Alert: Evernote site hacked – passwords stolen

Over the past few days the Evernote web site was hacked and user data was taken. This data consisted of user names, encrypted passwords, email addresses. At this time they do not believe any customer data has been compromised. If you use the Evernote service you will need to reset your passwords online and on any iOS or Android devices that connect to the service. There are full reset instructions posted in your account on the service. Log into your account and follow the directions to reset your main account first then update your devices with the new information. Read more

ComboFix Anti-malware software compromised

January 30, 2013 by · 1 Comment
Filed under: Computer Security 

BleepingComputer.com has reported that the ComboFix distribution that was being hosted on their site was found to contain a file infected with the Sality virus. The compromised version was found yesterday and traced to the download package updated at 2am on Jan 29th. Other sites have mirrored the infected files so if you have downloaded and used ComboFix within the past 24hours then your system may be infected with Sality. If you already had your copy of ComboFix prior to yesterdays update then your files are clean and you can continue to use it without worrying. Most Anti-Virus program programs will catch Sality because it is fairly old. But keep in mind not all users keep antivirus programs up to date and if you are needing to run ComboFix then chances are that the system is already compromised by some virus and the anti-virus program may already be disabled. Read more

Cisco has confirmed vulnerablilty in Cisco AnyConnect secure mobility client, patch released

June 21, 2012 by · Leave a Comment
Filed under: Computer news, Computer Security 

Late Wednesday Cisco released software updates for several versions of the Cisco AnyConnect line of VPN products, also covered under a second notice is the Cisco Application Control Engine appliance. A compromised system could allow an intruder to load malicious software on the system or access network resources that should be secure. The exploits are based on Active-X and Java code that can be embedded in web content. Read more

How to make a Microsoft Defender Offline USB drive

Everybody gets infected with spyware and malware from time to time if you use the internet. In this article we will show you how to make a bootable USB drive with Microsoft Defender Offline software that you can boot from and scan your PC to remove root kits and malware that are almost impossible to remove from within Windows. Read more

Next Page »