tips

Microsoft Database Leaks Unknown Number of Source Codes

Database Breached – Leaving Microsoft Source Codes Exposed Microsoft recently confirmed an unknown number of source codes were leaked onto a repository named BetaArchive.  Exposing the source codes would allow hackers to find vulnerabilities in some of Microsoft’s most trusted pieces of its operating system.  Gizmodo reports, “The Register claimed the data dump was 32 […]

Microsoft Database Leaks Unknown Number of Source Codes Read More »

Computer Virus Software

Retail Store – The Buckle – Falls Victim to Hackers

Hackers Breach the Buckle Stealing Payment Data for Approximately Six Months The national retail store, The Buckle, recently disclosed they were the victims of a security breach.  The store’s point-of-sales (PoS) systems were compromised with malware, leaving consumer payment data up for grabs.  It is unknown how many credit and debit cards were impacted by

Retail Store – The Buckle – Falls Victim to Hackers Read More »

Girl Scouts Aim to Level the Playing Field in Cyber Security

Girl Scouts Offer 18 New Cyber Security Badges Reports suggest only 11% of positions in the global cyber security workforce are held by females.  Therefore, the Girl Scouts are doing their part to level the playing field.  The organization is taking steps to peak young girls’ interests in cyber security, beginning as early as age

Girl Scouts Aim to Level the Playing Field in Cyber Security Read More »

Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection

Blacklist or Whitelist?  Which Keeps Your Data Safer? Most of the security products on the market rely on a blacklist approach to detect and prevent malware.  But is it effective?  An alternative approach, application whitelisting, is also available.  However, which is better for you?  Follow the infographic below to learn more about the difference between

Infographic: Blacklist Vs. Whitelist with Fileless Malware Detection Read More »

Is Microsoft Ruining Software Companies Lives?

Does Kaspersky Have a Point? Last week an article was written regarding Kaspersky filing an antitrust complaint to the European Union, targeting Microsoft.  Kaspersky claimed Microsoft has put up various road blocks for third-party anti-virus (AV) companies, making it impossible to stay on a level playing field. The article published last week generated a large

Is Microsoft Ruining Software Companies Lives? Read More »

Fileless Malware Spreads Overseas Without a Single Click

Recent Fileless Malware Attack Runs Rampant A recent fileless malware campaign came to light over the weekend, which infected computers in various locations.  According to Engadget, the malware campaign targeted businesses in Europe, the Middle East, and Africa.  The malware was distributed via a malicious email with a hyperlink to an “invoice” or “order number”.

Fileless Malware Spreads Overseas Without a Single Click Read More »

Zero-Day Attacks: What They Are & How to Stay Protected

What’s a Zero Day Attack? One of PC Pitstop’s contributors, Leo Notenboom from Ask Leo!, recently wrote a post on what a zero-day attack is.  Leo went into great detail explaining this exploitation methodology.  The short version is, a zero-day attack occurs when cyber criminals exploit a software vulnerability that is not publicly known.  The term zero-day comes

Zero-Day Attacks: What They Are & How to Stay Protected Read More »