Don's Pages and my Music

Friday, April 14, 2017

Facebook - Hackers are using current FB users Accounts - They Create fictitious FB profiles then try to add the same friends in hopes to scam you

There's another Scam, on Facebook. "These are Hacks using current FB users Accounts. They dupe and create fictitious FB profiles then try to add the same friends in hopes to scam you." Read how it's done, Below, in my e-mails, with my friend Jeff...

Don

I got this e-mail. Looks like it is from FB. But, I wouldn't click on any links in it, to be safe... I did some research on Google and Scoured my FB Account. But, can't find any record of these New Requests. And these are all (including you)... Already my FB friends and have been for several years. I Downloaded all of my FB Activity. And it seems ok. No one, but me, has logged into my account, in these records, etc... Since you use FB every day. I thought you might know something about it... I'm putting my Research links below, too...

Don



-------- Forwarded Message --------
Subject: RE: Do you know what this is about? Fwd: 3 others want to share with you on Facebook
Date: Mon, 10 Apr 2017 04:22:54 -0500
From: Jeff
To: Don


Sorry it took me so long to answer...

Anyway, yes I have rec'd emails such as this.  I have found that these are hacks using current FB users.  They dupe and create fictitious FB profiles  then try to add the same friends in hopes to scam you.  It's annoying!!

My mom was duped last week and my sister caught it,  I was duped 1 month ago and Amy caught it.   I reported to FB and they closed it down.  Same went for my mom's account. 


Thanks, Jeff


-----------------------------------------

From: "Don"
To: "Jeff"
Cc:
Sent: 08-Apr-2017 05:06:04 +0000
Subject: Do you know what this is about? Fwd: 3 others want to share with you on Facebook

Hey, I got this e-mail. Looks like it is from FB. But, I wouldn't click on any links in it, to be safe... I did some research on Google and Cowered my FB Account. But, can't find any record of these New Requests. And these are all (including you)... Already my FB friends and have been for several years. I Downloaded all of my FB Activity. And it seems ok. No one, but me, has logged into my account, in these records, etc... Since you use FB every day. I thought you might know something about it... I'm putting my Research links below, too...

Don

Facebook.com e-mail I got seems to be from them Clean link Scan - Since your last visit, 3 people accepted your friend requests Google Search info
Facebook Since your last visit, 3 people accepted your friend requests - Google Search
"Since your last visit 88 people have accepted your friend requests"
why is my facebook account sending friend requests to unknown people? | Facebook Help Community | Facebook
Unknown people accepted my friend request which I never send | Facebook Help Community | Facebook
My settings say that I sent a friend request that I did not send? | Facebook Help Community | Facebook

Yes that is exactly what they are doing fake dupe accounts so they can attempt to scam you out of money or other items. We all changed out passwords to just make sure, but nothing was changed on our accounts. 


Jeff

-----------------------------------------

From: "Don"
To:
Cc:
Sent: 10-Apr-2017 10:14:49 +0000
Subject: Re: Do you know what this is about? Fwd: 3 others want to share with you on Facebook

Ok, thanks... Ya I read something about people making fake duplicate FB accounts. And using them to trick people into what ever they can. And I though of someone Hacking my Password and using my account. Since, the notice, said. People had accepted m Friend Requests. But, my account shows no changes and I couldn't find any record of it sending out any Friend Requests. Still, I think I will change my password, to be safe...

Thanks,

Don


FaceBook info
Facebook
How To : Delete Facebook Account Permanently | SocialBlogr
How To : Download The Information You've Put on Facebook | SocialBlogr
How To : Get New Facebook Messages (Email) Invitation | SocialBlogr
Mom behind most-watched Facebook Live video visits its HQ
setup facebook e-mail in thunderbird - Google Search
Your Notifications
Facebook Retreats on Privacy
Apple, Google, Facebook Get More Senate Scrutiny Over Mobile Privacy | Epicenter | Wired.com
Facebook Loosens Privacy Controls, Sparks a Backlash | Epicenter | Wired.com
Facebook Nears Settlement on Charges It Misled Users on Privacy - WSJ.com
Facebook Nears Settlement on Charges It Misled Users on Privacy - WSJ.com
Facebook Retreats On Privacy | Fox News
facebook retreats on privacy - Google Search
Facebook's Gone Rogue; It's Time for an Open Alternative | Epicenter | Wired.com
Google+ Identity Crisis: What's at Stake With Real Names and Privacy | Epicenter | Wired.com
Google Settles With Feds, Apologizes (Again) For Buzz Privacy Blunder | Epicenter | Wired.com
If You Hate Facebook... - Fox News Video - Fox News
Public Posting Now the Default on Facebook | Epicenter | Wired.com
Under the Gun, Facebook Relents on Privacy | Epicenter | Wired.com
Video - Wsj.com
Privacy - Laws-Help
Prevent Being Tracked Online! - YouTube
Privacy Journal

