Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
Welcome Guest!
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered. You will need to Register before you can make posts, chat or enter the forum giveaways. Be sure to also visit the Help/FAQ page.

  Petal Puzzler
Posted by: Mohammad.Poorya - 01-14-2019 , 09:56 AM - Forum: Giveaway of the day - No Replies

https://game.giveawayoftheday.com/petal-puzzler/

2000 FREE LICENSES

[Image: a3727fb928a3e0c15b84ca97cb7e482a.jpeg]

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10
Publisher:
Evolutionary Games
Homepage:
http://www.evolutionary.co.za/petal.html
Price:
The game is available for $2.99, but the winners of our contest will get it for free.

Petal Puzzler is a logic and memory puzzle game.
350 levels made up of these games:
Petal Moves - 90 levels
Flower Match - 30 levels
Petal Match - 90 levels
Logical Petal - 50 levels
Petal Swap - 90 levels
Play them in any order & jump around between them, it's your choice.

Print this item

  Get 50% off the newest Soda PDF V10
Posted by: Sasha - 01-13-2019 , 06:16 PM - Forum: Hot Deals & Discounts - Replies (3)

[Image: c866298f8b55.png]
Get 50% off the newest Soda PDF V10

Expires in 03: 46: 15

https://go.sodapdf.com/web/en/Promo/defa..._jan_v1_19

Print this item

  BetFilter Internet Gambling Site Blocker
Posted by: Igoreha - 01-13-2019 , 04:34 PM - Forum: External Giveaways/Freebies - No Replies

BetFilter Internet Gambling Site Blocker. 2 Year Desktop Licence Available Free With Code

This is a great bit of software if you need this kind of help. The two year licence usually retails for £92 ($118 dollars) but if you apply the code at checkout, it reduces the price to zero.


This code applies to the desktop versions of the software only - mobile devices use the play store/app store method of recurring subscriptions.

http://www.betfilter.com/

Code: PLATINUM100

Print this item

  Deezer Premium free for 3 months
Posted by: Sasha - 01-13-2019 , 04:32 PM - Forum: External Giveaways/Freebies - Replies (11)

[Image: d85a7a594776.jpg]
Deezer Premium free for 3 months

Deezer Music - enjoy a growing library of more than 53 million songs, 20,000 audio books and radio programs, as well as numerous podcasts that you can stream and download online. Listen to albums of your favorite artists, latest charts and new releases, browse playlists for any mood and situation, and also open new songs that you will like in your personal stream.

GP: https://www.gmx.net/produkte/deezer/

Print this item

  Antivirus Special offers 80% Off
Posted by: Sasha - 01-13-2019 , 03:13 PM - Forum: Hot Deals & Discounts - Replies (8)

Antivirus Special offers 80% Off

LIMITED TIME OFFER

https://www.anti-virus4u.com/Special-Offers-s/18.htm

Print this item

  PC / Xbox / PS4 Override Mech City Brawl Free weekend January 17-20.
Posted by: Sasha - 01-13-2019 , 01:21 PM - Forum: Gaming News - No Replies



PC / Xbox / PS4 Override Mech City Brawl Free weekend January 17-20.

From January 17 to January 20, Override: Mech City Brawl.

On PC (19.1) there is also a tournament in which you can win Amazon vouchers or a game.

GAMES

NO TRANSFER, NO GLORY
Override: Mech City Brawl is a three-dimensional fur fight. Fight giant robots and experience skirmishes in sensational urban landscapes. We look forward to epic battles with unmistakable furs in Versus mode (local and online), a cooperative for 4 players (each player controls a part of oversized fur) and a single campaign.

Manage a variety of mythical "furs", including completely stupid, with the help of custom playing styles, special techniques and the final moves. Dominate your competitors and destroy entire cities.

https://mobile.twitter.com/OverrideMCB/s...8139978752

Print this item

  Pay $ 4.49 or more to get Steam games and SAVE 96% OFF
Posted by: Sasha - 01-13-2019 , 12:44 PM - Forum: Game Deals - No Replies

[Image: ae97310fb28b.jpg]

Pay $ 4.49 or more to get Steam games and SAVE 96% OFF

https://www.indiegala.com/artifex-mundi-...ndiegala3i

Print this item

  Avira Prime - 3 months Free
Posted by: Mike - 01-13-2019 , 11:52 AM - Forum: External Giveaways/Freebies - Replies (42)

