Articles by Sorin Mustaca

How to browse the web really anonymously

I’ve seen a lot of articles on the web about how to browse the web while keeping your privacy. By that I mean, nobody knows who you are, what you are browsing, no history kept, no temporary files remaining on the machine. Most of the articles on the web are created to make advertising to some VPN products. What is the solution? I think that the only solution is to use Tor, more specifically, the Tor Browser. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody…


What do you do if your new flagship product sucks and you don’t want any bad reviews? (Updated)

I got convinced by some clever “reviews” to pre-order the “Amazon Fire HD-10 with Alexa”. The specs look extraordinary ! 25,65 cm (10,1 Zoll) 1080p Full HD-Display, 32 GB, with Special offers Now, what ca go wrong here ? Well, everything !!! The tablet has what it promises there… But there is a lot more to say about. This device is a piece of c*** … It is a cheap tablet, which you usually get on the very same site amazon.de for about 50€-100€.     And now the best of all: Amazon advertises the tablet as “better and more…


Set of online resources from AV-Comparatives.org

Here is a set of resources put together by AV-Comparatives.org : General guidelines in minimizing risks Online vulnerability starts with human vulnerability E-mail security Web navigation Safe online banking Safe online gaming Safe streaming Safe file… The post Set of online resources from AV-Comparatives.org appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”


How to block the Skype Ads

Since Microsoft took over Skype, only bad things are happening. Really, I hate Skype since they started to get their orders from Redmond. 🙁 Once of the nerving things are the ads. Yes, these:       Here is how to get rid of it: Open Control Panel, go to Network and Internet Options. If you’re in Win10, goto Settings -> Internet Options It looks like this: Then click on “Security” and select “Restricted Sites”: Then click on “Sites” and you will see this window popping up. Add there this URL: https://apps.skype.com/   Close the window and restart Skype.  …


Digital blackmailing

We are used to see ransomware encrypting files and requesting money (bitcoin) to decrypt them. I received now a new email on a corporate address, which is a black-e-mail … in digital form. I have to say, that the amount of thoughts expressed in the email is interesting. Somebody, with some basic knowledge and bad English knowledge has put some infos together. 🙂   Here is the plain text, so that it is easier to index: Hello. I do not want to judge anyone, but as a result of several occasions, we have point of contact from now. I do…


Dropbox phishing: someone is interested in your corporate files

I wrote before about the Target Malware. Now I can also write about Phishing. Here is one for Dropbox:     What is wrong with this email ? the contact me by extracting the user part in the email address (smustaca) The “Verify your email” goes directly to a phishing website. The text is rather unusual, as Dropbox will never send anything like this. Dropbox adds some personalized links at the end of the emails. Emails from Dropbox come from “Dropboxmail.com” and not from “dropbox.com”     Why would anyone phish Dropbox? In order to get your files!   Why…


Targeted Malware on the rise

  Ever wondered what a “spear phishing” is ? Or a “targeted malware” ? See below: It is an email targeted to a member of an organization, which is made to look as legitimate as possible. The difference between normal phishing and malware emails and a targeted one is that the contents of the emails are referring to locations or persons of the organization being targeted. In this case, Avira: as you can see below, there are apparent links to internal locations. Of course, they are all fake (like in phishing). In reality, they point to malicious documents and locations…


Experiment started: HTTPS for ITSecurityNews.info

The Internet is telling everyone to switch to HTTPS for various reasons: better security better SEO from the search engines (read: Google) others While I agree with most of the reasons, I think that it is not really necessary for a read-only news portal to have HTTPS. It is no secret transferred, no login, nothing… Just text and links. And Ads… 🙂 So, my hosting provider Strato is giving me a free SSL certificate. After a long thinking and testing, I activated it for ItSecurityNews.info. From now on, you’ll be redirected to the HTTPS://ItSecurityNews.info even if you just type ItSecurityNews.info…


Exclusive interview for IPSwitch: When Security Awareness Training Overwhelms Users, Can Technology Help?

A new article of Michael O’Dwyer got published in IPSwitch: When Security Awareness Training Overwhelms Users, Can Technology Help? I am happy to say that I was the only one interviewed, so this is actually an exclusive interview with me.   “I would say that humans are the biggest problem, because they are the weakest link. It is true and quite normal that humans make mistakes,” said Sorin Mustaca, CSSLP, Security+, Project+, an independent IT security consultant.   “Unfortunately, there are more and more security companies out there which have a bigger marketing department than R&D. They have no problem…


Security for free, update after 4 years

About 4 years ago, while I was working at Avira,  I wrote this article for (ISC)2’s blog. Security “for free”? I wrote back then about how to cover all attack vectors for malware. I also wrote about the hidden costs, which many people tend to ignore. These costs are not acquisition costs. They are even not easily visible. I concluded, that it is possible to achieve a decent degree of security without any acquisition costs. However, there are drawbacks and there are hidden maintenance costs. For those who are interested in having software that works for them and not the…


%d bloggers like this:

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close