Computer Security - Aaron's Computer Rental Chain Settles FTC Spying Charges
Aaron's Agrees To Stop Snooping On Customers Via Rented Computers – Consumerist
Aaron's computer rental chain settles FTC spying charges | Security & Privacy - CNET News
Agreement Containing Consent Order - 131022aaronsorder.pdf
Company Agrees to Stop Spying Through Rented Computers
Complaint - 131022aaronscmpt.pdf
I Can See You In Your Home
Lawsuit: Aaron's Rental Co. Laptops Can Track Users' Keystrokes and Screenshots, Take Webcam Photos
Lease to Own Furniture, Computers, Electronics, Appliances | Aaron's
The Greatest American Lawyer: Invasion of Privacy: Aaron's Rental Company Laptops Spie on Customers
Computer Security - All Mixed info on Computers and the Internet
11+ security questions to consider during an IT risk assessment - TechRepublic
5 best practices to improve building management systems' cybersecurity - Cabling Install
5 biggest security failures of 2015 and who is still at risk - TechRepublic
5 ways to secure OS X - TechRepublic
9 days: Black-hat hackers' threshold in untargeted attacks - TechRepublic
Adobe patches Flash to quash last two zero-days unearthed in Hacking Team's cache | Computerworld
Adobe patches vulnerabilities in ColdFusion, Flex and Flash Player, including a zero-day flaw | Computerworld
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients - PETS2015VPN.pdf
A Linux botnet is launching crippling DDoS attacks at more than 150Gbps | Computerworld
Amazon resets passwords that might have been 'exposed'
An insider's look at iOS security - TechRepublic
Anonymous insiders reveal real hacking risks to nuclear power plants, report | Computerworld
Anti Virus Companies Profit in Ugly PUP Game
Antivirus software could make your company more vulnerable | Computerworld
Apple iOS App Store riddled with malware -- XcodeGhost haunts hundreds of apps [u3] | Computerworld
Apple's encryption battle with the FBI is over, for now
Are Your Hacked Details Circulating On The Internet? | Gizmo's Freeware
A troubling trajectory of malware and ransomware targeting OS X and iOS - TechRepublic
Backspace Flaw Enables Linux Zero-Day Attack | Software | LinuxInsider
Baidu Android app component puts 100 million devices at risk | Computerworld
Best Free Internet Safety Check | Gizmo's Freeware
BitLocker encryption can be defeated with trivial Windows authentication bypass | Computerworld
Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
Black Hat USA 2015 | Briefings
Burr-Feinstein Encryption Bill
Caution - Free USB Drives
Check Your PC For Remnants Of Hacking Team Tools | Gizmo's Freeware
CIOs wary of sharing cyberthreat data | CIO
Coming soon to your smart TV: The next wave of cybercrime | Computerworld
Comodo fixes bug that led to issue of banned digital certificates | Computerworld
Comodo SSL Affiliate | The Recent RA Compromise
CompTIA report: Almost half of companies believe their security is 'good enough' - TechRepublic
Congress moves quickly on cyberthreat information sharing | Computerworld
Cookie handling in browsers can break HTTPS security | Computerworld
Court rules Shutterfly may have violated privacy by scanning face photos | Computerworld
Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux - darkMORE Ops
Critical flaw in NetUSB driver leaves millions of routers vulnerable | Computerworld
Critical flaw puts 500 million WinRAR users at risk of being pwned by unzipping a file | Computerworld
Cybercriminals adopt just-patched zero-day Flash exploit | Computerworld
Cybersecurity bill approved, but what does it accomplish? | Computerworld
Data breach at toy maker VTech leaked photos of children, parents | Computerworld
Data convenience isn't a crime, but treating it as one should be | Computerworld
Data held hostage; backups to the rescue | Computerworld
DDoS mitigation may leave your site vulnerable - TechRepublic
Department of Defense - Law of War Manual (June 2015) - law-of-war-manual-june-2015.pdf
Design flaw in Intel chips opens door to rootkits | Computerworld
Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel - YouTube
DOJ tightens policies on use of simulated cells for surveillance | Computerworld
Download Older Versions of Software
Download Older Versions Software for any Operating System
Downloads - Rook Security
Drupal Hardens Its Security in Response to Criticism
Dyreza malware steals IT supply chain credentials | Computerworld
Email Header Analyzer, RFC822 Parser - MxToolbox
