SecurityCentric is your source for Blog Aggregation in the Security industry

Lucu Banget Situs Sari Roti Diretas Hacker Malah Dipasangi Lagu Dangdut Bunga Dahlia

 Mark As Read    

Belum lama ini memang sedang ramai membicarakan perihal sari roti terkait dengan demonstrasi 212 yang dibagikan oleh para relawan. Namun permasalahannya adalah boikot produk sari roti.Setelah pihak sari roti mengklarifikasi lewat websitenya yaitu sariroti.com.Entah apakah terkait dengan boikot sari roti atau bukan nampaknya situs sariroti.com telah...

Security Ticker 10 hours, 30 min ago

Jaket Yang Dipakai Jokowi Saat Lihat TIMNAS Bertanding Menjadi Viral Lagi

 Mark As Read    

Jakarta Setelah booming-nya penampilan Presiden Jokowi memakai jaket bomber yang menjadi perbincangan netizen mengengai merk dan harganya, lalu di susul dengan fenomenal payung biru Jokowi yang juga menjadi perhatian publik.Sebab, apapun yang dipakai oleh Jokowi semuanya langsung menjadi viral dan ramai di sosial dunia. Ketika Jaket bomber dipakain...

Security Ticker 12 hours, 59 min ago

Agus Menolak Hadir dalam debat CAGUB NET TV, Malah Dibuly Habis habisan oleh Netizen

 Mark As Read    

Seperti yang ditunggu tunggu oleh warga ibu kota Jakarta, nampaknya masyarakat antusias ingin menyaksikan debat para cagub DKI Jakarta untuk melihat visi & misi para calon.Calon gubernur DKI Jakarta, Agus Harimurti Yudhoyono, mengatakan tak memiliki kewajiban untuk ikut dalam di luar debat resmi yang terselenggara oleh KPU Provinsi DKI Jakarta....

Security Ticker 13 hours, 18 min ago

Inilah Hacker Unik Kumandangkan Adzan disitus Polres Purwakarta

 Mark As Read    

Beberapa waktu lalu situs polres purwakarta sempat diretas oleh pihak yang tidak bertanggung jawab, entah apa tujuan peretasan situs ini.Hacker hanya meninggalkan kode nama 1!0N7!N pada halaman depan situs yang diretas, serta mengubah gambar background menjadi orang bertopeng yang menjadi ciri khas para hacker yaitu guy fawkes.Uniknya lagi hacker i...

Security Ticker 14 hours, 8 min ago

Heboh Perang Cyber Saling Hack Website Myanmar Dan Indonesia

 Mark As Read    

Entah Berkaitan dengan kasus rohingya yang terjadi di Myanmar atau tidak, rupanya para hacker atau defacer Indonesia beramai ramai untuk hack serang website Pemerintahan Myanmar.Tak lama kemudian hanya berselang dua hari rupanya kelompok defacer myanmar noob hackers memberi balasan atau menyerang balik situs situs akademik dan pemerintahan indonesi...

Security Ticker 14 hours, 25 min ago

Menurut Aktivis HAM Indonesia : Ahok Adalah Korban Kriminalisasi, simak berikut ini

 Mark As Read    

Apakah Ahok Adalah Korban ?Hari Hak Asasi Manusia (HAM) Sedunia yang jatuh pada Sabtu (10/12/2016) ini diperingati sejumlah aktivis yang tergabung dalam Aliansi Masyarakat Sipil untuk Konstitusi (Amsik) dengan menyatakan sikap terkait kasus penistaan agama yang menjerat Basuki Tjahaja Purnama atau Ahok."Kami memandang Basuki Tjahaja Pumama adalah k...

Security Ticker 14 hours, 47 min ago

Inilah Kisah BOM Panci Yang Akan Ledakan Istana Minggu Pagi

 Mark As Read    

Heboh Bom Berdaya ledak tinggi ditemukan polisi dibekasi Beruntung bom bisa ditemukan hari ini, karena rencananya bom itu bakal diledakkan teroris pada besok pagi."Sesuai hasil interogasi tersangka, rencananya barang itu akan diledakkan besok pagi," kata Kabid Humas Polda Metro Jaya Kombes Pol Raden Prabowo Argo Yuwono di lokasi ditemukannya bom, J...

