How the Carbanak cybergang stole $1 Billion Dollars from 100 financial institutions worldwide. Report from Kasperksy Lab Cybersecurity Experts

Click on this line to visit Uniquely Toronto, to view our post discussing the Kaspersky Lab just released report (Feb 16 2015) about How the Carbank cybergang stole $1 Billion Dollars from 100 Financial Institutions around the globe. Our post also includes a video from Kaspersky Lab explaining how the Hack was exploited.

We are prevented from making duplicate posts on our sites.
 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

Kaspersky Lab Security Analyst Summit starts today in Cancun Mexico. “We are here to save the world” is the Summit’s modest motto


Kaspersky Lab, IMHO produces Top Rated Security Software. Their Cybersecurity Experts are often called upon to investigate major Security Breaches in Hacker Attacks.

Every Year Kaspersky Lab hold it’s Security Analyst Summit. It is a by invitation event, where many of the world’s Top Cybersecurity Experts meet over three days. This year’s Summit is being held in Cancun Mexico.

If you are not known to Kaspersky’s Security Experts, then you will not have gotten an invite. That is why I am here in Toronto with the Extreme Cold Temperature of “Minus” 20 degrees Celcius, while the temperature in Cancun is 23 (will rise to 26 in the afternoon) degrees Celcius. Yes, life at times in rather unfair….

Anyhow the Security Analysts Summit starts in about one hour (on Feb 16 2015). From the official web page:


Follow SAS 2015 on Twitter with the hashtag #TheSAS2015. We’ll also be live tweeting many of the talks during SAS.


Follow @kaspersky and @threatpost now!”


Some of the speakers who will make presentations at this year’s 2015 Security Analysts Summit are:


Dan Kaminsky – formerly with Cisco Systems and Avaya. He is a Co-founder and Chief Scientist with White Ops.


Christofer Hoff – he is the Vice President and Security CTO of the Security, Switching & Solutions Business Unit (S3BU) at Juniper Networks.


Staffan Truvé – formererly he was the the CEO of SICS, the Swedish Institute of Computer Science. He is a Co-founder and CTO of Recorded Future.


Katie Moussouris former senior security strategist lead at Microsoft. She is now the Chief Policy Officer for HackerOne.


Stefan Tanase – he is the Senior Security Researcher, with Kaspersky Lab.

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

Banks around the globe infiltrated by Hackers via Malware. Millions supposedly stolen


Sorry but Google prevents me from posting duplicate material on more than one of our sites.


I just posted to our Uniquely Toronto, about major news regarding Hackers infiltrating banks around the globe and supposedly stealing millions of Dollars. Plse click on this line to visit that post on our Uniquely Toronto site.

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

How we take back the Internet. Edward Snowden interview at TED2014 about surveillance and Internet freedom


During the TED 2014 conference, Edward Snowden was remotely interviewed. He details why your Privacy and your Rights Matter.

TED Talks present Leading Thinkers who share their insights.

During this interview Edward Snowden discusses surveillance by government agencies and Internet Freedom.

Video is courtesy of the TED YouTube channel


Click on this line to visit the TED Talks website and access many other TED Talks videos.

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

How to check if your Computer Security Software is working


It started the other day when someone told me that they were informed by a Computer Science instructor that Microsoft’s Windows Defender was the best security package for MS Windows 8.1.

I knew that was not to be true and I can easily prove it. Rather surprising that someone teaching a University level course would put their student’s computers at risk. Sure Windows Defender is better than nothing, but far better computer security software is readily available.


Kaspersky Labs Internet Security and Avira Antivirus Pro both provide top of class security protection. I’ll create another post, in the future, providing more details.


So you have some security software installed. How do you test it?


That is where the Anti-Malware Testing Standards Organization comes into play. I bet that you have never heard of AMTSO.


The AMTSO about page defines it’s mission:

“Members of the Anti-Malware Testing Standards Organization (AMTSO) have published guidelines that, for the first time, set recognized standards for testing security software. The standards have been developed and agreed to by more than 40 security experts, product testers and members of the media from around the world. The creation and publication of these standards is a critical first step in fulfilling AMTSO‘s mission to improve the testing of anti-malware products!to  visit the test page to “

Along with educational material and a forum, the AMTSO site also has links to a AMTSO Standards based web based Testing site,where you can safely test the security software running on your computer. A side bonus are tests for Android based Tablets and Smartphones.