Encryption ransomware threatens Linux users — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
Evil Versions of Popular Open Source Software
Facebook to warn users about potential state-sponsored attacks | Computerworld
Facebook was the victim of a backdoor hack
Faux phishing scheme shows CIOs how hacks unfold | CIO
FBI backs off Apple, finds another way into iPhone 5c
File-encrypting ransomware starts targeting Linux Web servers | Computerworld
Firefox helps you cover your assets with latest Tracking Protection feature - TechRepublic
Firefox Security Warning - CVE - CVE-2015-4508
Firewalls can't protect today's connected cars | Computerworld
Five Tips to Avoid Tax Scams
Former NSA and CIA director recommends managing consequences instead of vulnerabilities - TechRepublic
F-Secure Router Checker | Is my DNS hijacked?
Full Disclosure: WinRAR SFX v5.21 - Remote Code Execution Vulnerability
Google researchers uncover a remote execution bug in FireEye appliances | Computerworld
Got A Lenovo Laptop? You Need To Uninstall The Accelerator. | Gizmo's Freeware
Hacker exploited Imgur flaw to secretly load over 450 background images and attack 8chan | Computerworld
Hacker hijacks @Deray by redirecting his Verizon phone number
Hacker: 'Hundreds of thousands' of vehicles are at risk of attack | Computerworld
Hackers shut down power grid in Ukraine
Has The Antivirus Industry Gone Mad? | Emsisoft Blog
Has The Antivirus Industry Gone Mad? | Emsisoft Blog
Hello Kitty hack exposes 3.3 million users, joins Hello Barbie in putting kids at risk | Computerworld
How Adele became the latest celebrity hacking victim - TechRepublic
How Safe Is Your Password? | BreachAlarm
How to Check an Internet Link without Actually Clicking It | Gizmo's Freeware
How to easily encrypt/decrypt a file in Linux with gpg - TechRepublic
HP adds protection against firmware attacks to enterprise printers | Computerworld
Hyatt Hotels says payment-processing systems hit by malware | Computerworld
Improve Your Security: Check Your Router Hasn't Been Hijacked | Gizmo's Freeware
Indegy - Our mission is to prevent industrial disasters by delivering products that defend against cyber attacks and enable operational excellence in ICS management
Index of /tools/
Is it time to replace passwords with passthoughts? - TechRepublic
Is there an Internet-of-Things vigilante out there? | Communauté Symantec Connect
Joint Chiefs of Staff emails targeted by Russian hackers | Computerworld
JPMorgan says breach impacted 76M households and 7M small businesses | CSO Online
Juniper Networks to rip out NSA-developed code amid new backdoor security concerns - TechRepublic
Juniper updates list of backdoored enterprise firewall OS versions | Computerworld
Juniper warns about spy code in firewalls | Computerworld
Kill the hassle of password management with Google Apps SSO - TechRepublic
LAPD hacks iPhone 5s, proves they don't need Apple backdoor - TechRepublic
Leaked D-Link code-signing key could make malware look legit
Let's Encrypt - Free SSL/TLS Certificates
LifeLock pays $100M to settle FTC complaint of more false advertising | Computerworld
Linux Grub massive flaw: Was it made by NSA in 2009? | Computerworld
Linux Today - Drupal Hardens Its Security in Response to Criticism
Linux Today - Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer
Linux Today - TeamViewer Alternatives for Linux
LogJam encryption flaw puts Web surfers at risk | Computerworld
Logjam: How Diffie-Hellman Fails in Practice
Logjam: PFS Deployment Guide
Mac OS X ransomware: How KeRanger is a shadow of malware to come - TechRepublic
Macs can be remotely infected with firmware malware that remains after reformatting | Computerworld
Major attack on Cisco routers: Protect your enterprise from SYNful Knock - TechRepublic
Make It Easier To Trace The Source Of Email | Gizmo's Freeware
Malware goes to war: Potential tools, uses, and targets of cyberweapons - TechRepublic
Mark Zuckerberg's lesser-known social accounts get compromised
Microsoft Patch Tuesday: The patches keep coming | Computerworld
Microsoft will benefit from LinkedIn's massive personal database, but privacy risks remain - TechRepublic
Microsoft Word - Tier 1 Controls v2.docx - Tier-1-Controls-v2-2.pdf
Microsoft Word - Whitepaper - Anatomy of the Attack Phishing.docx - Whitepaper-Anatomy-of-the-Attack-Phishing.pdf
Millions of Android devices have flawed full disk encryption
"Millions" Of Home Routers Vulnerable To Web Hack - Forbes
