Citizens First Cyber Security Professionals cfcspro.com

Login

Username

Password



Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

Connect via Facebook

Connect via Facebook

Member Poll

There are no polls defined.

Shoutbox

You must login to post a message.

02-12-2017 12:08
Yo' Citizens, How you doing today. Todays Lesson plans & post will consist of, How to give spammers a taste of their own medicine! Cool

20-10-2017 11:38
Yo' Citizens, As per your request. A new forum section, 'Suspicious IP Addresses' will be completed today! Cool

20-10-2017 11:30
Yo' Good Morning Citizens. I hope that you are all having a great and cyber-secure day! Grin

09-10-2017 11:10
Yo' Good Morning Citizens! Wink I hope that you had a cyber-secure weekend! Grin

03-10-2017 10:44
Yo' Citizens, good morning. I have some pretty serious vulnerabilities to share with you, today. I will have them up shortly! Cool

Welcome Citizens

Welcome to, Citizens First Cyber Security Professionals.

The Individual Citizen Specific, Cyber Security Investigative Services Firm. Cyber Security Web Forum and Educational Cyber Security Dojo.

Geared strictly to helping Individual Citizens and Small Businesses! Address unwanted cyber security intrusions and hacking incidents!

Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2 - Via - TheHackerNews

SecurityYo' Greetings Citizens,

Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2 - Via - TheHackerNews

A security researcher has identified a new strain of malware that also spreads itself by exploiting flaws in Windows SMB file sharing protocol, but unlike the WannaCry Ransomware that uses only two leaked NSA hacking tools, it exploits all the seven.

Last week, we warned you about multiple hacking groups exploiting leaked NSA hacking tools, but almost all of them were making use of only two tools: EternalBlue and DoublePulsar.

Now, Miroslav Stampar, a security researcher who created famous 'sqlmap' tool and now a member of the Croatian Government CERT, has discovered a new network worm, dubbed EternalRocks, which is more dangerous than WannaCry and has no kill-switch in it!!!

Unlike WannaCry..++......

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution - Via - ThreatPost

BugsYo' Greetings Citizens,

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution - Via - ThreatPost

A proof of concept attack using malicious video subtitle files reveals how adversaries can execute remote code on PCs, Smart TVs and mobile devices using popular video players and services such as VLC Media Player, Kodi, Stremio and Popcorn Time.

“This is a brand new attack vector.....

FREE WannaCry Ransomware Decryption Tools Now Available - Via - HackersOnlineClub

NewsYo' Greetings Citizens,

WannaCry Ransomware Decryption Tools Now Available - Via - HackersOnlineClub

WannaCry Ransomware Decryption Tools Now Available..

There are two WannaCry Ransomware decryption Tools launched. Now no need to Pay in Bitcoin, get all yours files back without paying Ransom!.....

WannaCry Ransomware Infects the World - Threat Wire

NewsYo' Greetings Citizens,

WannaCry Ransomware Infects the World - Threat Wire

Everything we know so far about WannaCrypt or WannaCry, Microsoft criticizes gov’t agencies, a keylogger is found on HP machines, and Trump’s new cybersecurity measures. All that coming up now on Threat Wire....

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure - Via - whitehouse.gov

NewsYo' Greetings Citizens,

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure - Via - whitehouse.gov

The White House
Office of the Press Secretary
For Immediate Release
May 11, 2017

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

EXECUTIVE ORDER

- - - - - - -

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE


By the authority vested in me as President by the Constitution and the laws of the United States of America, and to protect American innovation and values, it is hereby ordered as follows:

Section 1. Cybersecurity of Federal Networks.

(a) Policy. The executive branch operates its information technology (IT) on behalf of the American people.....

Microsoft Issues Emergency Patch For Critical RCE in Windows Malware Scanner - Via - TheHackerNews

SecurityYo' Greetings Citizens,

Microsoft Issues Emergency Patch For Critical RCE in Windows Malware Scanner - Via - TheHackerNews

Microsoft's own antivirus software made Windows 7, 8.1, RT and 10 computers, as well as Windows Server 2016 more vulnerable.

Microsoft has just released an out-of-band security update to patch the crazy bad bug discovered by a pair of Google Project Zero researchers over the weekend.

Security researchers....

Highly Advanced Pegasus Mobile Spyware Found By Security Researchers. - Via - hackersonlineclub

SecurityYo' Greetings Citizens,

Highly Advanced Pegasus Mobile Spyware Found By Security Researchers. - Via - hackersonlineclub

Google and Lookout Security researchers working on Pegasus Malware also known as Chrysaor. This mobile Spyware developed by Israeli surveillance company NSO.

