Mobile Security Tips

smartphone-securityAs we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important.  Smartphones, tablets, wearable tech,  and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off.  When these devices are stolen, you lose much more than the hardware.  Every bit of information on the device is up for grabs too, from contact lists, personal information, mobile ...

Continue Reading →
0

NIST Recommends New Password Rules

NISTThe National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well.  Still in draft from, the standards can be found on the document Special Publication 800-63-3: Digital Authentication Guidelines.   Here are some of the recommended changes, so far.  We approve, and in many cases have been ...

Continue Reading →
0

US-CERT Advises Election Officials To Secure Voter Data

US-CERTAnother out of cycle post, this one directed to anyone who is running balloting operations for the upcoming elections.  I make jokes all the time about our next president being elected by the Russian Cyber Army,  the Chinese Peoples Liberation Army Unit 61398, the ISIS Cyber Caliphate, or the Syrian Electronic Army.  But this is a ...

Continue Reading →
0

FBI Asks Ransomware Victims to Report Infections

ic3The rare Tuesday post.  I got an announcement from the FBI on Friday that I thought was important enough to share that I am squeezing into to my regular publishing schedule on what is typically an off-day. Anyway, now is your chance to stick it to the criminals who have been distributing Locky, CryptoWall, CryptoLocker and other ransomware exploits.  If you or your business has been victimized by ...

Continue Reading →
0

What Is Your Data Worth?

penetration_test_436x270When you lose your login credentials to an online account, it can be devastating.  Depending on what was compromised and what was lost, you may have an expensive and time-consuming task on your hands.  So the bad guys took your user ID and password, or some other personal information.  Was it worth it?  There is an active resale market for this information, and some ...

Continue Reading →
0

100 Things Facebook Knows About You

facebookI read about this on Naked Security, and popped over to the Washington Post to read the full story and list.  I knew this was happening, but it is freaky to see the entire list.  Facebook collects this information to deliver ads that are targeted at your interests and preferences.  If it seems that some of the ads that show up in your feed are weirdly right on ...

Continue Reading →
0

Beware of Facebook Scams

facebookEverybody, it seems, is on Facebook, and the numbers back it up, with over 1 billion members worldwide.  So naturally, anytime you get a crowd of people this large, the cyber-criminals are going to be all over it.

Don’t even get me started with the oversharing of personal information.  Please stop telling me and the crooks that you will be out of town for a week on a Vegas vacation, and your house ...

Continue Reading →
0

BEC – How Cyber-Attackers Can Rip Off Your Company

ic3We warned our readers about the FBI alert regarding the Business Email Compromise scam on July 6.  Cyber-criminals have successfully bilked US companies of over 3 billion dollars since January 2015.  Typically this exploit starts by the attacker gaining knowledge of the CEO’s or other highly placed executive’s user credentials to their email account.  This is most often done using a spearphishing email, but could also be accomplished ...

Continue Reading →
0

Spotting a Phish

Phishing HookPhishing is still the overwhelming go-to choice for cyber-criminals launching an attack.  Over 90% of computer system breaches start with a phishing email in an inbox.  Finding ways to unmask these impostors is a good first step are protecting yourself from a phishing exploit.  Let’s look at this first example, apparently from a law firm about a legal action.

 

green-winick Continue Reading →

0
Page 24 of 40 «...10202223242526...»