Millions of Linux servers and PCs, 66% of Android devices vulnerable to serious 3 year old bug - TechRepublic
Misconfiguration Exposes Hotel Routers to Risk
Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer - Softpedia
Mozilla issues quick fix for Firefox zero-day bug | Computerworld
New attack campaign against SMBs uses a botnet to deliver PoS malware | Computerworld
New malware infects ATMs, dispenses cash on command | Computerworld
New remote access Trojan Trochilus used in cyberespionage operations | Computerworld
North Korean hackers stole US fighter jet blueprints
NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users | TechCrunch
NSA Spying on Foreign Anti-Virus Companies
oclHashcat - advanced password recovery
OpenSSH Flaw Exposes Linux Servers to Roaming Risk
OpenSSH patches leak that could expose private SSH keys | Computerworld
OPM: The worst hack of all time | Computerworld
OPM underestimated the number of stolen fingerprints by 4.5 million | Computerworld
Patch halt looms for half of all IE users | Computerworld
Pawn Storm cyberspy group targets NATO, other gov't agencies | Computerworld
Phishing Scams Lead with Fake CEO Emails
Plenty of fish, and exploits, on dating website | Computerworld
Probably The Most Reliable Source Of Security Patch Info | Gizmo's Freeware
Project Zero
Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic
Read the full Senate bill requiring encryption backdoors
Report: 90% of mobile health and finance apps vulnerable to critical security risks - TechRepublic
report_pubv2 - bencsathPBF11duqu.pdf
Scan report for at UTC - VirusTotal
Scan report for http://archive.defense.gov/pubs/law-of-war-manual-june-2015.pdf at 2015-11-25 21:24:10 UTC - VirusTotal
Skimmers Hijack ATM Network Cables — Krebs on Security
Software security holes
SSH Frequently Asked Questions
SSL/TLS/HTTPS: Keeping the public uninformed | Computerworld
St. Louis Federal Reserve forces password change after DNS attack | Computerworld
Tesla patches Model S after researchers hack car's software | Computerworld
The anatomy of a DDoS extortion attempt - TechRepublic
The Daily Dot (dailydot) 24 uploads | Scribd
The Dark Arts: Hacking Humans | Hackaday
The dark side of wearables: How they're secretly jeopardizing your security and privacy - TechRepublic
The Juniper VPN backdoor: Buggy code with a dose of shady NSA crypto | Computerworld
The myth of the cybersecurity skills shortage | Computerworld
The NSA wants to spy on the Internet of Things
The Risk of Open WiFi on Display at RSA
Thousands of Java applications vulnerable to nine-month-old exploit | Computerworld
Thousands of medical devices are vulnerable to hacking, security researchers say | Computerworld
Three indicted in JPMorgan hacking case | Computerworld
Top 10 security stories of 2015 | CIO
Twitter 'confident' that 32 million usernames weren't hacked
Unlike Mozilla, Google anticipated SHA-1 errors from HTTPS traffic inspection systems | Computerworld
URL spoofing in reader mode — Mozilla
Ways $460 million military contract for cyber bombs could attack targets | Computerworld
Website Password hacking using WireShark - blackMORE Ops
Why citizens need encryption as a fundamental human right - TechRepublic
Why Linux Distros Look Insecure Even Though They're Not | FOSS Force
Why the Linux Mint hack is an indicator of a larger problem - TechRepublic
Why the NSA may not need backdoors - TechRepublic
Windows vulnerability can compromise credentials | Computerworld
Wireshark makes locating bandwidth issues easy - TechRepublic
XcodeGhost used unprecedented infection strategy against Apple | Computerworld
Your 4-step DDoS attack protection plan: What you can learn from Protonmail attack - TechRepublic
Zero-Day Exploit Found in Kaspersky Antivirus - UPDATED - Softpedia
CYBERTHREAT REAL-TIME MAP - Kepersky MAP
Untangling the NSA's latest alleged embarrassment
Distributed Censorship or Extortion? The IoT vs Brian Krebs | Hackaday
Insulin Pump Can be Hacked: Johnson & Johnson
The FCC wants ISPs to get permission before sharing your data
ICYMI: Airbag helmets might save your noggin
Why the Internet fell apart today
Routers, The Internet & YouTube Offline - Computerphile - YouTube
DonsDeals Blog: Why did the Internet Fall Apart Today? - Early Today (10-21-16) Some party unleashed a massive DDoS attack against Dyn, a major DNS Host
Teen arrested for sharing exploit that almost brought down 911
Joomla websites attacked en masse using recently patched exploits | CSO Online