[Image: Tk6Ctif.png]



Here

Print this item

  NordVPN: 3-Yr Subscription (75% off)
Posted by: Sasha - 01-13-2019 , 10:35 AM - Forum: Hot Deals & Discounts - Replies (2)

NordVPN: 3-Yr Subscription (75% off)

https://sharewareonsale.com/s/nordvpn-3-...um=twitter

Print this item

  The Golden Years: Way Out West
Posted by: ahmed - 01-13-2019 , 10:02 AM - Forum: Game Giveaway of the Day - No Replies

[Image: R3ZuqTn.jpg]

About:
Exclusive offer from Giveaway of the Day and MyPlayCity! No third-party advertising and browser add-ons!

As you use your business savvy to squeeze every ounce of profit from your investments, you'll help an iron-willed woman and her young son overcome the sleazy maneuvers of a greedy ol' rip and save her guiltless husband from a life behind bars. Progress through challenging levels and save the day in The Golden Years: Way Out West!

[Image: 4U4JUIz.jpg]

GP:
https://game.giveawayoftheday.com/the-go...ut-west-2/#
OR
Direct:
https://game.giveawayoftheday.com/downlo...43472464b8

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10; CPU: 800 Mhz; RAM: 512 MB; DirectX: 8.0; Hard Drive: 253 MB

Print this item

  Word Counter Business License
Posted by: Sasha - 01-13-2019 , 09:59 AM - Forum: Giveaway of the day - No Replies

Word Counter Business License (Win & Mac)

Word Counter is a smart and speedy tool. It will count characters, words, and words. You can also integrate it with other tools.

  • Easy word counting of any text;
  • Detailed character counting for multiple uses;
  • Sentence counting of the selected paragraphs;
  • Text analysis for writing and editing.
The license allows you to use it for commercial purposes.

System Requirements:

Windows XP / Vista / 7/8/10

Homepage:
https://bytescout.com/products/enduser/m...rd-counter
File Size:
111 MB

GP: https://www.giveawayoftheday.com/word-co...e-win-mac/

Print this item

  UnHackMe 10 Updated Review
Posted by: tarekma7 - 01-12-2019 , 09:51 PM - Forum: Written Reviews - Replies (9)

[Image: Aopik7G.png]

A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action, exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes.

UnHackMe was initially created as anti-rootkit software (2005), but currently eliminates many types of malicious software, for example; search redirectin, popup ads, potentially unwanted programs (PUPs), unwanted processes, slow browsing, rootkits, trojans, spyware, keyloggers, etc.

Highlights:

UnHackMe is an all-in-one toolbox for removing malware.
Extremely fast.
You can check your computer in only one minute!
Compatible with all known antivirus software.

Homepage:
http://www.unhackme.com

Program page:
http://www.greatis.com/unhackme

Current version: 10.12.0.762b

Release date: January 10 2018

Download:
https://www.greatis.com/unhackme/thankyou.htm

Free Trial:  Fully-functional 30-day evaluation version.

System Requirements

Windows 10, 8.1, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2012 Server, Windows 2008 Server, Windows 2003 Server.
256 MB RAM
40 MB of free disk space
Compatible with all known antiviral software.

Comparison between different editions:

[Image: TwSkE22.png?1]

Why purchase UnHackMe?

Your purchase includes LIFETIME license with LIFETIME updates!

https://www.greatis.com/unhackme/buy.htm

[Image: Cd8fPKz.png]

UnHackMe Licenses:

https://www.greatis.com/unhackme/licenses.htm

Why should you register?

The most pressing reason to register is to get rid of the annoying nag box, which pops up at the most inconvenient times. Beside this, registration entitles you free technical support and minor upgrades to the software.

[Image: PJdxXZT.jpg]

UnHackMe features:

Scanning of installed programs for "Potentially Unwanted Programs" (PUPs).
Checking for junk files, created by PUPs, adware, and spyware.
Scanning of Windows startup programs, services, and drivers.
Testing Windows shortcuts.
Scanning for rootkits.
Examining the browsers' search settings.
Scanning the browsers add-ons.
Testing the hosts file and DNS settings.
Testing startup files using several antivirus programs on the Virustotal.com.
UnHackMe uses its own database to detect which programs you should remove from your PC.
You can agree with it or not. If you find a program on the list that is OK, you can mark it as a False Positive.
An important advantage of UnHackMe is that you can find previously undetected malware by inspecting the UnHackMe results.

