Two Easy Ways To Breach Company Networks

Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and even information technology.  All of the companies were breached with little difficulty.  The two easiest methods of unauthorized network access were not terribly surprising:  Wi-Fi networks, and company employees.

Continue Reading →
0

Multi-Platform Malware

This comes under the heading of “it was inevitable.”  There is a new malware product that runs effectively on both Windows and Linux systems.  Since OSx looks a lot like Linux under the hood, can a Win/Lin/Mac triple-threat be far away?  Called “WellMess,” this malware takes advantage of the dual platform capabilities of Google’s Golang programming language to work.

WellMess malware operates on ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Back-to-School Cyber Safety

08/10/2018 08:25 AM EDT  

Original release date: August 10, 2018

As summer break ends, many students will return to school with mobile devices, such as smart phones, tablets, and laptops. Although these devices can help students with their schoolwork and stay in touch with family and friends, there are risks associated with using them. However, there ...

Continue Reading →
0

Six Simple Malware Removal Tips Anyone Can Use

You think you just got a malware infection on your computer, but you’re not sure, and you aren’t sure what to do.  Take it to the Geek Squad or another qualified IT shop?  If only there were simple things you could try on your own.  The good news is there are, and we will show you some of them today.

  • So it seems you might have a malware issue.  These are my ...
Continue Reading →
0

Ten Signs of a Malware Infection

I just finished helping a client with a strange issue that I thought might be malware related, and we successfully fixed his issue by email, without having to meet or even set up a remote support session.  And it occurred to me that I have not covered the issue of malware remediation in ages.  Since this can be a fairly easy DIY project for most computer users, I thought a fresh ...

Continue Reading →
0

Preventing the Next VPN Filter Bot-Net Attack

Back on May 30, 2018 the FBI asked us all to reboot our Internet access devices, the cable and DSL modems that allow most of us to use the Internet.  Supposedly, this would remove the VPN Filter malware, if our router was infected.  This was not exactly the truth.  The FBI had taken over the “toknowall” command and control server for ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Windows 10 security can be bypassed by Settings page weakness

The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.


Here are the 4 best ways to train employees for better cybersecurity

87% of companies experienced an ...

Continue Reading →
0
Page 1 of 136 12345...»