CERTStation Threat Management Advisory
Date: 01.27.17
TMA Archive News
Security Sparklines
  • trojans trojans
  • unix unix
  • opera opera
  • safari safari
  • internet explorer internet explorer
Sparklines show the number of articles that referenced a given topic everyday over the last 12 weeks
Tips of the week
When someone turns up at your doorstep, you know who they are by looking at their faces or asking for some identification. Do the same when receiving e-mails to ensure the senders’ are who they say they are—not some scammers trying to enter your homes. It’s not enough to look at the sender’s name, also check their e-mail address and see if the message inside is typical of them. If the email is offering a deal that is too good to be true, then it probably is. Think of what you would do to that dodgy salesman in front of your door: keep the door shut.
Would you use a single key to secure the doors, windows and safe at home? Bet the answer is ‘No’. This is why you don’t use the same password for all your digital accounts too. Once a hacker gains access to one account, they would have the keys to everything else.
Just as you would never use a faulty lock to secure your home, the same applies in the digital world too. This means regularly updating your software and applications to ensure the latest security flaws are addressed, preventing any known and obvious ways for hackers to enter your digital devices. If you have highly valuable documents to secure, you may also consider investing in anti-virus software to prevent intrusions—the equivalent of buying a surveillance camera system to give your home an extra layer of security.
Metrics

Last Week Total Records
  • Viruses
  • Worms
  • Trojans
  • Vulnerabilities
  • 11
  • 0
  • 2
  • 69
  • Viruses
  • Worms
  • Trojans
  • Vulnerabilities
  • 1068
  • 1796
  • 5554
  • 39267
Jan
27
Antivirus is harmful and everyone should uninstall it, so says recently liberated ex-Mozilla developer Robert O'Callahan.
Jan
27
Facebook has been offering the two factor authentication login option for a while now, and is now trying to make its use easier than ever before.
Jan
27
Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, issued in conjunction with analyst firm 451 Research.
Jan
27
Google this week released Chrome 56 in the stable channel, patching no less than 51 vulnerabilities in the popular browser.
Jan
27
Hong Kong's securities regulator said brokers in the city had suffered cyber attacks and warned of possible further incidents across the industry.
Jan
27
The LeakedSource site, known for aggregating data breach information, has gone offline. There is no official information regarding the reasons why this happened, aside from rumors that a police raid was involved.
Jan
27
The controversial data breach notification service LeakedSource has been down for nearly 24 hours and it is rumored that the website has gone offline following a law enforcement raid.
Jan
26
Tired of conventional passwords? So is Nuance Communications, a tech firm that is promoting the human voice as a way to secure user accounts.
Jan
26
At least 15 Saudi government offices and private companies have been hit by another wave of attacks from Shamoon 2 malware that leaves hard drives completely erased.
Jan
26
Starting Feb. 13, Google will no longer allow JavaScript attachments on its Gmail service, killing one of the main methods of malware distribution over the past two years.
Subscribe to Cyber Security Dashboard