Phishing methods
Phishing methods have become extremely popular, which makes it difficult for the average person to verify the degree of danger. By opening an email or website, they are not able to distinguish it from fake ones. This favors extortion on a large scale and is profitable for criminals. Often, fake emails and websites contain real-world logos from well-known companies, which makes them look very credible.
https://isc.sans.edu/diary/Phishing+with+a+self-contained+credentials-stealing+webpage/25580
Holiday season can be a real harvest for cybercriminals
Every year, the percentage of customers deceived online increases. The holiday season can be a real harvest for cybercriminals. Web users should carefully check the text of suspicious e-mails, grammar, style or twisted words. The warning light should also light up if the sender asks us to provide personal or bank details, or even to make a transfer to an account.
https://www.helpnetsecurity.com/2019/12/06/online-retail-fraud-increase/
The Russian digital service provider Rostelecom
The Russian digital service provider Rostelecom has offered telecom operators quite a specific solution to the problem associated with hackers – honeypots. Considered is the creation of special software that is supposed to simulate the attack and detection of hackers trying to hack a server. Rostelecom experts are very confident in their solutions and say that it will also be possible to collect information on new hacking methods.
https://www.ehackingnews.com/2019/12/rostelecom-cyber-security-honeypot-hackers.html
FACOM128B
FACOM128B has been operating in Japanese laboratories Fujitsu for about 60 years. In my opinion, this is not an ordinary computer but it is an unusual device that has greatly helped rebuild the Japanese industry and stave off the post-war crisis. FACOM128B is based on relays, it is older technology than electronic lapms. The calculations were used in implementing large-scale lens production. It is thanks to FACOM128B that Japan has such a well-developed industry in this field. The computer uses a special Fujitsu program to maintain the efficiency of old machines. It’s a piece of history that may no longer play such a significant role as it used to be, but it certainly reminds you of its golden time where it played a significant role for decades.
Python
The popularity of Python’s growth is amazing – it replaced Java in the ranking of the popularity of programming languages used by GitHub. On the one hand, there are reasons to be satisfied, but on the other hand, the more developers use this language for their projects, there is great interest in cybercriminals.
Music also sounds in computer science.
Mozilla removed 4 Avast and AVG extensions
Today we won’t find Avast and AVG extensions in search results, they just stopped working and links to them. Avast Online Security, AVG Online Security and two versions of SafePrice have also disappeared. In general, the data is not necessary for the operation of extensions, but it is very well suited for identifying Internet users and profiling ads.
https://securityaffairs.co/wordpress/94703/digital-id/mozilla-avast-avg-extensions-removed.html
DNS
One of the main plagues of modern data processing is malicious software. Suppliers spend a lot of time to block access of malicious files on the Internet. A simple way would be to completely disconnect from downloading malware and hosting servers. Knowing which sites are bad would be enough to prohibit users from connecting to them. It would be a way out, but as usual, it has its pros and cons.
https://www.helpnetsecurity.com/2019/12/04/how-dns-filtering-works/
Windows Users Beware!
Users of Windows 10 should pay particular attention to advertising in applications. Some of them recently lead to fake sites where you can fall victim to cheaters. Interestingly, dangerous ads are displayed even in system applications.