General

Colorful spams are back!

Yeeesss, the Spam/Trash folder is no longer so boring! Finally, the spammers are now using all the features of the email clients and have made the subjects to look much nicer. Do you know how they do that? They add UTF8 characters in the subject and then they encode the entire string using Quoted-Printable encoding: Content-Type: text/html; charset=”utf-8″ Content-Transfer-Encoding: quoted-printable Subject: =?utf-8?q?=F0=9F=91=B6_Free_Trial_of_Diapers_from_The_Honest_Company_?= =?utf-8?b?8J+Rtg==?= This is the output:   Another example: Content-Type: text/html; charset=”utf-8″ Content-Transfer-Encoding: quoted-printable Subject: =?utf-8?b?8J+YqCBXaWZlIFdhbGtlZCBJbiAtIE9PUHMhISEhISDwn5io?=

Read More

How to get rid of disturbing and traumatizing “children” films on YouTube

If you have children, then you must allow them from time to time to watch some children films on Youtube. They must have missed some episodes of their favorite series and you definitely can find them there. In any language you want. Just search for “Caillou”, “Barbie”, “Batman” , “Elsa” , “Spiderman” or anything alike and you will get something. There is a huge market for “children’s” YouTube content. But, what happens when the results are not for children?   How do you filter them? You can’t… So, what do you do ? You ban them from using the tablet…


Google Search Console fail over notifications for the WordPress updates

I have quite a lot of WordPress based websites which I run and maintain. One of these is this blog: www.SorinMustaca.com All my WordPress websites are configured to autoupdate to the latest WordPress update. The same applies to their plugins and themes. Google Search Console (GSC) is a tool I used to manage better the registration of my websites with the search engine and their advertising platform Adsense. Yesterday evening I received a couple of emails, one for each of my websites registered with the GSC : Here is the text: Recommended WordPress update available for http://sorinmustaca.com/ To: Webmaster of…


Romanians Abroad: Sorin Mustaca on www.TheGoldenRomania.com

Sorin Mustaca in Entrepreneur IT Professional RO – Constanta GER – Tettnang Sorin is one of the many IT professionals Romania has produced in recent years. He is unique however since he had the courage to partially differentiate from his employer and start his own business somewhere in Germany. He realized his vast expertise can help any company learn about the importance of IT security and in the same time can offer a better future for his two children in one of the healthiest environment in the world.   Read more here: http://thegoldenromania.com/Romanians-Abroad?post=sorin-mustaca


Why most, if not all, “New Generation” endpoint security product are not self-sustained?

Fire Eye, Sentinel One, Crowdstrike, HackerOne, Cylance, Cyphort, Trustlook, Venafi, Clavister, Invincea,  Code42,  just to name a few,  are so called NG Cybersecurity startups. NG comes from “New Generation” or “Next Generation”… (Yeah, just like in StarTrek. 🙂 )   What exactly are these “NG” products and services? There is no single definition that fits them all. Here are the common features: All of them have a cloud backend. Some install an agent on each machine, some install an appliance that acts as a sniffer in the network. Some others must be installed on the default gateway where they take…


Scary to see details of the World’s Biggest Data Breaches

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/   No worries, the chart is very interactive and you can select what you want to see by changing the filter: The problem is that if you select like the screenshot below, you will not see anything anymore. This is scary!   Statistics? Actually, the data is scary: it seems that at any point in time there was a breach.     Here is the source of the data: https://docs.google.com/spreadsheet/ccc?key=0AmenB57kGPGKdHh6eGpTR2lPQl9NZmo3RlVzQ1N2Ymc&single=true&gid=2&range=A1%3AW400    



IT Security News has its own Android App

I have finally found the time to make the app I always wanted to have for the “IT Security News” service.   Here is the page on Google’s Play Store: And the screenshots of the app:       Right now it is available only on Android devices, soon it will be available in the Apple’s Appstore.   Help me spread the word about it so that I can have some downloads 😉 Thanks.


Network Access Control and IoT Security

Network Access Control,  is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy: anti-virus protection level, system update level configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues and nothing else. Once the policy is met (it has an antivirus, it…


Do you actually need a security product in your car? Part 3 : Intrusion Prevention and Detection Systems

I ended part 2 with the promise that we will discuss about : 2) Intrusion detection and prevention systems (IDS/IPS or IDPS) From Wikipedia: Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. Intrusion prevention systems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are,…


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close