New Features in v10:   

UnHackMe 10.0.0.750! [15 November, 2018]: 

The program has completely redesigned interface which is now very friendly and easy to use
Improved stability.
Fixed: Adware.OpenLoad, Adware.PushMaster, Adware.Pubmatic, Adware.EXOSRV, ADW.Entionale, PUP.PremierOpinion, PUP.Microleaves.
Fixed small bugs.

UnHackMe 10.10.0.760! (December 12, 2018):

Added UnHackMe Portable version (uninstaller is included).
Fixed bug with "stealth" processes.
Fixed "infinite loop" bug during disk scanning.
Fixed: Ad.THEGOODCUSTER, AD.Cornwallsdraft, AD.Naganoadigei, Trojan.Work0, Trojan.Cloudnet.

How UnHackMe will protect your device?

UnHackMe is able to work in 3 different modes, these include normal windows mode, offline scanning when booting from USB/CD (Warrior mode), and remotely checking a computer by log file.

In the Normal Windows mode: UnHackMe removes "unwanted programs", cleans a browser, deletes Trojans, adware, and spyware.

Offline scanning when booting from USB/CD (Warrior mode):
The external check is made when a computer boots from a USB/CD device. This principle of double-checking offers a superb advantage: any suspicious code can be removed prior to getting a chance to run in your system. It is easy to locate and eliminate inactive malicious software at this stage. It also becomes easy to discover any kernel rootkits, which hide their files away, as well as registry and boot-record rootkits.

Remotely checking a computer by log file:
If you need help at any stage, you can simply send the log file. Your file will be checked to find a solution for your computer. This will be sent to you.

[Image: t9dJqRr.gif]

Compatibility with antivirus:

UnHackMe is compatible with AVG, AVAST, Symantec, Microsoft, McAfee, Malwarebytes, K7, F-Prot, WebRoot, Norman, TrendMicro, Kaspersky, BitDefender, Agnitum, Ad-Aware, Sophos, Comodo, DrWeb, Emsisoft, ESET-NOD32, Panda etc

Quick Look:



Why Use UnHackMe?? Do it!:



UnHackMe Main Screen

[Image: 9CVJLKG.png]

Network Shield:

This tools blocks malicious websites via windows host file

[Image: pokWIcO.png]

Removal Screen:

[Image: hIoQl8t.png]

UnHackMe Notifications

[Image: lthSamt.png]

Warrior :

[Image: lxVnoEw.jpg]

This is a built-in tool that allows removing rootkits from the outside!It offers you a way to quickly detect and remove hidden rootkits/viruses/malware from your computer using the special boot CD. Simply, put the Warrior CD into your CD-drive and restart your computer! Warrior automatically scans your computer and gets back to the normal Windows mode.

System Requirements
The computer with Windows 2000/XP/2003/Vista/2008/Seven, CD-ROM, RAM 512 Mb or higher, RegRun Security Suite or UnHackMe.

Benefits of using Warrior

Virus removal is simple when the virus is not active. The Warrior allows you to scan your computer from the "clean" Windows PE system.

Auto scanning: One time open and configure the Warrior then set your BIOS settings for boot from the CD.

Full power: You can easily remove malware from your computer, delete or restore files. The hidden rootkits are now fully visible!

No need to update Warrior CD: This is one time payment only. Warrior is quite unlike the Bart PE or UnHackMe Live. It uses the software installed on your hard drive, the antiviral databases stored on your hard drive and made exclusions. This avoids a lot of false positive alerts. Simply update your RegRun/UnHackMe software and Warrior will use the latest version.

Warrior may be used if your computer does not boot. You can check the hard drive for errors or launch another software from your hard drive or from USB stick.

The new examiner is supported by Warrior since UnHackMe 5.9.

Reveal hidden rootkits and infected system files using UnHackMe Examiner

Examiner allows you to quickly detect hidden rootkits on your computer. Examiner is a part of UnHackMe software since version 5.9!
Examiner scans the files in the Windows directory and its sub-directories, detects if the file is executable (or DLL or a system driver) and it writes calculated MD5 values to own database. After that the computer will be restarted to the RegRun Warrior boot CD mode. Examiner scans the same files again and compares with the database information. Examiner reports the hidden and changed files and allows you to check the files, delete or restore from original CD/hard drive.

