Archive for November 2, 2012

Hitting back at cyberattackers: Experts discuss pros and cons

MIAMI — The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so?

Read the Rest of the Story from the Source

National cybersecurity effort launched to strengthen software infrastructure

Scientists at the Morgridge Institute for Research, the University of Wisconsin-Madison, Indiana University, and the University of Illinois at Urbana-Champaign have received a $23.6 million grant as part of a Broad Agency Announcement (BAA 11-02) by University of Wisconsin-Madison

Click here to visit the original source of this post

Schemes that freeze computers turn fake emails into cash

This is a computer virus affecting consumers in the metro area and around the region. The fake message (not really from the FBI) goes on to explain that the user’s Internet address was associated with an illegal online activity. It claims the computer

If you get infected with this type of “Ransomware”, shutdown your computer and call your favorite Computer Guy. Or if you know how to do a system recovery and do that and restore your computer to the most recent date prior to the infection, yesterday for example.

Practice Safe Computing!

Joe

Click here to visit the original source of this post