Click on this line to Check your Protection against Downloading of Malware.


Click on this line to Check your Protection Against Drive By Download.


Both of the above tests use a test file created by the European Expert Group for IT Security. Click on this line to visit the EICAR website for more details about their Anti-Malware Test file.


Click on this line to Check your protection against Potentially Unwanted Programs.


Click on this line to Check your protection against a Phishing Page.


Click on this line to Check if your Anti-Malware Cloud Lookups Protection is configured correctly.


Click on this line to visit the Android based Device Security Checks page.

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.

Neil Daswani Seminar detailing Cyber Security Breaches and how to defend against today’s most significant Data Security Vulnerabilities

lVideo is courtesy of the Google Tech Talks YouTube channel


Neil Daswani, cofounded the Stanford Center Professional Development (SCPD) Security Certification Program, details how Cyber Security Breaches happen.


The discussion includes info about Attack Scenarios such as how cross-site request forgery which can be used to steal money from victim Bank Accounts. Also discussed are cross-site script inclusion and SQL Injection Attacks. How the bad guys leverage such techniques to fool victims is detailed.


Along with outlines of Security Vulnerabilities, Neil Daswani also discusses Prevention Techniques such as using Web Application Firewalls. There are ways to stop or counter many Attack Scenarios.


You might also be interested in a book co-authored by Neil Daswani. Click on the following link to visit Amazon  to learn more about:

Foundations of Security: What Every Programmer Needs to Know (Expert’s Voice) by Christoph Kern, Anita Kesavan and Neil Daswani (Feb 15, 2007)

2014 had been a record years for Cyber Attacks and Data Breaches at major retail firms. I’m preparing a future post about that.

 

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice

Just posted on Unique f-Stop about the new Toshiba SDHC Memory Cards which have NFC (Near Field Communications) built-in

Click on this line to read our post about the upcoming Toshiba SDHC memory cards which have NFC (Near Field Communications) built-in.

Sorry for only providing the link above, but we are not permitted by Google to have duplicate posts on both sites.

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice. Any offers mentioned in this post are also subject to change without notice.

A Cooling Pad could extend the life of your Laptop

So what is a Laptop Cooling pad?

It is usually a plastic pad which contains one or more fans. Your laptop sits on top of the Laptop Cooling Pad. The Cooling Pad fans are most often powered by the laptop via a USB port, although some come with their own AC Power adapter.

Click on this line to view photos of all sorts of Laptop Cooling Pads, thanks to Google.

The better Cooling Pads will include a speed control, which can increase the RPM (speed) of the fans.

I prefer Cooling Pads which have at least two fans.

Why?

If one fan fails then you still have cooling from the other fan(s). By having two (or more) fans, the Cooling Pad can offer great cooling when both fans are running at a lower RPM (speed). The fans are quiet, but running at a lower RPM they are even closer to being silent.

Video is courtesy of the Hardware Canucks YouTubce Channel

You should pick a Cooling Pad to fit the size of laptop. If your laptop features a 17.3 inch screen, then you need a cooling pad that is larger and not say one designed for a 14 inch Ultrabook.

For my ASUS I7 Gaming Laptop, I purchased a Cooler Master CM Storm model SF-19. It has cooled my ASUS Gaming laptop for a few years. It’s big and has Lamborghini Aventador styling, which matches well with the styling of the 2nd gen ASUS I7 17.3 inch Gaming Laptop.

I use my ASUS laptop to emulate a rack of Cisco Routers. Without the cooling pad the ASUS runs “hot”, even with its two massive cooling vents pumping out lots of heat.

Heat is something which I believe is not a good thing where computer hardware is concerned. IMHO, the cooler that the equipment can run, then the longer it should perform trouble free.

Video is courtesy of the sinectocl YouTube channel

 

Posted by: Vincent Banial

Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.