Examiner Benefits

Easy-to-use: You should put Warrior CD into your CD drive and click on the Examiner button. After that Examiner will make all work without your assistance.

High speed scanning: You can check your system in five minutes. The Examiner scans the most used places of the hidden rootkits: Windows directory, Windows\System32 directory and its sub-directories etc. In addition the Examiner detects the file type using file header information and do not use file extension. This allows the Examiner to collect information only about executable files (and the DLLs and system drivers).

Examiner is not only rootkits detector: It allows you to delete the rootkit files, restore infected system drivers. If you computer does not boot normally you can check the hard drive for errors, copy files from USB sticks etc.

UnHackMe Network Shield:    

Network Shield is a built-in feature that protects your PC against malicious network activity. This includes malware & unwanted programs (PUP), Web(JS) Crypto Miners [web sites that uses JS scrtipts for coin mining in your browser] and crypto coin miners (programs, installed on your PC, that make coin mining in the background)

RootKit Removal Test Kit:

Unhackme is able to remove many of the known rootkits , for full list of these rootkit you can revise the page here:

http://www.greatis.com/unhackme/UnHackMe...emoval.htm

How to add your site to the block list?

This useful tool is located in the features under network tab. You can add, edit and delete many websites

[Image: hyLqAa4.gif]

[Image: 4FFISEo.gif]

How to remove malware with UnHackMe?

[Image: gKne5sv.gif]

Click 'Check Me Now'. Choose 'Anti-malware 1 minute'. You can choose 'On-line multi antivirus + Anti-malware 5 minutes' if you are on-line. If you are not completely sure – do not make fix, cancel the check. Use the Help in Removal feature. You have to visit our support center and provide us your Log File (regrunlog.txt), that is created on your desktop.

You can see fix now red button and mark as false positive if you trust the app or file. You can also check more info for some files. Before complete fix, you need to close the browsers and any unused apps

[Image: JuFfbpE.jpg]

[Image: Lr1iCLJ.jpg]

[Image: 6kIXSyg.jpg]

[Image: 42Gjqp2.jpg]

[Image: ZLGjqyd.jpg]

Program Options:

These are the program settings. It is easily accessible from the main screen. It is categorized under many buttons including monitoring, network shield, boot time scan, notifications, advanced, exclusions

[Image: oUduBRY.png]

Benefits of the professional edition:

UnHackMe Pro includes special designed tools for detecting deep hidden rootkits.
UnHackMe Pro is unique for each user and it is invisible for a rootkit.
You can open UnHackMe Pro from CD-ROM or from a flash drive.
You can use UnHackMe Pro license for checking and removing rootkits from user computers.
No need to install UnHackMe on a user computer.
No need to purchase additional licenses.
Easy in use. No comments!

Conclusion:

UnHackMe is all in one security solution that is different from traditional antivirus software. UnHackMe concentrates on problems which antivirus programs do not look for. It allows you to detect and remove any types of malicious software including rootkits, trojans, backdoors, viruses, worm, spyware, adware, google search, redirects, unwanted orograms, etc. UnHackMe fixes what the others can't!

Support:

https://www.greatis.com/unhackme/support.htm

Print this item

  Possible Bug in WhatsApp May Provide Others with Access to All Your Messages
Posted by: Mohammad.Poorya - 01-12-2019 , 06:14 PM - Forum: Security News - No Replies

Quote:An issue in instant messaging application WhatsApp may provide others with full access to your conversations when replacing phone numbers.

Amazon employee Abby Fuller has reported a potential bug that gained a lot of exposure online lately: when setting up WhatsApp on a new device using a new phone number, the full message archive of the previous owner was restored on the phone.

“Yes it was a new device. No it wasn't second hand. It was not a second hand SIM. Yes I'm sure they weren't my messages, or groups that I was added to. Yes they were in plaintext. I am sure it's my phone number. It was not restored from a backup,” she explained in a follow-up tweet.

Other users who joined the conversation confirmed this happened on their devices as well, also when setting up WhatsApp with a new phone number.

According to WhatsApp’s own support documents, the message history associated with a specific phone number is completely removed after 45 days of inactivity.