Netflix taunts ad blocking crowd with 'Black Mirror' ads
US bank authority warns of data breach that took 10,000 records
AT&T May Be Spying On U.S. Citizens For Profit | Digital Trends
LinkedIn is on the Verge of Being Banned in Russia | Digital Trends
Microsoft to open two Azure data centers solely for US Department of Defense as it woos government contracts – WinBeta
Illumio Introduces Security Templates to Shut Down Existing Security Gaps Inside Data Centers and
Product Demo: Illumio Security Templates - YouTube
DonsDeals Blog: Eaton EPRI is field testing intelligent Circuit Breakers for Smart Grid Utilities - Energy Management Circuit Breaker
28c3: Defending mobile phones - YouTube
Yahoo confirms new security breach affecting over one billion accounts
eSecurity Planet
Get This 1000-Page Book For Free | Gizmo's Freeware
Security Engineering - A Guide to Building Dependable Distributed Systems
Security Engineering - The Book - SEv1.pdf
DonsDeals Blog: Computer Securtiry info links 01-01-17 - Re New message from a Facebook Friend
IBM Details Risks of Second-Hand IoT Devices and Connected Cars
Cloudbleed — Your Credentials Cached in Search Engines | Hackaday
Incident report on memory leak caused by Cloudflare parser bug
Survey finds 25% of healthcare organizations put patient data at risk in the public cloud - Cabling Install
Critical security flaws found in LastPass on Chrome, Firefox
DoubleAgent: Zero-Day Code Injection and Persistence Technique | Cybellum
From XP to 10, DoubleAgent pwns all your Windows? | Hackaday
'Shadow Brokers' give away more NSA hacking tools
Have I been pwned? Check if your email has been compromised in a data breach
Is My Password Safe? Practices for People Who Know Better | Hackaday
Are your sensors spying on you? - YouTube
Your phone's motion sensors can give away PINs and passwords
Computer Security - Congress Targets Cybersecurity and you're the Victim
EFF Disappointed as CISA Passes Senate | Electronic Frontier Foundation
GetFile
John Brennan email hacked, U.S. investigates - CNNPolitics.com
Teen says he hacked CIA director's AOL account | New York Post
Computer Security - Sony Apologizes Offers $1 Million Insurance After Hacking
Ernst Interview on Sony Data Breach, May 3 - Video - Bloomberg
Technology news, comment and analysis | Technology | guardian.co.uk
Torrenzano Interview on Sony Data Breaches, May 4 - Video - Bloomberg
Computer Security - Tesco Bank breached: Money stolen from 20,000 accounts
Tesco Bank breached: Money stolen from 20,000 accounts
Message for Current Account customers - Your Community - Tesco Bank
TalkTalk loses over 100,000 customers following hack
TalkTalk fined £400K for mistakes that led to 2015 hack
Tesco Bank breached - Google Search
Thousands of Tesco Bank accounts compromised by fraud | Money | The Guardian
Tesco Bank breached - Google Search
Tesco Bank blocks customer bank cards after 'suspicious activity' prevents woman from feeding childr - YouTube
Tesco Bank: 20,000 customers lose money - BBC News
Computer Security Bulletins Windows and Mac
About the security content of Mac OS X v10.6.6
Microsoft misses flaw in 2010 patch that was supposed to quash Stuxnet bug | Computerworld
Microsoft releases emergency patch to stymie Windows Server attacks | Computerworld
Microsoft Security Bulletin MS11-001 - Important: Vulnerability in Windows Backup Manager Could Allow Remote Code Execution (2478935)
Microsoft Security Bulletin MS11-002 - Critical: Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution (2451910)
Microsoft Security Bulletin MS14-068 - Critical
Computer Security Software - 75 Open Source Apps To Replace Popular Security and Related Type Software
75 Open Source Apps To Replace Popular Security Software - Datamation
75 Open Source Apps To Replace Popular Security Software : Page 2 - Datamation
75 Open Source Apps To Replace Popular Security Software : Page 3 - Datamation
75 Open Source Apps To Replace Popular Security Software : Page 4 - Datamation
BackTrack Linux - Penetration Testing Distribution
Cisco Search Results
Email Gateway
EnGarde Secure Linux :: Welcome!
John the Ripper password cracker
License - Email Gateway
m0n0wall - Hardware
pfSense Open Source Firewall Distribution - Home
Tails - Download, verify and install
Tails - Download, verify and install
Whonix / Documentation / Features
Whonix / Documentation / Home
Computer Secutiry and Privacy Online
Privacy and security – The Internet Health Report

