Two Easy Ways To Breach Company Networks

Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and even information technology.  All of the companies were breached with little difficulty.  The two easiest methods of unauthorized network access were not terribly surprising:  Wi-Fi networks, and company employees.

Continue Reading →
0

Preventing the Next VPN Filter Bot-Net Attack

Back on May 30, 2018 the FBI asked us all to reboot our Internet access devices, the cable and DSL modems that allow most of us to use the Internet.  Supposedly, this would remove the VPN Filter malware, if our router was infected.  This was not exactly the truth.  The FBI had taken over the “toknowall” command and control server for ...

Continue Reading →
0

Best Web Browsers for Private or Anonymous Browsing part 2

In our last post we kicked off a review of web browsers and other services that provide improved security, privacy protection, and anonymity when traveling on the web.  Today we wrap up our report.  The last three items in our list are not technically a browser, but provide unique solutions to privacy and anonymity that we thought were worthy of inclusion..

Continue Reading →

0

Best Web Browsers for Private or Anonymous Browsing part 1

There has been a lot of new information about secure web browsing crossing my desktop lately.  Back in May, we wrote a series of articles about browser hacking and hijacking, which described in depth the dangers to our privacy and anonymity that we face when we are casually web browsing.  In this article we are going to be looking at secure ...

Continue Reading →
0

Tomorrow is System Administrator Appreciation Day

July 27, 2018 – 19th Annual

Your network is secure, your computer is up and running, and your printer is jam-free. Why? Because you’ve got an awesome sysadmin (or maybe a whole IT department) keeping your business up and running. So say IT loud; say IT proud …

Happy SysAdmin Day!

Wait… what exactly is SysAdmin Day? Oh, it’s only the single greatest 24 hours on the planet… and pretty much the most important holiday of the year. It’s also ...

Continue Reading →
0

How to Read Your Credit Report

Since the Equifax breach, we have all become painfully aware that our personal credit information is in the wild.  Identity theft is something that could happen to any of us.  Even the FBI, in a recently released report, says, “Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen.”

There is little any of us can do about the information disclosures ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NCCIC Webinar Series on Russian Government Cyber Activity

07/19/2018 05:08 PM EDT   Original release date: July 19, 2018

NCCIC will conduct a series of webinars on Russian government cyber activity against critical infrastructure (as detailed in NCCIC Alert TA18-074A), which will feature ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable to ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  Today ...

Continue Reading →
0

Securing Networking Infrastructure Against Global Threats

Just how secure are the servers, routers and other high end hardware that is running the global Internet?  This is a question posed in a pair of recent articles from US-CERT, the US Computer Emergency Readiness Team.

Because of the significant skills and capabilities of organized cyber-criminals, politically motivated hacker collectives, nation-state cyber armies and similar threat sources, operators of global network systems face ...

Continue Reading →
0
Page 1 of 43 12345...»