Security Ticker 15 hours, 16 min ago

Inilah Kisah Unik Kakek 72 Tahun Touring Dari Kalimantan ke Klaten Menemui Teman Kecilnya

 Mark As Read    

Bagi para pecinta sepeda motor touring merupakan hal yang wajib untuk menyalurkan hobi maupun menjalin silaturahmi antar Bikers di daerah lain, Selain itu touring juga dapat bertujuan untuk liburan. Bagi para Bikers di usia muda Mungkin cukup kuat untuk perjalanan jauh menyusuri jalanan dengan sepeda motornya namun berbeda dengan kakek berumu...

Security Ticker 17 hours, 34 min ago

Resilient Network Systems Unveils Automated IAM System

 Mark As Read    

This identity access package not only uses multi-factor authentication abut also pulls in data from social networks and other public sources to zero in on identity.

Researchers Find Security Flaws in IoT Cameras From Sony, Others

 Mark As Read    

Researchers working separately found serious security flaws in network-connected video cameras from Sony and other makers that would allow them to be controlled by hackers and become nodes on a botnets.

SAFECode Gets a New Executive Director

 Mark As Read    

Non-profit organization that is tasked with helping to improve secure software development appoints former Microsoft executive Steve Lipner.

Quest Launches New-Gen Access Management for Cloud

 Mark As Read    

One Identity Connect for Cloud removes a significant inhibitor to digital transformation: complexity.

Popcorntime Ransomware

 Mark As Read    

Popcorntime Ransomware is an extremely devious threat that might push you into infecting the operating systems of other people. This infection is initially spread via spam email attachments, just like Osiris Ransomware, Supermagnet@india.com Ransomware, and thousands of other ransomware infections that have come before it. However, after it encrypt...

411 on Spyware 1 day ago

Osiris Ransomware

 Mark As Read    

Osiris Ransomware seems to be a malicious application created by rather greedy cyber criminals who want users to pay a ransom of 2 BTC. Currently, two bitcoins is more than $1500, so we do not imagine that anyone would want to part with such a sum. Especially, when there are no guarantees, the cyber criminals

411 on Spyware 1 day ago

RIP Ransomware

 Mark As Read    

RIP Ransomware activates itself the moment it successfully enters the computer so that it could then start encrypting users’ files. Once the encryption process is finished, this threat tells these files “rest in peace” by appending a new extension .RIP to each of them. As it is, probably, already clear for you, this ransomware infection

411 on Spyware 1 day ago

Picasti Extension

 Mark As Read    

Picasti Extension is actually a browser extension that no longer seems to function. What’s more, it has already been removed from its only official source where it was available for installation, the Chrome web store. But this is not the only reason why we believe that this questionable tool has nothing to do on your

411 on Spyware 1 day ago

Ransomware Hits More Users in U.S. Than in Other Nations, Study Finds

 Mark As Read    

About 26 percent of ransomware attacks blocked by Malwarebytes security software targeted more customers in the U.S than in any other country, according to an analysis by the company.

Cybersecurity Firm Attivo Warns New POS Hacks Coming

 Mark As Read    

Most often, hackers move laterally, undetected through networks, compromising asset management servers and using them to plant malware on POS terminals.

Comodo Partners with cPanel to Enable AutoSSL

 Mark As Read    

5.8 million free SSL/TLS certificates were provided in November alone as part of new effort to help encrypt the web.

Supermagnet@india.com Ransomware

 Mark As Read    

Did you know that you could get your operating system infected with the malicious Supermagnet@india.com Ransomware just by opening a harmless-looking file? This threat is distributed via spam emails that include misleading file attachments, such as a fake invoice from the post or travel itinerary from an airline company. As you open the file, the...

411 on Spyware 2 days ago

Fake Windows Defender Prevented Malicious Software Tech Support

 Mark As Read    

Fake Windows Defender Prevented Malicious Software Tech Support is an application that displays a fictitious warning from the system. The message informs about recent malicious activity on the computer and demands to enter a Product Key. The request might seem legitimate, as you may think it is the only way the computer could recognize you

411 on Spyware 2 days ago

Healer Console

 Mark As Read    

You must have opened this page because you want to remove Healer Console from your system. This application is categorized as potentially unwanted program (PUP). It means that the application is not a malicious computer infection, but it could have been installed on your PC accidentally when you downloaded some other program. It is not

