advise not only should organizations do the obvious thing and add some service redundancy but they should also analyze third-party service dependencies as avenues of vulnerability. ® < Here >
  20. vissha

    simplewall 2.3.1 Stable

    Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer. This tool is presented within a simple interface enabling fast configuration and includes internal blocking lists (malware, telemetry). simplewall (WFP Tool) can be considered as an alternative to the default filters provided by Windows Firewall. It will enable you to effectively regulate which of your processes or apps require internet access restriction or not. simplewall (WFP Tool) is designed to make your life easy by automatically blocking malware and telemetry-related data but can also be used with custom rules for blocking particular ports or IP addresses if desired. Features Simple interface without annoying pop ups Dropped packets logging (Windows 7 and above) Internal blocking lists (malware, telemetry) Free and open source Localization support IPv4/IPv6 support Changelog: v2.3.1 (25 Juny 2018) fixed loopback rules (added more reserved ip addresses) fixed sometimes system cannot be going to sleep fixed applying rules for services (appcrash) fixed update sometimes cannot be installed fixed services enumeration fixed system rules Homepage: https://www.henrypp.org/product/simplewall Downloads - v2.3.1 stable: Installer: https://github.com/henrypp/simplewall/releases/download/v.2.3.1/simplewall-2.3.1-setup.exe Portable: https://github.com/henrypp/simplewall/releases/download/v.2.3.1/simplewall-2.3.1-bin.zip
  21. Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack —most likely a cyber-espionage campaign. Researchers discovered this new malware earlier this week after a user from Afghanistan uploaded a boobytrapped Word document on VirusTotal. The document contained text taken from an article published last month about the Shanghai Cooperation Organization Summit, a political conference on Eurasian political, economic, and security topics. Malware most likely used for cyber-espionage Because VirusTotal hides precise information about the source of the upload, the target of this attack is unknown. "We’ve only seen one sample of the malware," Chris Doman, a security researcher with AlienVault told Bleeping Computer. "It seems very targeted," Doman added. "Given the decoy document is in English and uploaded from Afghanistan, it may have been targeting someone in an embassy or similar there." A GZipDe infection is a multi-step process This Word file was just the first step in a multi-step infection process, which Doman detailed in a report published yesterday. The document lured users into enabling macros, which then executed a Visual Basic script, which ran some PowerShell code, which downloaded a PE32 executable, which later dropped the actual malware —GZipDe. According to Doman, GZipDe is coded in .NET, and uses "a custom encryption method to obfuscate process memory and evade antivirus detection." GZipDe is a "downloader," meaning its role is to fetch another more potent threat from a remote server. This second server was down when researcher found the malware, and under normal, the investigation would have been over at this phase. Fortunately, the AlienVault team got lucky because IoT search engine Shodan had indexed the server and "recorded it serving a Metasploit payload." GZipDe drops Metasploit-based backdoor Analyzing the logged shellcode, the AlienVault team determined this was a Metasploit module. Metasploit is a framework used by security researchers for penetration tests, and this particular module was developed to work as a backdoor. "For example, it can gather information from the system and contact the command and control server to receive further commands," the AlienVault team says. "This shellcode loads the entire DLL into memory, so it’s able to operate while writing no information into the disk. [...] From this point, the attacker can transmit any other payload in order to acquire elevated privileges and move within the local network." The use of Metasploit instead of a custom malware strain isn't a new tactic. In the past few years, crooks have been slowly migrating from developing custom malware to using ready-made tools, such as Metasploit or Cobalt Strike [1, 2, 3]. "Essentially it makes attribution more difficult and they will use the minimum required effort to achieve their objectives," Doman told Bleeping Computer. < Here >
  22. A China-linked cyber espionage group has breached the systems of satellite operators, telecommunications companies and defense contractors in the United States and Southeast Asia, Symantec reported on Tuesday. Symantec has been tracking the threat actor, which it has named “Thrip,” since 2013. However, the security firm says the group’s activities have not been made public until now. Thrip has used a combination of custom malware and legitimate tools in its attacks. One victim was a satellite communications operator, where the hackers targeted devices involved in operations, as well as systems running software designed for monitoring and controlling satellites. “This suggests to us that Thrip’s motives go beyond spying and may also include disruption,” Symantec researchers said. Thrip has also targeted a company specializing in geospatial imaging and mapping. The attackers attempted to gain access to machines hosting MapXtreme GIS, Google Earth Server and Garmin imaging software. The list of victims identified by Symantec also includes three telecoms firms in Southeast Asia. The companies themselves appear to have been Thrip’s targets rather than their customers. Another victim is a defense contractor, but no details have been shared by the security firm on this attack. Symantec has been monitoring Thrip since 2013, when it spotted a campaign conducted from systems located in China. The group initially relied mostly on custom malware, but more recent campaigns, which started last year, also involved legitimate tools. The pieces of malware used by the group include Trojan.Rikamanu, a trojan designed for stealing credentials and other information from compromised systems, and Infostealer.Catchamas, an evolution of Rikamanu that includes improved data theft and anti-detection capabilities. Thrip has also been spotted using Trojan.Mycicil, a keylogger offered on Chinese underground marketplaces but which has not been seen often, and Backdoor.Spedear and Trojan.Syndicasec, both of which have been observed in the group’s older campaigns. As for the legitimate tools used by the cyberspies, the list includes the Windows SysInternals utility PSExec, PowerShell, the post-exploitation tool Mimikatz, the open source FTP client WinSCP, and the LogMeIn remote access software. “This is likely espionage,” said Greg Clark, CEO of Symantec. “The Thrip group has been working since 2013 and their latest campaign uses standard operating system tools, so targeted organizations won’t notice their presence. They operate very quietly, blending in to networks, and are only discovered using artificial intelligence that can identify and flag their movements. Alarmingly, the group seems keenly interested in telecom, satellite operators, and defense companies. We stand ready to work with appropriate authorities to address this serious threat.” < Here >
  23. vissha

