Privacy-pc - privacy-pc.com - Privacy PC

Latest News:

HitmanPro 3 review 26 Aug 2013 | 05:58 pm

$24.95 SurfRight HitmanPro 3 is a splendid malware cleanup utility that works where others may fail. Usability: ★★★★½ Features: ★★★★☆ Efficiency: ★★★★¾ Support: ★★★½☆ Overall: ★★★★¼ D...

The Anatomy of Social Engineering 5: The Reality and Defenses 26 Aug 2013 | 12:43 pm

This entry encompasses the summary of how effectively social engineering exploits the quirks, or flaws, of the human brain, and provides some defense advice. In reality… So, in reality these are jus...

The Anatomy of Social Engineering 4: Social Proof, Liking, Authority and Scarcity Flaws 24 Aug 2013 | 02:03 am

The article continues to describe psychological quirks of the human brain, now focusing on four more flaws that tend to spontaneously affect one’s behavior. 3. Social Proof The ‘social proof’ quirk ...

FBI MoneyPak Virus: “Your computer has been locked by the FBI” 23 Aug 2013 | 02:40 pm

An aggressive ransomware campaign involving the so-called FBI MoneyPak virus (Reveton Trojan, Citadel, Trojan.Ransomlock.R) has been reportedly hitting computer users since 2012 and still appears to s...

Remove FBI MoneyPak Virus if Safe Mode Doesn’t Work 23 Aug 2013 | 02:25 pm

Cyber criminals are constantly improving and refining their virus code; recent versions of this Trojan block Windows Safe Mode functions described in our previous post. In the article that follows we...

The Anatomy of Social Engineering 3: Reciprocity and Consistency Quirks 23 Aug 2013 | 12:32 am

This section covers some of the natural human quirks, namely reciprocity and consistency, and highlights how those can be used for social engineering. There have been other studies to find out quirks...

The Anatomy of Social Engineering 2: Evolutionary Triggers 22 Aug 2013 | 12:59 am

The key subject matter here is how exploiting evolutionary aspects naturally affects humans in terms of manipulative influence and social engineering proper. Ties to Evolution Effect of evolutionary...

The Anatomy of Social Engineering 20 Aug 2013 | 09:48 pm

Reflected herein is a study by the Florida State University researchers pertaining to the analysis of social engineering from a psychological perspective. We’re going to talk about social engineering...

The Modern History of Cyber Warfare 9: Cybersecurity Hurdles 16 Aug 2013 | 09:30 pm

The lecture wraps up with an overview of the principal policy hurdles for the West in terms of implementing proper cybersecurity now and in the future. Policy hurdles, according to Michael Nacht Now...

The Modern History of Cyber Warfare 8: A History of Legislature Failure 15 Aug 2013 | 03:02 am

This part encompasses a retrospective review of US laws and acts as well as pros and cons of current legislative proposals on the surveillance of cyberspace. Attempts to weaponize cryptography So, l...

Recently parsed news:

Recent searches: