New PCI Data Security Standards

Version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) goes into effect on January 1, 2014. That is only 45 days from today. The PCI SSC published the 3.0 standards in their document library on Thursday. The changes are suppose to allow for more flexibility, with an increased focus…

SAP The Target Of New Malware

There is a new Trojan discovered by Doctor Web, a Russian antivirus company, in the last few weeks that is searching for computers containing SAP client applications. For now this is the Trojan’s only activity. This type of action would indicate the criminals are amassing a network for a future attack. SAP makes software for Enterprise Resource…

Google Improves Chrome Security

Google has been paying attention to its forums, which has been riddled with reports of Chrome falling victim to browser hijacking malware. Google responded with two new browser features. The first is a “reset browser settings” button. Under the “Advanced Settings” section you will find this button which will set your browser back to its…

China’s NQ Mobile Inc. A Threat

The investment research firm Muddy Waters LLC released a report on their investigation of the Chinese mobile security company NQ Mobile Inc., an NYSE traded company (NQ), charging they are a “massive fraud.” The report alleges 72% of their 2012 revenues is fictitious. That NQ’s market share is 1.5%, not the 55% they claim. Muddy Waters…

php.net Blacklisted By Google

Mozilla Firefox and Google Chrome issue a warning that PHP.net is riddled with malware thanks to Google’s safe browsing API.  Google’s security blacklist service has tagged the site as malicous. PHP.net is the home for information, education and releases related to the popular scripting language. PHP is a scripting language that runs on the server…

Sophos Crowns USA Spampion

Sophos’ quarterly “Dirty Dozen” spam report released on Thursday puts the United States as the number one source for spam in the third quarter of 2013. This list ranks spam senders, not spammers.What is the distinction you ask? To know that you need to understand how spam is sent. Spammers don’t sed their own spam.…

Android Apps Violate Child Privacy Laws

The Children’s Online Privacy Protection Act protects personal information about children from being accessed or shared without parental consent. Specifically protected by COPPA is geo-location data, browsing history, photos, video and audio files of children under 13. However, Android apps are unnecessarily monitoring the location of children. Developers and companies admit there are many applications…

Make Your Bluetooth Safe

For a criminal to break into a Bluetooth device, they must force two paired Bluetooth devices to break their connection, known as Blueballing. For instance the connection between a cellular phone and a Bluetooth enabled headset could be broken allowing the cell phone to be hijacked. One method used to send unwanted files is Bluejacking.…

Use Firewalls

Do not operate computers without using firewalls. A firewall protects a computer, or network, through a series of access control policies separating that computer, or network, from other computers, or networks. There are two types of firewalls: Software firewall – software running on an individual computer Hardware firewall – a dedicated device designed to protect…

Get Antivirus Software

Get antivirus software. Having software to protect your computer against malicious code is a must. There are a lot of antivirus software products on the market. Each company takes a different approach with different methods and implementations of combatting threats. One thing they all do is search the files on your computer by comparing those…