Consumer Protection
Focus Factor, V-Factor Promoters to Pay $1 Million for False Claims
Looks Too Good To be True - Consumer Alert!
Looks Too Good To be True - Welcome!
Rip Off ReportBetter Business Bureau or Buyer Better Beware BBB ............Nationwide Alert! ........... THE FOX GUARDING TH

Virus all info, Linux, Windows and Mac
'Neverquest' trojan threatens online banking users - Computerworld
A First Look at the Target Intrusion, Malware — Krebs on Security
A3 : Flux Research Group
Abusing JSONP with Rosetta Flash
Adobe - Security Bulletins: APSB11-25 - Security update available for Flex SDK
Adobe FAIL: Yet another Flash 0-day vuln 'sploited in wild | Computerworld
Adobe patches critical flaws in Flash Player and AIR - Computerworld
Adobe Releases Fix for Two Shockwave Player Vulnerabilities | Digital Trends
All CoinVault and Bitcryptor ransomware victims can now recover their files for free | Computerworld
Anti-rootkit utility TDSSKiller
Anti-rootkit utility TDSSKiller
Antivirus scan for 5cb14d0745d7b09bcbeba3114cc06c5f at UTC - VirusTotal
Antivirus scan for 90d519d99771363325b6bc5c7e9a9a6e5b8e04092053d24fa362aca6e33523f8 at UTC - VirusTotal
Antivirus scan for aca4fc340cb1530ec41ddddc832833dd0d777d7d44f1b66205675d6f8ec29197 at UTC - VirusTotal
Apple patches OS X to protect against POODLE | Computerworld
aswMBR
AVAST 2014 | Download Free Antivirus Software for Virus Protection
AVAST 2014 | Download Free Antivirus Software for Virus Protection
avast! blog » Linux Trojan "Hand of Thief" ungloved
avast! Linux Home Edition
Award-winning antivirus software for all your devices | F-Secure
Best Free Antivirus Software
Best Free Antivirus Software
Best Free Antivirus Software
Best Free Antivirus Software
Best Free Antivirus Software - Gizmo's Freeware 03-31-16 (Read the Comments here and in my ScrapBook there are Big Problems in Windows Systems Breaking Apps with number 1 Qihoo 360 Total Security
Best Free Antivirus Software | Gizmo's Freeware
Best Free Intrusion Prevention and Detection Utility for Home Use (HIPS)
Best Free Rootkit Scanner and Remover
Best Free Rootkit Scanner and Remover
Best Free Rootkit Scanner and Remover
Best Free Rootkit Scanner and Remover
Best Security List - Google Custom Search on DonsDeals Blog
best security list 2013 - Search on DonsDeals Blog
best secutriy list - Google Custom Search on DonsDeals Blog
Bug bounty program outs 7-month-old IE zero-day - Computerworld
cd00r - Google Search
cD00r Knocking backdoor (improved) | Fun Over IP
Check your PC!
CISOfy - Security Auditing and Compliance Solutions
Clam AntiVirus
Clam AntiVirus
ClamWin CD/USB - HowTo
Clean-slate design of Resilient Adaptive Secure Hosts (CRASH)
COMMUNITY - Free access - CLOUD ANTIVIRUS
Comodo - Google Search
Computer worm - Wikipedia, the free encyclopedia
crafted.win32file.ols - Google Search
CrowdStrike: HTTP iframe Injecting Linux Rootkit
CryptoLocker - Wikipedia, the free encyclopedia
CryptoLocker - Wikipedia, the free encyclopedia
CryptoLocker Encryption Cracked. How To Get Your Files Back.
Cryzip Ransomware Trojan Analysis
Cyberspies Posing As Hacktivists Waged Cyberattacks To Steal South Korean, U.S. Military Intel
DEFCON 16: Malware RCE: Debuggers and Decryptor Development - YouTube
Dojo | Dojo-labs
DonsDeals: Avast! AntiVirus For Both Window and Linux Home Edition
DonsDeals: BBC NEWS | Programmes | Click | BBC team exposes cyber crime risk
DonsDeals: Best Free Rootkit Scanner/Remover
DonsDeals: Conficker Worm Called An Epidemic
DonsDeals: CrowdStrike - HTTP iframe Injecting Linux Rootkit (Vrius info)
DonsDeals: Download Comodo System-Cleaner
DonsDeals: Facebook Users Targeted By Fake Virus Alert
DonsDeals: Firewall & Antivirus Software Suite - Internet Security | Comodo
