Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
4 new cybersecurity threats in 2019 |
Posted by: Herran - 10-29-2019 , 11:46 AM - Forum: Security News
- No Replies
|
|
Quote:Cybersecurity threats continue to evolve, and the nature and sophistication of attacks vary widely. With more businesses moving their files to the cloud, health care organizations shifting to electronic records, and consumers making financial transactions online, you can be sure that malicious hackers aren’t far away.
The Center for Internet Security, an independent non-profit that’s building a global IT community to secure organizations against cyberthreats, has a sobering cybersecurity assessment for 2019. It says its current alert level is “guarded” because of “vulnerabilities in Google, Adobe, and Oracle products.” In particular, it says there is great concern over “multiple vulnerabilities in Google Chrome.”
1. Cryptojacking: Your machines make their money
Cryptojacking is a form of malware that’s designed to mine cryptocurrency on your system without your knowledge—and without you receiving any of the monetary benefits. It’s far more common than you might think; in one high-profile case, superstar footballer Cristiano Ronaldo’s site was planted with the malicious software. Plus, it’s designed to be subtle, so you might go months without actually detecting that you’ve fallen victim to it.
2. Phishing: A daily deluge of fake emails
Phishing attacks are a hacker mainstay and they aren’t going out of style anytime soon. For context, consider this: The U.S. Department of Defense thwarts nearly 36 million emails containing malware, viruses, and phishing schemes every single day. That’s more than a billion each month.
3. The use of artificial intelligence and machine learning
The term “cyberarmy” may conjure images of state-sponsored hackers working together to inflict distributed denial of service (DDoS) attacks on enemy infrastructure, but the fact is that new threats are increasingly dictated by artificial intelligence. Hackers are, quite literally, transferring their knowledge to computers for the aim of scaling the size and sophistication of intrusion attempts.
4. Political moves: Hacking by governments
To say that the world is divided right now might be a bit of an understatement.
With the U.S.-China trade war, the usual battle cries from North Korea and Iran, and peace in the Middle East a far-flung dream, it’s likely that national governments will turn to their cyberarmies for more hacking and intrusion attempts.
Government data breaches are a real thing, with the Stuxnet worm that affected Iranian nuclear facilities considered to be one of the most sophisticated of its type. But government-backed hackers won’t just attack rival government installations. A recent cyberattack against Airbus was attributed to Chinese hackers, a claim Beijing strenuously denied.
Full read : https://www.expressvpn.com/blog/4-new-cy...s-in-2019/
|
|
|
Microsoft says: Russian Hackers Are Targeting the Olympics |
Posted by: sidemoon - 10-29-2019 , 11:04 AM - Forum: Security News
- No Replies
|
|
"Russian hackers in a group known as Strontium are targeting sporting organizations and anti-doping authorities in the lead-up to the 2020 Summer Olympic Games in Tokyo, Japan, according to Microsoft.
Strontium, also known as Party Bear or APT28, often uses false Microsoft domains to execute their attacks. They use methods such as spear-phishing, in which they send fake emails that appear to be from a trusted souce. Password spraying [attempting to use multiple common passwords to infiltrate accounts], exploiting weaknesses in firmware and the spreading of malware have also been employed."
Read more here:
https://www.newsweek.com/hacking-olympic...rs-1468275
|
|
|
krAsAvA Shot [PC Game] |
Posted by: ahmed - 10-28-2019 , 09:26 AM - Forum: Game Giveaway of the Day
- No Replies
|
|
2079 planet Earth. Together with the spacecraft conducting the expedition on Mars, the earth gets an unknown virus.
Almost the entire population of the planet exposed to infection and mutated into zombies.
But still people who were lucky enough to stay alive. In the game krasava shot you have to survive among the humans and zombies. The game will please you its nice graphics and music.
In online mode there is a chat for communication that does game even more interesting. Only a clever and skillful can survive in this environment. Check yourself, can you stand up to the end and be the best? Good luck, soldier.
The game has a cooperative mode, in one room can fight up to 10 people. In a single company you have to fight with crowds of zombies, look for weapons in boxes, break the furniture in the houses break everything!
You are available for this 5 types of weapons, choose to taste?
Controls: WASD-walking, [1]/[2] ]/[3] ]/[4] - change weapons.
Reload-R, Raise weapon -F
Peculiar properties:
- nice graphics;
- simple operation;
- interesting gameplay;
- light music;
- unforgettable adventure;
- available in 2 languages.
GP:
https://game.giveawayoftheday.com/krasava-shot/
Almost the entire population of the planet exposed to infection and mutated into zombies.
But still people who were lucky enough to stay alive. In the game krasava shot you have to survive among the humans and zombies. The game will please you its nice graphics and music.
In online mode there is a chat for communication that does game even more interesting. Only a clever and skillful can survive in this environment. Check yourself, can you stand up to the end and be the best? Good luck, soldier.
The game has a cooperative mode, in one room can fight up to 10 people. In a single company you have to fight with crowds of zombies, look for weapons in boxes, break the furniture in the houses break everything!
You are available for this 5 types of weapons, choose to taste?
Controls: WASD-walking, [1]/[2] ]/[3] ]/[4] - change weapons.
Reload-R, Raise weapon -F
Peculiar properties:
- nice graphics;
- simple operation;
- interesting gameplay;
- light music;
- unforgettable adventure;
- available in 2 languages.
|
|
|
Vovsoft Read Mode 1.6 [PC] |
Posted by: ahmed - 10-27-2019 , 01:44 PM - Forum: External Giveaways/Freebies
- Replies (1)
|
|
Make long chunks of text easier to read.