Developed for iOS and Android mobiles.
It can record Whatsapp messages and calls.
It can Spy on Social Networking sites like Facebook, Twitter
It can capture logs from Skype and Gmail.
It can take screenshots and control Microphone and Camera.


By looking above features of Pegasus Malware, its look more dangerous. Pegasus is capable of reading text messages, track calls,.....

Microsoft Finally Reveals What Data Windows 10 Collects From Your PC - Via - THN

WindowsYo' Greetings Citizens,

Microsoft Finally Reveals What Data Windows 10 Collects From Your PC - Via - THN The Hacker News

Since the launch of Windows 10, there has been widespread concern about its data collection practices, mostly because Microsoft has been very secretive about the telemetry data it collects.

Now, this is going to be changed, as Microsoft wants to be more transparent on its diagnostics data collection practices.

Till now there are three options (Basic, Enhanced, Full) for Windows 10 users to select from under its diagnostics data collection section, with no option for users to opt out of sending their data to Microsoft.....

To VPN or Not To VPN? Threat Wire.

NewsYo' Greetings Citizens,

To VPN or Not To VPN? Threat Wire. Published on Apr 4, 2017

Do you use a VPN?

ATMs are being hacked, again,.....

Three privacy tools that block your Internet provider from tracking you - Via - PCWorld

SecurityYo' Greetings Citizens,

Three privacy tools that block your Internet provider from tracking you - Via - PCWorld

The government may soon allow your ISP to sell your browsing data. Here's how to fight back.


It’s on. Recently, the United States Senate saw fit to allow Internet Service Providers to sell your web browsing history and other data to third parties. The action has yet to pass the House, but if it does, it means anyone concerned about privacy will have to protect themselves against over zealous data collection from their ISP.

Some privacy-conscious folks are already doing that—but many aren’t. If you want to keep your ISP from looking over your shoulder for data to sell to advertisers, here are three relatively simple actions you can take to get started....

The New Frontier For Hackers: Smart TVs - VIA - INQUISITR

SecurityYo' Greetings Citizens,

The New Frontier For Hackers: Smart TVs - VIA - INQUISITR


Smart TVs are lacking the fundamental security features compared to more established devices like smartphones and computers, The International Business Times reports. This makes them more vulnerable to cyber attacks. Televisions and PCs have their share of cyber attacks as well, but unlike televisions and PCs, a cyber attack on a smart TV will not be as detectable and perhaps, not as preventable.

The main difference in security between smart TVs and other devices is that they don’t require authentication to obtain access. This becomes a huge problem in the business world, especially because smart TVs are commonly used in business board rooms....

Windows 10: DoubleAgent zero-day hijacks Microsoft tool to turn antivirus into malware - Via - ZDNet

WindowsYo Greetings Citizens,

Windows 10: DoubleAgent zero-day hijacks Microsoft tool to turn antivirus into malware - Via - ZDNet

Microsoft's Application Verifier tool can be used by attackers to grab control of antivirus software, researchers say....

Hackers Threaten to Remotely Wipe 300 Million iPhones Unless Apple Pays Ransom - Via - TheHackerNews

SecurityYo' Greetings Citizens,

Hackers Threaten to Remotely Wipe 300 Million iPhones Unless Apple Pays Ransom -Via - TheHackerNews - Tuesday, March 21, 2017 Mohit Kumar

hacking-apple-icloud-account
If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th.


It has been found that a mischievous group of hackers claiming to have access to over 300 million iCloud accounts is threatening Apple to remotely wipe data from those millions of Apple devices unless Apple pays....

Google Points to Another POS Vendor Breach VIA - Krebsonsecurity

SecurityYo' Greetings Citizens,

Google Points to Another POS Vendor Breach VIA - Krebsonsecurity

For the second time
in the past nine months, Google has inadvertently but nonetheless correctly helped to identify the source of a large credit card breach — by assigning a “This site may be hacked” warning beneath the search results for the Web site of a victimized merchant.....

Beware; 36 Android Devices Shipped with Preinstalled Malware! - Via - HACKREAD

BugsYo' Greetings Citizens,

Beware; 36 Android Devices Shipped with Preinstalled Malware! - Via - HACKREAD


Android devices have remained the center of attraction for malicious cyber criminals since forever. Not only do they churn out fake, infected apps one after another but also devise ways to exploit Android devices. The reason is quite evident; since Android devices are among the most commonly preferred mobile phone choices, therefore, cyber-criminals attack them often to claim a higher number of victims.

The latest news regarding Android devices is that.....
top image scrolling tools
facebook_share
twitter_share
google_share
linkedin_share
blogger_share
delicious_share
scrolltop
Render time: 0.09 seconds
256,161 unique visits