DonsDeals: Free Agent: Linux Firewalls and Antivirus--Needed or Not? - PCWorld
DonsDeals: Free Desktop PC Security - Free Downloads Keep your PC Safe | Comodo
DonsDeals: Jotti's malware scan
DonsDeals: Linux users be Aware of this Trojan - Hand of Thief malware could be dangerous (if you install it) - TechRepublic
DonsDeals: M86 Security Finds URL Filters Anti Virus Scanners Ineffective
DonsDeals: New Kneber Botnet Tied To 75 000 Systems
DonsDeals: PC Hell: Free RootKit Removal Tools and Software
DonsDeals: Privacy = Security and Security = Privacy...
DonsDeals: Probably the best free security list in the world
DonsDeals: Probably the Best Free Security List in the World
DonsDeals: Probably the Best Free Security List in the World - Updated 28. August 2012
DonsDeals: Re: Viruses now penetrating deeper | Tech News on ZDNet
DonsDeals: Setting up Avast Antivirus to Protect your Windows PC...
DonsDeals: ‪TDL4 MBR Rootkit Virus Alureon TDSS Removal by Britec‬‏ - YouTube
DonsDeals: The first Linux botnet? | ITworld
DonsDeals: There are Viruses, Trojans, Worms and Rootkits, that can infect a Linux OS
DonsDeals: Trinityhome : New TRK 3.4: easier than ever before
DonsDeals: Updated Conficker Ropes Victims into Rogue Antivirus Scam
Download Enhanced Mitigation Experience Toolkit 4.1 from Official Microsoft Download Center
download rescue iso - Search results on kapersky.com
Download RogueKiller (Official website)
Download System-Cleaner
Dr.Web Virusscan [CureIt!]
Edit - Nimbus Screen Capture
EMET mitigations guidelines
Empathy | Michal Strehovský: home
Exabeam handles security threats in real time with user behavior intelligence - TechRepublic
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response - Exabeam
Fake Antivirus Targets Firefox | PCWorld
FAQ - VirusTotal
File scan results from Metascan Online | Free virus scanning tool
File scan results from Metascan Online | Free virus scanning tool
File scan results from Metascan Online | Free virus scanning tool
FireEye - Fox IT Scanner
Firewall & Antivirus Software Suite - Internet Security | Comodo
Firewall | Download Free Firewall Software From Comodo
Five free anti-malware products to safeguard your PC - TechRepublic
Flash-based vulnerability lingers on many websites three years later | Computerworld
Flex Security Issue APSB11-25
Free AntiVirus & Anti-Rootkit & Anti-Malware | Free Web Filtering | Free VPN | Free IPSec | Free FortiClient
Free Antivirus | Download Free Virus Protection Software from Comodo
Free Antivirus for Windows - Open source GPL virus scanner
Free Antivirus Software - Download Bitdefender Antivirus Free
Free Ransomware Decryption Utilities | Gizmo's Freeware
Free Virus Scan, Free Virus Protection, Antivirus Software | McAfee Security Scan
Free Windows Desktop Software Security List - My Choices | Gizmo's Freeware
Free Windows Desktop Software Security List | Gizmo's Freeware
Get Started with Lynis - Installation Guide
GHOST glibc Linux Remote Code Execution Vulnerability | Threatpost | The first stop for security news
git-public.flux.utah.edu Git - a3/demo-scripts.git/summary
Gizmo's - Best Free Intrusion Prevention and Detection Utility for Home Use (HIPS) | Gizmo's Freeware
GMER - Rootkit Detector and Remover
Google Translate - http://www.chkrootkit.org/download.htm
Google, Microsoft and Instagram rush to fix Flash flaw that could steal your data
Greatdanepro.com | Safety: Currently Safe. Social: 10/10 | AVG Threat Labs
Hand of a Thief malware targets Linux users' bank accounts | Apps and Software | Geek.com
Hand of Thief malware could be dangerous (if you install it) - TechRepublic
Heartbleed was just the beginning as more vulnerabilities appear - TechRepublic
