A court ruling means that Yahoo! and its parent company, Verizon, could end paying a heavy price for the huge breaches that saw more than 1 billion people’s details compromised.
The Sophos Naked security blog ran an article in August that was a disappointing revelation about major online brands that allow ridiculously easy user passwords. Just because a web site will permit you to use a bad password, doesn’t mean you should. Our current recommendation is to use passwords of at least 15 characters, and couple that with two-factor authentication at every opportunity.
The password management program Dashlane performed an audit of 37 online brands and rated their ...Continue Reading →
Joule U . CRAM DAY
Tuesday . September 26 2017
SIX 60 MINUTE CLASSES
Learn something new! Attend one, some or all.
My presentation, Shields Up for WordPress Websites and Blogs is from 2:30 to 3:30.
I know many of the other speakers and this looks like a terrific lineup. Block out the day and get some valuable information you can ...Continue Reading →
Two-factor and multi-factor authentication are becoming more important and more available as we struggle to secure our information from attackers. These factors are something you know, something you have, and something you are. Biometrics (something you are) are one of the three factors used in computer, network, and application authentication.
Biometrics include thumbprint or fingerprint readers, palm scanners, iris and retinal scanners, facial recognition, speech recognition, and even arcane systems that detect ...Continue Reading →
Is your email address one of the 711 million emails that are being used by the Onliner spam-bot? I checked my email address at Have I Been Pwned and found it on the list. You can click through the link and see if yours is on the Onliner list, or part of some other breach.
Onliner is ...Continue Reading →
Rail fans, this story from the Smithsonian Magazine is a great yarn about how a marketing stunt gone wrong turned out to be one of the great railroad marketing schemes of all time.
George Crush had two steam locomotives crash into each other at 50 miles per hour, while 40,000 spectators watched. What could possibly go wrong? Read the full story at the link above.
We will start with the good stuff for a change. Talk Like A Pirate Day is my second favorite unofficial Holiday. Check out the official website. Check out the cool pirate swag and order yourself a pirate hoodie or tee shirt.
Continue Reading →
WireX is a new botnet that runs on hijacked and compromised Android phones. A bot-net is a collection of compromised devices that can be coordinated by the hijacker to work together on a certain task. It might be bit-coin mining, or password cracking, or other tasks that require a lot of processing power. This bot-net, like last year’s Mirai and ...Continue Reading →
Last Friday we covered some of the security issues travelers can face when staying at a hotel. Today we are going to look at air travel – specifically the bad things that can happen to you if you carelessly discard or foolishly post a picture online of your airline boarding pass.
For some reason, people like to post images of their boarding passes on ...Continue Reading →