“Remember to delete your old account. However, if you didn’t delete your account and no longer have access to your old phone, don’t worry. If the new owner of your old number activates WhatsApp on a new phone after 45 days, all of your account information tied to that phone number will be completely deleted,” WhatsApp says.

Just a bug?
But as Abby Fuller explains on Twitter, this isn’t the case here, as she owned the phone number for more than 45 days, so the message history wasn’t supposed to be there anymore.

“This number has been mine > 45 days (multiple month). Seems like the messages should have been wiped with the account but weren't (or were resent). Either way, account should have been wiped and was not,” she said.

While WhatsApp hasn’t offered an official statement on this, others explain this all happens because the phone number is the unique identifier of the user ID. However, there are questions that need to be answered regarding the storing of user messages, especially when these are restored on new devices.

As PiunikaWeb notes, all evidence seems to indicate this is a bug, so it remains to be seen how and if WhatsApp is planning to resolve it.

https://news.softpedia.com/news/possible...4516.shtml

Print this item

  3x FotoJet Plus 1 year premium Accounts
Posted by: ahmed - 01-12-2019 , 05:19 PM - Forum: External Giveaways/Contests - Replies (5)

[Image: P6ShIWR.jpg]

About The Giveaway:
FotoJet is free online collage maker, graphic designer and photo editor where you can turn your photos into amazing works of art in minutes! It’s also developed by PearlMountain Technology Co., Ltd, a dedicated graphics software developer founded in 2006.

This time they will offer us 3 premium accounts for one year for you, my deal readers.

1.Share this article to social network or forum that you follow. Remember to make it public.
2.Create FotoJet account.
3.Leave a comment with your email address linked to your FotoJet account, equipped with this article share link of first step.
4.All participants will be drawn after 1 week. 3 lucky winners will get upgrade FotoJet accounts to FotoJet Plus as soon as possible.

Be hurry, so as not to be missed. If you are the first time to come to FotoJet, you can check here to know the pricing details: https://www.fotojet.com/pricing.html.

:arrow: Giveaway/Contest Page

**This is a third party giveaway/Contest, not forum Giveaway(So no comments here ;) ,Just go to Giveaway/Contest page(above) & follow very simple instructions in order to confirm your seats.The result will published with in a 7 days.

Print this item

  Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In
Posted by: Bjyda - 01-12-2019 , 04:52 PM - Forum: Security News - No Replies