Read Mode makes blog posts, articles and webpages clean and easy to read. Paste them to Read Mode to read. You can configure the software with 3 options: Light, Dark and Sephia. You can also print the text. Read Mode adjusts the document according to the screen size. It makes long chunks of text easier to read. All you need to do is to copy any text and paste into Read Mode software.
GP:
https://sharewareonsale.com/s/free-read-...0-discount
OR
Download(Registration built-in)
http://downloads.sharewareonsale.com/fil...d_Mode.exe
Note:
The download link for Read Mode is given to you above. The download is a SharewareOnSale exclusive installer with registration built-in. Download and install Read Mode. After install, run Read Mode and enjoy! There is no need to register it, because we register it for you automatically when you download from us.
Terms and Conditions: - This is a 1-computer lifetime license, for noncommercial use
- No free updates; if you update the giveaway, it may become unregistered
- No free tech support
- You must redeem download and install the program before this offer has ended
- May not be resold
Technical Details:- Developed by Vovsoft
- Version is v1.6
- Download size is 1.64 MB
- Supports Windows XP, Vista, 7, 8/8.1, and 10 (32-bit and 64-bit)
(7 Days Giveaway!)
|
|
|
JixiPix Happy Holidaze-PC & Mac [Software for Hobbyists & Enthusiasts] |
Posted by: ahmed - 10-26-2019 , 08:41 PM - Forum: External Giveaways/Freebies
- Replies (2)
|
|
Create Holiday Greetings with Hand Painted Embellishments
Ah, the holidays. That great time of year for reaching out to loved ones, friends, family, or even acquaintances. And one of the best ways to reach out is with a holiday greeting. Happy Holidaze is here to help your creative juices flow and make getting in touch with those we care about that much easier and fun.
Happy Holidaze, in typical JixiPix fashion, is all about adding creative touches to your holiday cheer. Start out by antiquing your photo, choose a festive background pattern, and embellish it with incredible pieces of art—all hand painted—to make your photo design fun, elegant, and cheerful.
Talk about a quick and fun way to add some festive glow to your family portrait, thanksgiving dinner, or vacation photos.
The best part is you can start your holiday greeting by choosing one of the many presets to get started, get your creativity flowing, or just to get an idea of the fun designs possible with Happy Holidaze—and every element used in the preset can be adjusted for a customized style.
As always with JixiPix apps you have complete control of your design, ability to save the design as a preset, the ability to undo, and of course tweak all aspects to get that perfect look. And of course we expect you to be able to get these great designs printed. So bypass those ‘other’ apps that can only be saved for ‘web’ quality output, because everything in our app can be saved in high resolution.
GP:
https://sites.fastspring.com/jixipix/pro...ction=adds
Coupon Code:
|
|
|
How NordVPN will become more secure than ever |
Posted by: Herran - 10-26-2019 , 12:15 PM - Forum: Software Discussion
- No Replies
|
|
Quote:We recently reported an incident involving NordVPN and a third-party datacenter. We’re deeply sorry for letting that mistake happen, but that’s not what this post is about. This is about explaining what we’re going to do to take our security to the next level and make sure nothing like that ever happens again.
1. Partnership with a top cybersec and penetration test consulting firm
Penetration testers are a key part of our security efforts. Their job is to prod our infrastructure for weaknesses and find them before anybody else does. That’s why we’re negotiating a strategic partnership with a leading US cybersecurity consulting firm.
The firm would work with our in-house team of penetration testers to challenge our infrastructure and ensure the security of our customers with:- Comprehensive penetration testing;
- Intrusion handling;
- Vendor risk assessment;
- Source code analysis.
We are currently discussing the details with several candidates and plan to make a public announcement next week.
2. Bug bounty program
Our job is to anticipate and prevent bugs before they ever go live. If one does slip past us, the next best line of defense is a vigilant and engaged cybersec community prepared to help catch and fix it before it puts anyone at risk.
Over the next two weeks, will will introduce a bug bounty program. Bug bounties reward cybersecurity experts for catching potential vulnerabilities and reporting them to us so we can fix them. Bounty hunters get a well-earned payout, and NordVPN users get a service they know is scoured for bugs by thousands of people every day to make it as secure as possible.
3. Infrastructure security audit
We are setting the groundwork for a full-scale third-party independent security audit in 2020. More information is forthcoming as we work out the details, but we will keep the public notified.
This will include and may not be limited to:
- Infrastructure hardware;
- VPN software;
- Backend architecture;
- Backend source code;
- Internal procedures.
- 4. Vendor security assessment and higher security standards
Right now, the majority of the datacenters we work with meet or exceed numerous stringent security standards. As we continue to review our infrastructure, however, we will hold the datacenters we work with to even higher standards than before.
At the same time, we will also begin to build a network of collocated servers. While still located in a datacenter, collocated servers are wholly owned exclusively by NordVPN. A breach caused by a vulnerability left by a third-party server provider would be impossible.
- 5. Diskless servers
We are preparing a plan to upgrade our entire infrastructure (currently featuring over 5300 servers) to [b]RAM servers. These will allow us to create a centrally controlled network where nothing is stored locally. In fact, they won’t even have an operating system stored locally. Everything they need to run will be provided by NordVPN’s secure central infrastructure. If you seize one of these servers, you’re seizing an empty piece of hardware with no data or[/b]
- Our promise
Nothing like this should have ever been possible and we apologize that it was. However, we’ve learned our lesson and we want to prove it to you with actions, not just words.
The changes we’ve outlined here will be seen and felt every time you use our service. Every part of NordVPN will become faster, stronger and more secure – from our infrastructure and code to our teams and our partners.
We can’t promise 100% immunity – no one can. What we can promise is that we have taken this incident to heart and will do everything we can to improve and to win back your trust. [b]We will come back from this even stronger – we owe it to you.[/b]
Source : https://nordvpn.com/blog/security-plan/
|
|
|
|