So easy… http://www.google.com/security/
- Passwords
- Gmail settings
- Security tools
- Malware
- Phishing
- Secure sites
- Safe networks
- Mobile security
- Family safety
- Shopping safety
Sorin Mustaca on Cybersecurity
Thoughts on Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC
So easy… http://www.google.com/security/
My entire automatic posting on ITSecurityNews.info which is retweeted on @ITSecurityNews, @SorinMustaca and @sorinm_security is built on IFTTT.com. Well, this is why you didn’t get some tweets on time: Last night at approximately 10:00pm PST much of the work IFTTT does in the background stopped due to an issue with one of our backend services. Our monitoring […]
“Developing critical software under pressure has only one consequence — even more bugs,” said Avira data security expert Sorin Mustaca. “I expect to soon see even more bugs and vulnerabilities related to this quick fix.” http://www.linuxinsider.com/story/77079.html http://www.technewsworld.com/story/77079.html http://www.torontotelegraph.com/index.php/sid/211938962/scat/ebc9d7769bc0759e http://www.ecommercetimes.com/story/security/77079.html http://www.macworld.com/article/2025137/security-agency-recommends-disabling-java-due-to-exploit.html http://www.csoonline.com/article/726380/us-cert-disable-java-in-browsers-because-of-exploit http://www.cio.com/article/726307/US_CERT_Disable_Java_in_browsers_because_of_exploit http://www.computerworld.com/s/article/9235615/US_CERT_Disable_Java_in_browsers_because_of_exploit http://www.businesswire.com/news/home/20130114005440/en/Avira-Security-Software-Detects-Java-7-Exploits http://www.latinospost.com/articles/9642/20130115/java-flaw-patch-now-available-download-experts.htm OMG.. my blog posts start to sound […]
Do you think that the cyberattacks have increased these last months/years? The cyberattacks have definitely increased in the last years, but not only that. The attacks have become more like a business. It is possible now to purchase a cyberattack against an organization (the entire network), against websites and social media accounts. The cybercriminals […]