Microsoft
customers in Arizona were scammed by a BPO setup by fraudsters who’s executives
represented themselves as Microsoft employees and managed to convince them that
for a 300$ charge they would enhance the performance of their desktop
computers.&…
Three Must Do’s to make a Security Awareness Champion
Setting an
example is the best way to institutionalize security awareness within a
workplace or at home. Colleagues and children naturally follow examples set by
champions as it makes it easy to mimic rather than spend time to self-learn. I
found thre…
Swatting airports helpdesks diverts the attention of anti-terror forces on the Indian Republic Day
26th January,
the Indian Republic Day, was targeted by ISIS operatives to stage multiple
terror strikes designed to cause terror and panic in major Indian cities. The
Indian intelligence and police agencies over the last few weeks successfully
nabbed …
Cybercitizens, stay away from commenting or liking posts with terror ideologies
Of current
global concern is the ease at which terror organizations are able to use social
media to spread their ideology and coerce young people living in developed countries
to leave all and fight wars in hostile lands. Their success stems from thei…
Kali Linux 2016.1 Release – Rolling Edition
Our First Release of Kali-Rolling (2016.1)
Today marks an important milestone for us with the first public release of our Kali Linux rolling distribution. Kali switched to a rolling release model back when we hit version 2.0 (codename), however the rol…
ProSec Welcomes your Input
Please send us your comments! You can email them directly to Rob @ info@prosecalarm.com.The post ProSec Welcomes your Input first appeared on ProSec Integration, LLC.
Kali Moto End of Life & Kali Dojo Slides
Kali Sana Release Aftermath
Kali Linux 2.0 has been out for a couple of months and the response has been great, with well over a million unique downloads of Kali 2.0 as a testament. Release day was somewhat hectic for us, as we did not anticipate the s…
Should one fret over the leaked Ashley Madison data?
Several news
sites have reported that 15 GB of identity data stolen last month from
AshleyMadison.com online has been made available on the darknet. Three sites
have since sprung up with allows interested parties to query the site to
ascertain the …
8 steps to prevent a stolen phone from ruining you digital life
Smart phones
are lost because they were accidental forgotten at public places or stolen. A
phone today, is a cybercitizens gateway to their digital life. It allows use of
apps for services such as for banking, social networking and taxi booki…
Reliable Home Security On Fox News
Check us out on Fox31 Denver. Learn more about home security systems. Learn some tips to make your home more secure. Call today, get a free alarm quote! Fixes can be made for weak security points in homes http://t.co/KdLcaeeWfe via @KDVR — ReliableHome…