A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.
A penetration testing tool published by Polish security researcher Piotr Duszyński can bypass login protections for accounts protected by two-factor authentication (2FA). In his write-upon the tool, (which is dubbed Modlishka, meaning “mantis” in English), he asked, “is 2FA broken?”
It’s a question that’s worth exploring, given that this isn’t the first time in recent months that 2FA has been defeated. So, to add context to this latest in a string of high-profile blows against the technology, we decided to ask authentication experts what they thought. First, a brief description of the 2FA-related hacks. Second, the roundtable responses from experts are below.
Modlishka
Modlishka is a reverse-proxy tool that Duszyński has released on GitHub. It sits between a user and whatever website that user is logging into, be it webmail, e-commerce, utility accounts, what have you. It allows the legitimate website content to display for the user – and then intercepts all of the traffic flowing back and forth. So, an attacker in real time can not only observe the victim’s credentials, but also whatever 2FA code he or she inputs. Acting quickly, the malefactor can then log into the account themselves and make cybercrime hay from there.
Any passwords are also automatically logged in the Modlishka backend panel, so even if an adversary is not sitting there waiting in front of the terminal, they can still scrape credentials passively.
“With the right reverse proxy targeting your domain over an encrypted, browser-trusted, communication channel one can really have serious difficulties in noticing that something is seriously wrong,” said Duszyński in his posting. “Add to the equation different browser bugs, that allow URL bar spoofing, and the issue might be even bigger…include lack of user awareness, and it literally means giving away your most valuable assets to your adversaries on a silver plate.”
He added that the only way to address the issue from a technical perspective is to “entirely rely on 2FA hardware tokens, that are based on U2F protocol.”
2FA Problems
In December, word came of an APT attack dubbed the Return of Charming Kitten. The campaign was tailored to get around two-factor authentication in order to compromise email accounts and start monitoring communications. It uses a similar basic premise but requires more manual work on the part of the attackers. On a fake but convincing phishing page, users are asked to enter their credential details, which the attackers enter into the real log-in page in real time. If the accounts are protected by two-factor authentication, the attackers redirect targets to a new page where victims can enter the one-time password; the attackers can then take that, enter it into the real page, and are off to the races.
Earlier in December, an Android Trojan was uncovered that steals money from PayPal accounts even with 2FA on. Posing as a battery optimization tool, it asks for excessive accessibility permissions, which allow it to observe activity on other apps. Then it lurks on the phone and waits for someone to open PayPal and log in.
“Because the malware does not rely on stealing PayPal login credentials and instead waits for users to log into the official PayPal app themselves, it also bypasses PayPal’s two-factor authentication (2FA),” explained researchers at ESET at the time. “Users with 2FA enabled simply complete one extra step as part of logging in, – as they normally would – but end up being just as vulnerable to this Trojan’s attack as those not using 2FA.”
There have been other incidents too that lead us to question the efficacy of 2FA. In August, hackers compromised a few of Reddit’s accounts with cloud and source-code hosting providers by intercepting SMS 2FA verification codes. That too was likely a phishing gambit, which Lee Munson, security researcher at Comparitech.com, said is increasingly effective at thwarting 2FA.
“While 2FA is a very good secondary line of defense, it is not infallible,” he said. “Typically, it can be circumvented via phishing – either tricking someone into revealing the 2FA identifier or, far more likely, my getting them to login to a fake version of the site they were intending to visit.”
Is It Broken?
Which brings us to the question of how much confidence should anyone really have in 2FA? Sure, these incidents were high-profile in the security community, but are they indicative of a more widespread problem where 2FA is compromised regularly? And if so, what should be next?
Threatpost asked a range of authentication experts their opinion, and the consensus seems to be that 2FA isn’t broken – but it’s certainly showing signs of fissure. Stephen Cox, vice president and chief security architect at SecureAuth, laid it out for us.
“While two-factor authentication is a step in the right direction, it falls short in addressing today’s threat landscape,” he said. “From fake login pages for popular email services to the high-profile breaches in 2018 with Yahoo and LinkedIn, there are plenty of examples of attackers who have defeated an organization’s basic two-factor authentication methods. The new reality is, basic methods such as knowledge-based questions and SMS-based one-time passwords can be evaded by attackers using simple phishing attacks and social engineering. Attackers have proven that they can intercept SMS codes or hijack users through social engineering to redirect where the texts are sent.”
Jason Kichen, vice president of Advanced Security Concepts at eSentire, noted that 2FA “has been complicated and nuanced by the continued cat-and-mouse game between attackers and defenders….we’ve seen the most simplistic (and arguably oldest) implementation, 2FA via SMS, shown to be vulnerable to a variety of types of spoofing/redirection attacks…and now we’re seeing tools (like Modlishka) that make the attack execution easier.”
A second takeaway from our roundtable is that regardless of its weaknesses, it should be implemented nonetheless given that it does add another layer of protection – even if the most widely deployed approaches are not as impervious as hoped.
“Any sort of 2FA is still leaps and bounds better than no 2FA at all,” Kichen said. “For now, far more people are not using any 2FA at all. Thus from an opportunistic attacker perspective, having the much derided 2FA via SMS means you’re a harder target than the user next to you. And for most of us, this is more than sufficient (even in a world with Modlishka in it).”
Bill Evans, vice president at One Identity, echoed the sentiment: “The bottom line is 2FA is generally really good and avoiding it because of recent news is foolish. One-factor authentication is good, two-factor is better. Relying on standards is a good way to bolster your chances of success.”
Shoring Up Existing 2FA
Speaking of bolstering success, one of the things to keep in mind is that how existing 2FA is implemented matters.
“No authentication method is perfect and 2FA is no different, but the vast majority of failings in 2FA are not failings in the technologies themselves but failings in the execution of the program,” Evans told Threatpost. “If you take shortcuts; if you don’t couple 2FA with a deep and comprehensive policy and risk program; and if you do not ingrain 2FA in your entire approach to identity and access management, you will not realize the benefits that 2FA can bring.”
Randy Abrams, senior security analyst at Webroot, pointed out that user education is also critical.
“It is far too easy to phish a person’s credentials,” he told Threatpost. “Anti-phishing education materially reduces the risk of credential (authentication) theft. User education is likely to become a prerequisite to obtain cybersecurity insurance, or a defense that reduces premiums.”
Meanwhile, some pointed out that since the compromises to date have mainly defeated the typical 2FA scheme, which uses a one-time passcode (OTP) sent to email or via text, other, more advanced forms of 2FA, like using biometrics as a second factor, should be considered. Biometrics is increasingly being adopted and users are increasingly comfortable with it, thanks to its use in iPhones and by companies like MasterCard.
“Depending on the type of 2FA, in almost all cases it still relies on two factors: what you know and what you have,” Lori Cohen, CMO at Veridium, told Threatpost. Granted, Veridium is a biometrics specialist, but her point is well taken: “By relying on only what you know, you will always be susceptible to breaches. Alternatively, the two factors you should use are: what you have, including your phone and its unique certificate, and what you are: biometrics.”
It’s important to keep in mind that even with biometrics, 2FA is merely a best practice, noted Abrams. “Multiple researchers have demonstrated that fingerprint scanners on mobile phones can be defeated,” he told us.
That said, as with OTP phishing, the danger should be put into perspective.
“The reality is that the odds of someone getting ahold of your phone and having both the skill and the motivation to break in are exceedingly small,” he said. “Authentication needs to authenticate individuals as opposed to credentials, and that is where the landscape is heading.”
On Future 2FA Development
One Identity’s Evans said that given the seemingly increasing headlines about 2FA compromise, he expects to see an escalating technology war between vendors for the most secure approach – but “fixing” 2FA with a more difficult-to-defeat second factor may all be meaningless if the user experience isn’t right.
“For the authentication landscape, it means that vendors of the most secure authentication technologies will begin to make more noise about why their solution is better than anyone else’s,” he told us. “But in essence, seismic shifts in the way people log on to protected resources generally meet several obstacles.”
These include the fact that it’s expensive and difficult to implement bleeding edge technology and most organizations are not equipped to do it. But more importantly, it needs to be frictionless so that users will actually decide to use it.
“Users rebel against change and anything that makes their lives more difficult (even if it’s the right thing to do),” he said. “Adding more hoops for users to jump through in an effort to increase security is an invitation for users to avoid security altogether and find ways around your protections. So, the tone of the conversation will change – temporarily – but reality will quickly push security-conscious organizations to continue on the steady path they are already on.”
Meanwhile, Tim Helming, director of product management at DomainTools, took a more hopeful tone and told us that he has faith in well-resourced white-hats to keep winning the cat-and-mouse authentication game.
“Given the attacks we’re seeing, it is safe to assume that the major players such as Google, Apple, etc., are well aware of the state of things, and are at work on ever-better methods of security for various kinds of transactions,” he told us. “We have seen new technologies that are, to date, very successful at securing sensitive communications–Apple Pay is a good example.”
 
