Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Lunarsoft Related
    • Announcements
    • Lunarsoft Discussion & Issues
    • Backpage News
  • Lunar Lounge
    • General Discussion
    • Gamer's Hangout
    • Media Hub
    • Introduce Yourself
  • Technical Discussion
    • Software
    • Hardware
    • Smart Home
    • Malware Prevention & Security
    • Malware Removal
  • Microsoft Product Support
    • Windows 10
    • Windows 8
    • Microsoft Office
  • Member Projects
    • Anti-Malware Toolkit
  • Archives
    • Read Only Archives

Calendars

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Website URL


Interests

Found 19 results

  1. Version 2 has been released! Changes: [New] https support added. [New] Support for modern security standards. [New] OS detection for Windows 8.1, 10. [New] Json support added. [New] Standardized menu icons added. [New] New menu items for faster access to common areas. [New] Settings now accessible through Edit menu. [New] About now accessible through Help menu. [New] Numerous optimizations of code. [New] User agent to identify Anti-Malware Toolkit. [New] Skipping partially downloaded file will delete the partial down
  2. Version 1.13.326 has been released. Changes: [Fixed] Resolved issue where XML list was not downloading properly. Download: Lunarsoft Link: Digg This!
  3. This update was just released yesterday. Numerous Asus routers are supported. This was a feature that was also found and slowly being implemented into Tomato. Now it's built into the Merlin firmware by default. The great thing about this is that it enhances and improves security overall, and it far more secure than DNS over HTTPS. I strongly recommend making use of this feature. Read more about it here: https://github.com/RMerl/asuswrt-merlin/wiki/DNS-Privacy Downloads: https://asuswrt.lostrealm.ca/download
  4. I recently came across a very interesting article talking about a new type of credit card being issued in France. The card's security code (three digits on the back) randomize, much like an authenticator does. Looks like it would be very useful and give a better sense of security to many.
  5. Software developers listen up: if you want people to pay attention to your security warnings on their computers or mobile devices, you need to make them pop up at better times. A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly—while people are typing, watching a video, uploading files, etc.—results in up to 90 percent of users disregarding them. Researchers found these times are less effective because of "dual task interference," a neural limitation where even simple tasks can't be simultaneously perfor
  6. Data thieves used a massive “botnet” against professional networking site LinkedIn and stole member’s personal information, a new lawsuit reveals. The Mountain View firm filed the federal suit this week in an attempt to uncover the perpetrators. “LinkedIn members populate their profiles with a wide range of information concerning their professional lives, including summaries (narratives about themselves), job histories, skills, interests, educational background, professional awards, photographs and other information,” said the company’s complaint, filed in Northern California U.S. Di
  7. In 2015, the two SySS employees Matthias Deeg and Gerhard Klostermeier started a research project about the security of modern wireless desktop sets using AES encryption, as there was no publicly available data concerning security issues in current wireless mice and keyboards. Thus, the two IT security consultants have been analyzing modern wireless desktop sets with AES encryption of the manufacturers Microsoft, Cherry, Logitech, Fujitsu, and Perixx for security vulnerabilities during the last couple of months. Up to now, several and partly critical security vulnerabilities have bee
  8. If you don’t already have iOS 9.3.3, you better download and install it — quick. Cisco Talos, a security and research group, recently discovered a bug in Mac and iPhones that allows hackers to steal passwords with a single text message. The researchers at Cisco Talos alerted Apple, and the tech company immediately worked on a patch, which was released this week. “This is very high severity issue,” Craig Wiliams, head of global outreach at Cisco Talos, told Fortune. “The fact that you have an exploit without any user interaction makes me very concerned.” Although the iOS update i
  9. Not two weeks ago, LinkedIn made big data breach news when hackers claimed to have more than 100 million usernames and passwords up for sale. Fortunately, the data wasn’t new, coming from a breach that happened four years ago. What was new was the size of the list that was up for sale, nearly 20 times the size of the 6.5 million passwords that were reported to have been stolen back in June 2012. The LinkedIn breach was made worse by the way the passwords were stored, using unsalted SHA-1 hashes. What that means is that although LinkedIn didn’t keep your actual password, it
