I have used all three.
My analysis: Linux = fun, Windows = practical, Apple = toy. Sorry Apple fans.Continue Reading →
As we have discussed in previous posts, the benefits of 2FA are that your account cannot be breached with only a stolen password. In addition to the password, a one-time passcode is required to ...Continue Reading →
If you are an Apple user, Apple released a number of updates released late in January that will fix security vulnerabilities in several platforms and services. It was reported by US-CERT on January 23rd.
The release for Mac OSX Sierra is large, at 105 GB, and fixes many holes that would allow and attacker to remotely execute malware. This is something you should fix immediately.
The ...Continue Reading →
The Apple OSX platform has long held the cache of being invulnerable to attack. Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012. The reason for this, as explored in a recent article on SiliconBeat, is that Apple users tend to have more disposable income. If you willingly pay more to have “the best” or most ...Continue Reading →
Mobile smart devices have all the capabilities of a laptop or computer. What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer. The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing information.
In ...Continue Reading →
As we all know, Apple refused to assist the FBI in cracking the iPhone 5c of the San Bernardino “terrorist” killers. The FBI took Apple to court. Then the FBI dropped the case after successfully hacking the phone. Then they successfully hacked another phone in a different case in New York. Information appeared linking Israeli mobile security firm Cellebrite to the successful breach of ...Continue Reading →
Some of the nastiest exploits going around are the many variants of the CryptoLocker and CryptoWall malware that encrypt all your personal files and hold them for ransom. Payment in bitcoin is required, in amounts starting at $200 and ranging upward to the $17,000 (400 BTC) that Hollywood Presbyterian Hospital just paid to unlock their files. Or even more. The amount will be whatever the attackers think they can extract from the victim.
Yes you are reading the headline correctly, and no I am not out of my mind. The current crop of Microsoft products including the Windows 7, 8.1, and 10 operating systems are some of the best products in their class from a cybersecurity standpoint. This is according to a recent article in the New York Times, as well as from Microsoft’s new ...Continue Reading →
In the last couple of weeks we have read about two new security issues with Apple’s OSX operating system. The first was about a new threat named “CORED” or “XARA” (for Cross-App Resource Access). In this exploit a rogue app on the App Store could use the elevated privileges of another installed app to execute malicious code at a higher level ...Continue Reading →