Perils From The Edge – Home Routers

ubiquitiMonday we looked at issues with the business class routers at Juniper Networks and Cisco Systems.  Today we are going to look at an exploit affecting the Ubiquiti brand of cable modems.

Cable and DSL “modems” are used by most consumers, and many small businesses to connect their home or business network to the Internet.  These “modems” are really routers.

(It has been a personal pet peave of mine that these devices were called modems ...

Continue Reading →
0

Perils From The Edge – Insecure Routers

juniper-networksAt the end of December last year Juniper Networks discovered that some malicious actors had added code to the firmware and software that run their routers, creating a back door that would allow attackers to access the router remotely, assume administrator privileges, and view and decrypt VPN traffic running through the routers.  As the story unfolded, it turns out that Juniper was using a random number generator from NIST, and that the Continue Reading →

0

Malwarebytes Tackles Cryptoware

th-paypage-quick-480This is hot off the press.  Yesterday Malwarebytes announced a beta of a new anti-crypto software product designed to stop CryptoWall4, CryptoLocker, Tesla, and CTB-Locker.  You can download the beta here.

According to Malwarebytes:

“Malwarebytes Anti-Ransomware monitors all activity in the computer and identifies actions which are typical of ransomware activity. It keeps track of all activity and, once it has enough ...

Continue Reading →
0

Can Your Hospital Be Hacked?

RxQuick answer:  Yes it can!  A recent article in Bloomberg goes deeply into this subject, and reveals the experiences of a white hat hacker named Billy Rios.  Billy and many others in the profession had been hired by the Mayo Clinic in Rochester Minnesota in 2013 to try to hack all the medical devices in the hospital that were connected to the network.  These ...

Continue Reading →
0

Password Tips for 2016

password1Passwords – Is mine strong enough?  How do I know?  Every time I write a password article I feel as if this subject has already been done to death by me and others.  But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions:

  • Use different passwords for personal and work systems.  That way ...
Continue Reading →
0

What is Security In A Box?

linux-logoAt the November meeting of Penguins Unbound, the local Linux Users Group, I was introduced to a group of people from CryptoPartyMN.  These guys and gals are serious about anonymity on the web.  On of the resources they discussed was a great website called Security in a Box.  If you would like to learn how to be more secure in your online communications, this is certainly a ...

Continue Reading →
0

Tips From FBI To Lower Your Online Profile

ic3I am getting posts from the FBI and the Internet Crime Complaint Center (IC3), and received this interesting warning on November 18th of last year.  This warning was sent to law enforcement and public officials, but if you have come to the point in your life were you are feeling a bit overexposed on the Internet, these tips can help you too.

For some of us, a few of these suggestions are ...

Continue Reading →
0

Facebook Offers Two-Factor Authentication

facebookFacebook has joined the crowd of major web services that allow you to set up two-factor authentication (2FA or TFA).  I just finished setting it up on my account, and I was please to see that it works with Google Authenticator.  According to the instructions, it will also work with the Facebook smartphone app for Android or iPhone.  Tech Republic has a great step by step tutorial, so I won’t ...

Continue Reading →
0
Page 25 of 33 «...10202324252627...»