  10. The on-going battle between Apple and the FBI has brought encryption and security to the fore once again. After remaining silent on the subject for some time, President Obama -- speaking at SXSW -- said that he was opposed the idea of encryption mechanism that are so strong it prevents governmental access. "If technologically it is possible to make an impenetrable device or system where the encryption is so strong that there is no key, there's no door at all, then how do we apprehend the child pornographer, how do we solve or disrupt a terrorist plot?" he wondered aloud, his almost rh
  11. Avast Software has released the fourth update to its Avast 2014 range of products with the unveiling of build number 9.0.2021 for Avast Free Antivirus 2014, Avast Internet Security 2014 and Avast Premier Security 2014. As with the previous few updates, R4 contains no new features, but does include several important security enhancements among other tweaks and optimizations that once again make it essential for existing users. Avast promises tighter security through improved process security, which is guarded by Avast’s self-defense component. Avast R4 also handles conditions for the Gue
  12. Bromium has just published the results of “Endpoint Protection: Attitudes and Opinions,†a survey of more than 300 information security professionals, focused on end user threats and security. The majority of the respondents believe: Existing security solutions are unable to stop endpoint infections, Anti-virus is unable to stop advanced targeted attacks and End users are their biggest security headache. View the full article
  13. California-based password management software specialist SplashData has released the results of its annual list of the internet’s worst passwords. For the first time "password" has been knocked off the number one slot. This doesn’t mean people are getting more security minded, however, as it's been replaced by the equally obvious "123456". SplashData compiles the list from files containing stolen passwords posted online during the previous year. This year's list is heavily influenced by the large number of Adobe user passwords posted online following the company's 2013 security bre
  14. Canonical, the maker of Ubuntu, has been fending off criticism from privacy advocates because the desktop search tool in recent versions of the operating system also searches the Internet. That means if you're searching your desktop for a file or application, you might also see results from Amazon or other websites. One person who dislikes Canonical's search tool is Micah Lee, a technologist at the Electronic Frontier Foundation who maintains the HTTPS Everywhere project and is CTO of the Freedom of the Press Foundation. Lee set up a website called "Fix Ubuntu," which provides instructions
  15. Today, TeamViewer announces a new beta version of its popular remote control software for Windows, Mac and Linux PCs. The latest release, named TeamViewer 9 Beta, introduces new features aimed at businesses, developers and end-users as well as security improvements. The most noteworthy security addition in TeamViewer 9 Beta is two-factor authentication. It allows users to add an extra layer of protection to their accounts by using security codes, that can be sent to their mobile devices and, alternatively, generated by dedicated mobile apps. On Macs, TeamViewer 9 also adds the option to in
  16. Facebook has been accused of deceiving developers after it emerged that the social networking site did nothing to verify the security of applications it was paid tens of thousands of dollars to review, and which it assured users had been checked. It is believed Facebook was paid up to $95,000 (£60,600) by developers whose applications were entered into its verified apps scheme. The system gave a green tick of approval to apps that passed what Facebook described as its "test for trustworthy user experiences". An investigation by the US Federal Trade Commission (FTC) revealed that Face
  17. Chances are it's not, or at least could be stronger, more secure. Now that you've created a password nearly impossible to break (and remember), thought about storage, encryption - a passphrase? A topic of this nature can be boring so I'll get to the point - if you need help with creating stronger passwords, or maybe you've considered a passphrase but didn't have the energy to think up anything too clever, here's 2 free tools that may be useful in the creation and storage of passwords & passphrases. PWGen for Windows KeyPass Password Safe Note: A password for a bank or school is mo
  18. I'm the administrator on my compuetr. I had a virus on my laptop that Webroot removed. When I click on system restore, it says I don't have sifficient security privileges to run this tool. How can I get access to system restore?
  19. I'm looking for a 'component verifier' that works as follows. [1] Gets a list of all major *.exe and *.dll files that comprise the 'target' software device. [2] Verify the target (program, sub-system or product) on any Operating System. The 'verifier' needs to do the following (Using a Microsoft OS as an example). (A) Check each module (*.exe and/or *.dll file) of the target software device (product, sub-system, whatever) via 3 different hash functions (MD5, SHA1, etc). (B) Open a 'Device Descriptor' file that contains an XML formatted description of the target device to be veri
×
×
  • Create New...