How "omnipotent" hackers tied to NSA hid for 14 years—and were found at last | Ars Technica
How do you tell if your computer has a virus
How to create a Kaspersky Rescue Disk using Kaspersky Internet Security 2014
How to Detect Rootkits on a Computer | eHow.com
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engine
How to integrate ClamAV into PureFTPd for virus scanning on CentOS 7
How to Protect Your Linksys Router from TheMoon Malware | Digital Trends
How to record Kaspersky Rescue Disk 10 to a CD/DVD and boot my computer from the disk?
How to record Kaspersky Rescue Disk 10 to a USB device and boot a computer from it
How to secure your ISPConfig 3 server against the poodle SSL attack | HowtoForge - Linux Howtos and Tutorials
How to start a virus scan using Kaspersky Rescue Disk
How to update anti-virus database of Kaspersky Rescue Disk 10
How to update Kaspersky Rescue Disk 10 databases using an update utility?
IE10 under attack as hackers exploit zero-day bug - Computerworld
Index of ftp://ftp.f-secure.com/anti-virus/tools/beta/
Jamesturner.ca | Safety: Active Threats!. | AVG Threat Labs
Java gets sneaky with Ask Toolbar piggyback install | WindowsObserver.com
Jotti's malware scan
Kaspersky Rescue Disk 10
KlamAV - ClamAV for KDE | Free Development software downloads at SourceForge.net
klamav - Google Search
KlamAV GUI Screen Animation
Linux Today - Hand of a Thief malware targets Linux users' bank accounts
Linux Virus - Google Custom Search on DonsDeals Blog
Lynis
Malware developers hide in plain sight in online sandboxes - TechRepublic
Malware in Ad Networks Infects Visitors and Jeopardizes Brands
Massive botnet takedown stops spread of Cryptolocker ransomware - Computerworld
McAfee Security Scan Plus | McAfee Free Tools
Metascan Online | Free file scanning with multiple antivirus engines
Microsoft misses Windows bug, hackers slip past patch | Computerworld
Microsoft plans monster security update for next week | Computerworld
Microsoft Rushes to Fix Browser After Attacks; No Fix for XP Users - NYTimes.com
Microsoft tells Windows 10 users to uninstall Office | Computerworld
More than 30 vulnerabilities found in Google App Engine | Computerworld
Mytob - Google Search
Network Security – Virus Alerts | McAfee Threat Center
Neverquest banking malware more dangerous than Zeus trojan - TechRepublic
Neverquest Trojan: Built to Steal from Hundreds of Banks | We use words to save the world | Kaspersky Lab Official Blog
New Flavor of Ransomware Is More User Friendly
New Linux Rootkit Emerges | threatpost
New Malware Targets Linksys Routers
New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer - Palo Alto Networks BlogPalo Alto Networks Blog
News | VirusBlokAda
North Korea's official news website serves malware | Computerworld
Online banking faces a new threat - Securelist
online virus scan file upload - Google Search
Oracle_VM_VirtualBox_Extension_Pack-4.0.0-69151.vbox-extpack MD5:9ca47480f5b6339a607320c02529c02c - VirSCAN.org Scanners did not find malware!
Outpost Security Suite FREE — The first Free Complete Internet Security Suite
Panda Cloud Antivirus – Download the best free antivirus and the first free antivirus from the cloud
Patch alert: Update browsers' Flash ASAP to block log-on theft - Computerworld
PATCH NOW: NTP vulns remotely exploitable. Sploits in wild already | Computerworld
Patch Tuesday updates aim for Exchange and Explorer flaws | Computerworld
PC Security, PC Internet Security, Free Desktop PC Security Protection
Powerful Free Microsoft Security Tool EMET has Been Updated
Powerful Free Microsoft Security Tool EMET Now in Version 4.1 Update
Probably the Best Free Security List in the World