Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
To make sure your sensitive files are completely gone, use a secure deletion tool. Simply deleting files doesn’t really remove them, and they can be recovered with special software. Secure deletion tools ensure your data is completely erased, so it can’t be accessed by anyone.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 20, 2024 21:20 (on 10/21/24) | 0 | QR Ready | 1 minute read
Only install necessary and reputable browser extensions. While they can enhance your browsing experience, they can also serve as potential vectors for malicious software. Regularly review your extensions and remove any that you don’t use to keep your browsing secure.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 17, 2024 19:26 (on 10/17/24) | 0 | QR Ready | 1 minute read
Cookies are small data files stored by websites for monitoring, advertising, and personalization. If attackers gain access to your session cookie, they can impersonate you and access your private data.
To mitigate cookie risks:
- Clear Cookies Regularly: Remove saved data to reduce unauthorized access.
- Use HTTPS: Ensure sites use "HTTPS" to encrypt your data.
- Enable Two-Factor Authentication (2FA): Add an extra layer of security.
- Monitor Account Activity: Keep an eye out for unusual access and act quickly if needed.
October 16, 2024 20:36 (on 10/17/24) | 0 | QR Ready | 1 minute read
Understand what information is collected about you and how it’s used. Familiarizing yourself with these details is like knowing the rules of a game before you play. This knowledge empowers you to make informed decisions about your privacy and effectively protect your personal data.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 16, 2024 20:20 (on 10/17/24) | 0 | QR Ready | 1 minute read
Hackers are trying to misuse the open-source EDRSilencer tool to interfere with endpoint detection and response (EDR) systems and hide their malicious activities.
Trend Micro has reported that these hackers are attempting to use EDRSilencer in their attacks to avoid being detected.
EDRSilencer, which is based on the NightHawk FireBlock tool from MDSec, is meant to block outgoing traffic from EDR processes using the Windows Filtering Platform (WFP).
It can stop various processes linked to EDR products from companies like Microsoft, Elastic, Trellix, Qualys, SentinelOne, Cybereason, Broadcom Carbon Black, Tanium, Palo Alto Networks, Fortinet, Cisco, ESET, HarfangLab, and Trend Micro.
By using legitimate tools like this, hackers aim to make EDR software less effective, making it harder to spot and remove malware.
Source:
In public spaces, always be conscious of who can view your screen or listen to your conversations. Protect sensitive information by positioning yourself to minimize visibility and avoiding discussing private matters in crowded areas. Your awareness can help keep your data secure.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 15, 2024 22:17 (on 10/16/24) | 1 | QR Ready | 1 minute read
Take the time to delete any old or unused accounts and subscriptions. This not only reduces your digital footprint but also lowers the risk of potential cyber-attacks. Fewer accounts mean fewer weaknesses—stay secure by managing your online presence.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 14, 2024 19:33 (on 10/14/24) | 0 | QR Ready | 1 minute read
Turn off auto-play for videos and ads in your browser and apps. This prevents malicious ads from automatically playing and potentially infecting your device with harmful software. It also gives you more control over what content you see online.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 13, 2024 19:42 (on 10/13/24) | 0 | QR Ready | 1 minute read
Be cautious about the personal information you share online. Even seemingly harmless details can be exploited for social engineering attacks. Protect your data by sharing only what’s necessary and keeping your privacy in mind.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 10, 2024 21:55 (on 10/11/24) | 0 | QR Ready | 1 minute read
Google is launching a new pilot program in India to automatically block the sideloading of potentially harmful Android apps from third-party sources, following similar tests in Singapore, Thailand, and Brazil. The feature aims to protect users from apps that request sensitive permissions often exploited for financial fraud, such as accessing SMS messages or using accessibility services for malicious activities.
The initiative will start next month and will be gradually rolled out across all Android devices with Google Play services in India. Google has already blocked nearly 900,000 high-risk app installations in Singapore since the program's launch earlier this year.
Eugene Liderman, Google's Director of Mobile Security Strategy, said the feature will automatically prevent risky installations by analyzing app permissions in real-time. Developers are advised to review their app permissions to ensure compliance with the new rules.
This comes nearly a year after...
October 9, 2024 19:43 (on 10/9/24) | 0 | 1 minute read