411 on Spyware 2 days ago

GoldenEye Ransomware

 Mark As Read    

GoldenEye Ransomware is a malicious program that you must avoid at all times. If you ever happen to find this malware active on your personal computer, make sure to execute its complete removal without any hesitation. This is imperative since the devious program in questions exhibits quite a few harmful features; it can lock your

411 on Spyware 2 days ago

Stg-234i23r9-sph.com

 Mark As Read    

More and more suspicious search tools emerge every day, and Stg-234i23r9-sph.com is the newest example. Although it has the interface of a regular search provider and it is able to show search results corresponding to the queries – despite these results being shown via a third-party engine – it is wrong to call it a

411 on Spyware 2 days ago

Floki Bot Malware Analyzed by Cisco Talos and Flashpoint

 Mark As Read    

Zeus-based Floki Bot deciphered by joint effort that benefited from the use of new open-source FIRST framework.

More S4 CTF Tips and Info

 Mark As Read    

Register for S4x17 now! Ticket Block 151 – 200 on sale now for $1,395. First – Reid provided me with the official Killer Robots, Inc logo. Second – My thoughts on who should consider participating in the S4 ICS CTF. A person with hacking skills, but little experience in ICS. The flags will give you […]

Digital Bond 3 days ago

Trend Micro Says Cyber-Attacks Will Continued Unabated in 2017

 Mark As Read    

Security software company Trend Micro says cyber-attacks on enterprise networks and the internet of things will only grow in volume and sophistication in 2017.

Floki Bot Strikes, Talos and Flashpoint Respond

 Mark As Read    

This blog post was authored by Ben Baker, Edmund Brumaghin, Mariano Graziano, and Jonas Zaddach Executive Summary Floki Bot is a new malware variant that has recently been offered for sale on various darknet markets. It is based on the same codebase that was used by the infamous Zeus trojan, the source code of which […]

Security 3 days ago

FIDO Authentication Standards Provide Security Efficiency for Google

 Mark As Read    

The use of U2F based Security Keys helps Google to improve security for its users, according to a new two-year study.

Happygamesearch.com

 Mark As Read    

Happygamesearch.com is not what you think it is. Even though it has an appearance of an ordinary search tool, the truth is that it is a browser hijacker that has been created to boost the traffic of third-party web pages and, consequently, generate revenue for the developer. Happygamesearch.com falls into the category of browser hijackers

411 on Spyware 3 days ago

Matrix9643@yahoo.com Ransomware

 Mark As Read    

We want to inform you about a newly discovered highly malicious computer infection called Matrix9643@yahoo.com Ransomware that was designed to encrypt your files and demand money to decrypt them. Obviously, you must remove it from your PC as soon as possible because there is no use dealing with the cyber criminals that got your PC

411 on Spyware 3 days ago

Asn1 Ransomware

 Mark As Read    

Being infected with Asn1 Ransomware may mean one terrible thing: The loss of all your important files. Of course, if you are a security-minded computer user who regularly saves a backup onto a removable drive, you could be saved from this nightmare. Unfortunately, as soon as this ransomware program sets foot on your system, it

411 on Spyware 3 days ago

Search.searchwos.com

 Mark As Read    

Our researchers could only test how Search.searchwos.com works on Google Chrome, but based on other similar threats, it should be compatible with Internet Explorer and Mozilla Firefox as well. The application is categorized as a browser hijacker since it may enter the system by changing specific browser settings. Users should also know that Search....

411 on Spyware 3 days ago

Minehp.com

 Mark As Read    

The first thing you need to ask yourself when you face Minehp.com is where does this search tool come from? This search tool is likely to take over the homepage – as well as new tab and default search provider – but it could do that it two different ways. You might realize that this

411 on Spyware 3 days ago

Ransomware Hitting ICS

 Mark As Read    

There are two sessions at S4x17, Jan 10-12 in Miami South Beach, covering actual ransomware incidents in ICS. Marcelo Branquinho of TI Safe will go over two case studies that occurred in South America on the Main Stage, and RSA will discuss an ICS ransomware case in the US that also involved the FBI. All […]

Digital Bond 4 days ago

IT Professionals Cyber-Security Confidence Falls From a Year Ago

 Mark As Read    

According to a study from Tenable Network Security, confidence in cyber-security has dropped in the past year, although there are some bright spots.