 
Source

Print this item

  Antifa admits trying to murder AfD's politician: 'We wanted to free him from fascist
Posted by: Bjyda - 01-12-2019 , 04:45 PM - Forum: Photo Albums, Images, & Videos - No Replies

https://youtu.be/F7dg-88ej00

Print this item

  Demand for cybersecurity first responders rises as salaries shoot up
Posted by: Bjyda - 01-12-2019 , 04:32 PM - Forum: Security News - No Replies

undefinedAs cybersecurity’s importance grows among organizations, a new role that has emerged and is in demand across technology companies is that of cybersecurity first responders (CFR), who are increasingly being hired at junior and mid levels, according to HR experts. 

These professionals are the first line of defence when an organisation is under a cyber attack. Along with that they are responsible for defending organisations from potential cyber attacks as well as investigate these when they happen.

Experts tracking the space say there are certified courses available to become a CFR. Just like how fire drills are performed in organizations, CFRs are trained in how to safeguard systems when under cyber attack, elaborate the experts.

Industry experts say, CFRs are the most skilled professionals at the moment. Global in-house centres (GICs) and other IT consulting companies are hiring CFRs at junior to mid-levels with two years of experience for an average salary of around Rs 15 lakh. Professionals with 2-3 years of experience draw upto Rs 20 lakh annually while someone with 5-8 years of experience is offered anywhere between Rs 35-40 lakh, annually. CISOs on the other hand now earn in excess of Rs 2 crore.