    simplewall 2.3.0 Stable

    Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer. This tool is presented within a simple interface enabling fast configuration and includes internal blocking lists (malware, telemetry). simplewall (WFP Tool) can be considered as an alternative to the default filters provided by Windows Firewall. It will enable you to effectively regulate which of your processes or apps require internet access restriction or not. simplewall (WFP Tool) is designed to make your life easy by automatically blocking malware and telemetry-related data but can also be used with custom rules for blocking particular ports or IP addresses if desired. Features Simple interface without annoying pop ups Dropped packets logging (Windows 7 and above) Internal blocking lists (malware, telemetry) Free and open source Localization support IPv4/IPv6 support Changelog: v2.3.0 (19 Juny 2018) Maintenance release. added allowed connections monitoring in dropped packets log (win8+) added inbound multicast and broadcast connections logging (win8+) added outbound redirection filter layer (win7+) added separation for remote/local address/port in rules editor added hotkeys for import/export profile added win10 rs5 support prevent memory overflow for singly linked lists (win7+) (issue #193) do not load icons for processes if icons displaying are disabled improved multiple rules applying speed in settings window increased time limit for displaying same notification (win7+) search loading dlls in system directories only (safety) check for correct xml data type before loading store last notification timestamp for apps removed proxy support (win8+) fixed dropped events callback crash (win7+) fixed applying services filters fixed alphanumeric sorting improved port scanning defense improved loopback connections improved boot-time filters stability improvements cleanup xml atributes updated system rules cosmetics fixes fixed ui bugs fixed bugs Homepage: https://www.henrypp.org/product/simplewall Downloads - v2.3.0 stable: Installer: https://github.com/henrypp/simplewall/releases/download/v.2.3/simplewall-2.3-setup.exe Portable: https://github.com/henrypp/simplewall/releases/download/v.2.3/simplewall-2.3-bin.zip
  24. It used to be that cameras never lie. We tend to privilege visual content, trust what we see, and rely on police cams, mobile recording tools and similar devices to tell us about what is really happening on the streets, in local businesses, and more. Take, for example, a viral video that shows a white woman calling the police as black men in Oakland attempt to barbecue. Millions are laughing, and the woman’s image is being used as a meme across the Internet. When a video of a patron threatening café employees for not speaking English went viral, the subject, a New York attorney Aaron Schlossberg, was identified on social media within hours. His office information was shared quickly, comments on review pages and public shaming ensued. The racist lawyer ended up with the attention of mariachis playing music outside of his apartment. In both these cases, the videos were real, the memes entertaining, and the Twitter storm was deserved. After all, mobile videos and other cams provide transformative new avenues for justice, precisely because they can spread like fire around the world. But this kind of ‘justice’ landscape only works as long as we can trust the videos we see—and faked videos are on the horizon. Often called “deepfakes,” a term coined by a Reddit user for videos that swap porn star faces for those of famous people, fake videos are quickly becoming more prevalent. With a kind of Photoshop for video, artificial intelligence affords just about anyone the tools to generate fake visual content. Using a tool like FakeApp (an app that uses deep learning to make face-swap videos), pretty much anyone can gather images and make a video without a lot of computational skill. Very swiftly we have moved from the crude superimposing of faces in movies and video games, to sophisticated AI tools that give the average citizen means for doctoring visual content, and limited help in discerning this doctored material. In a world of fake news, anyone can write a story that seems reliable; soon generating fake videos will become as commonplace. More and more, these videos will provide easy means for harassing individual citizens, influencing public officials, or threatening peers in schools. We can easily imagine a world of revenge porn, cyberbullying, and other kinds of public harassment of average citizens – maybe even children. Most consumers will be able to recognize the subtle cues of inauthenticity, only if they watch very carefully. But as we’ve learned from the rise of fake news, often people don’t consume information carefully. In a world where police cams, public surveillance videos, or even mobile recordings are used in highly-consequential scenarios, like court hearings, and when social media-based persuasion tactics are influencing elections around the globe, assuming people will ‘watch carefully’ is akin to assuming people will read online content critically. These technologies will become increasingly sophisticated over a very short period of time, making it more and more difficult for average consumers to be able to recognize deceptive tactics. Reddit banned deepfakes. But there will be other deepfakes. While consumers of information must be vigilant and remain critical when taking in public messages today, tech leaders must develop sophisticated but easy-to-use tools for average message consumers to be able to see doctored content. Blockchain may work, but we’d better move quickly. The safety of ourselves and our democracy depends on it. < Here >
×