Winn Extension

 Mark As Read    

Do not get fooled by clever marketing techniques employed by the developers' of Winn Extension. This program is mostly advertised as a handy tool if you want to stream TV shows and sporting events for free. Unfortunately, it does not work in such a way; instead of improving your online experience this application will ruin

411 on Spyware 4 days ago

IBM Watson for Cyber Security Graduates to Beta

 Mark As Read    

IBM bolsters Watson for Cyber Security with new partners in an effort to bring cognitive computing intelligence to security.

Yardood.com

 Mark As Read    

Yardood.com is a new search engine whose operations and intentions are quite questionable. In fact, it seems that this malware infection mainly serves one goal: To generate income for its creators through third-party advertising. This is possible via ads and sponsored links that you could be exposed to if you happen to use this search

411 on Spyware 4 days ago

Sage Ransomware

 Mark As Read    

Sage Ransomware was named according to the extension it appends to its damaged files. Luckily, it cannot harm all data on the system as it chooses particular locations. Accordingly, the amount of affected valuable files may vary for each user. The malware’s creators encourage you not to “wait for a miracle” and pay the ransom

411 on Spyware 4 days ago

FIPS and Deterministic ECDSA: Achieving robust security and conformance

 Mark As Read    

Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both of them require the use […]

Security 4 days ago

SurveyLocker Ransomware

 Mark As Read    

SurveyLocker Ransomware is a screenlocker-type ransomware which means that it locks the victim’s computer and prevents using it altogether. Removing this software is not only possible but highly recommended as well. Our research has shown that this ransomware is distributed via email spam and can enter your computer by stealth. It is designed to lo...

411 on Spyware 5 days ago

IT Professionals' Cyber-Security Confidence Levels Fall, Survey Finds

 Mark As Read    

IT Professionals are less confident than they were a year ago that they could detect cyber-security threats against their computing assets, according to a survey by network security company Tenable.

Google Releases Final Android Security Update for 2016

 Mark As Read    

After fixing 83 vulnerabilities in November, Google adds 74 new patches for December.

Cisco Signs on with Privacy Shield

 Mark As Read    

As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy Shield “ the voluntary, self-certification framework for EU-US data transfer. Why is […]

Security 5 days ago

Developing Next Generation of ICS Security Talent

 Mark As Read    

We wanted to do it at S4x16, but couldn't get it done. It's going to happen at S4x17. A South Florida High School Class will go through two days of hands on automation and security training with Matthew Luallen and the CybatiWorks kit, and then 12 of the students and their teacher will come to the […]

Digital Bond 5 days ago

DiscoverLiveRadio Toolbar

 Mark As Read    

DiscoverLiveRadio Toolbar is yet another questionable program that comes from the infamous Mindspark family. Like the majority of other applications developed by this group, it has been classified as a potentially unwanted program. This classification has been made by our malware researchers as they have discovered that it exhibits quite a few susp...

411 on Spyware 5 days ago

Search.adlux.com

 Mark As Read    

Sometimes it is hard to realize your computer’s security has been compromised if you do not know which signs you should look out for. When it comes to Search.adlux.com, it should be easy to see that you have a browser hijacker on your computer because this program modifies your browser’s settings without your permission. What’s

411 on Spyware 5 days ago

Search.searchdirma.com

 Mark As Read    

Search.searchdirma.com is a search tool that is part of the Directions Mapper extension that was created by the infamous SaferBrowser. This suspicious search tool is almost identical to such well-known browser hijackers as Search.fc-cmf.com, Search.searchmab.com, and Search.searchetg.com. They are classified as browser hijackers because they could ...

411 on Spyware 5 days ago

TestOnlineSpeed Toolbar

 Mark As Read    

TestOnlineSpeed Toolbar is a potentially unwanted program that works as a browser plug-in. This application comes forth as a useful tool that will try to make you think it is something you simply must have on your browser. However, computer security experts say that you should not keep this toolbar on your computer, especially if

411 on Spyware 5 days ago
Security
Welcome!
SecurityCentric aggregates blogs for the Security industry.
Custom Feeds
Add any RSS feed to the information you read daily.
Blocked Feeds
Block feeds to remove blogs you’re not interested in.
Account Settings
Customize the site by adding or removing feeds.

About Us

SecurityCentric is your source for all your Security news.

Have a Suggestion for Us?
Know of a Security blog that we're missing? Let us know!

Share SecurityCentric.com