Experts say that cybersecurity professionals now seek 50-100% salary hike while the average salary hike a year ago was at 25%. Some of the top companies to hire cybersecurity roles include IBM India, InfosysDell India, HP India, Amazon India.

The other job roles that are in demand in the cybersecurity sector are that of network security engineers, cybersecurity analysts, security architects and chief information security officer (CISO). “IT firms largely hired CISOs in the first wave of cybersecurity hiring 2-3 years ago. This was followed by private BFSI firms recruiting or dedicating CISO roles, then public sector banks came into the picture. In 2018 we have seen non-IT, BFSI companies (FMCG, pharma, retail, manufacturing) recruiting CISOs along with a new demand for CFRs,” says Kamal Kanth, co-founder of HR consulting firm Xpheno. 

A PWC report said that over 80% companies now have a CISO in the management team.

“There are many shifts which are happening on the cybersecurity front like the formalisation of the CISO role which is seen across all industries. Also, CISOs now directly report to boards instead of CIOs,” said Anil Bhasin, VP India & SAARC - Palo Alto Networks. Talking to ETTech, Vishal Salvi, CISO at Infosys, said, “The cyber security industry has been growing much faster than the IT industry. However, one important trend that we see is that clients are facing a major shortage of highly skilled trained people who solve such security challenges.” These industry insiders sayd cybersecurity professionals are hired at nearly 100% hike these days.

“Overall, the cybersecurity space in India has been gaining momentum with the growth of startups, in-house cybersecurity operations and IT services which are expanding their offerings in the space. These companies are reporting a growth of 50-60% in their revenues from this segment. This is why they are expanding their hiring at campus placements and mid-levels, “ says Rama Vedashree, chief executive officer at Data Security Council of India.

As per, It industry body, Nasscom, Data Security Council of India & PwC Report the cyber security market in India has been projected to be $35 billion by 2025. Currently, more than 30,000 cybersecurity jobs are available, say the HR experts. Job portal Indeed reported a spike of 150 percent in cyber security roles between January 2017 and March 2018.

Apart from this, the other jobs that are among the top include data scientists, artificial intelligence engineers, cloud architects along with cybersecurity experts. Cybersecurity experts saw an average salary of around Rs 22-32 lakhs, according to a report by edtech firm Simplilearn.

For : tech.economictimes.indiatimes.com

Print this item

  Is Windows Defender actually heavier than other Antivirus?
Posted by: tarekma7 - 01-12-2019 , 12:21 PM - Forum: Video Reviews - No Replies

Print this item

  AutoClose Pro 2.2[PC]
Posted by: ahmed - 01-12-2019 , 09:02 AM - Forum: Giveaway of the day - Replies (3)

[Image: Xn4cGfx.jpg]

About:
AutoClose is a handy Windows automation tool that gives you the power to specify how and when to close the running programs on your system. With AutoClose you get the choice to decide if you want to shut down, log off, hibernate or reboot your computer. It can support multiple tasks at a time and enable you to end background tasks effectively. This software truly gives you the peace of mind you need.

Home:
https://autoclose.net/

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10 & Server (x32/x64)



GP:
https://www.giveawayoftheday.com/autoclose-pro/#
OR
Direct:
https://www.giveawayoftheday.com/downloa...244d2237f9
OR
License.Terms etc:

Print this item

  Mermaid Adventures: The Frozen Time
Posted by: ahmed - 01-12-2019 , 09:01 AM - Forum: Game Giveaway of the Day - No Replies

[Image: 2HShyJi.jpg]

About:
Exclusive offer from Giveaway of the Day and MyPlayCity! No third-party advertising and browser add-ons!

Once again, the underwater kingdom is in turmoil, thanks to the mischievous machinations of the evil octopus! The octopus and his servants have begun playing cruel tricks on the inhabitants of the undersea world, leaving a trail of frustration and strife in their wake. Now it is up to the brave mermaid, Alice and her equally courageous friends to restore order and happiness to the ocean!

[Image: DvlWEP4.jpg]


GP:
https://game.giveawayoftheday.com/mermai...ozen-time/#
OR
Direct:
https://game.giveawayoftheday.com/downlo...0978974b7c

System Requirements:
Windows XP/ Vista/ 7/ 8/ 10; Processor: 1.6 GHz; Memory: 512 MB RAM; Graphics: 512; DirectX: Version 9.0; Storage: 80 MB available space

Print this item