2) Set Web browsers to “stun”

Cyber criminals know that Web browsers are like mothers: everybody’s got one. They also know that if you’re shopping online, you’re using your Web browser to do it. That’s why
Web based attacks are one of the most popular kind avenue of compromise and
online. The good news is that most modern Web browsers already come equipped
with security features that can block most malicious content. The bad news? Lots of folks out there are running the browser
equivalent of a 1976 Chevy Nova.

1) Beware of what you search for

Cyber criminals
realized long ago that people trust search engines like Google, Yahoo and Bing even after those sites and their results lists have been shown to be easy targets for scams. Attacks
that use search engine optimized (SEO) Web sites to spread malware are a growing
problem.

Set your Web browsers to “stun”…it’s the online holiday shopping season. Here are ten tips for surviving it without getting yourself p4wn3d

Cyber Monday is billed as the biggest online shopping day of
the year, with deep discounts from online merchants. But the truth is
that your online shopping isn’t anywhere near done now that its passed, any more than your in store shopping is done now that the 3:00 AM Black Friday door buster stampede has rumbled by. Of course,
cyber criminals and scam artists know this.


There’s a new version of the venerable GpCode ransomware attack making the rounds right now, demanding payments of $120 in order to decrypt files on infected PCs. This version, which has been active for several days now, is different from previous variants in that it overwrites the original files, preventing recovery of the data.

By Alex HuttonRecently, I’ve heard some bits and pieces about how Information
Security (InfoSec) can be “threat-centric” or “vulnerability-centric”.
 This stuck me funny for a number of reasons, mainly  it showed a basic
bias towards what InfoSec *is*. And to me, InfoSec is too complex to be
described as “threat-centric” or “vulnerability-centric” and yet still
simple enough to be described at a high level in a few paragraphs in a
blog post. So I thought I’d write a “primer” post on what InfoSec is to
create a reference point.

The Web site of Wikileaks was moving quickly to stay out of the way of large scale denial of service attacks on Sunday and Monday, following the release of a trove of sensitive U.S. diplomatic cables. The controversial site, which has spent months trying to find a home secure from government seizure, now appears to be hosted on servers that are part of U.S. firm Amazon.com’s giant hosted Web Services infrastructure based in Seattle, Washington.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.