Spectre and Meltdown Chip Based Security Vulnerabilities – Where Are We Now?

In January we learned about a pair of cybersecurity vulnerabilities called Spectre and Meltdown.  Discovered last summer by different security researchers, these vulnerabilities are proving difficult to mitigate because the problem exists in the way central processing units (CPUs) have been designed and manufactured.  These processor cores are at the heart of all computer hardware, from PCs and servers, to smartphones, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Happy St Patrick’s Day

Saint Patrick’s Day, or the Feast of Saint Patrick  is a cultural and religious celebration held on 17 March, the traditional death date of Saint Patrick (c. AD 385–461), the foremost patron saint of Ireland.


Critical Flash update. Patch now!

Can you ...

Continue Reading →
0

Google Chrome Now Blocks Annoying Ads

If you are “monetizing” your website using any of certain Google-banned advertising types, you will need to rethink your strategy and use approved advertising types only.  Otherwise you run the risk of the Wrath of Google, and will see your advertising revenue drop along with your page rank.

Starting in mid-February, the most recent version of Google’s Chrome web browser proactively blocks certain types ...

Continue Reading →
0

Are Malicious Bots Visiting Your Website?

Bots are alive, well, and busy on the Internet, making up nearly half of Internet traffic. Bad bots are used by cyber-criminals and cyber attackers to automate harmful exploits and attacks, such as denial of service attacks, crypto-coin mining, data mining, information exfilitration, account hijacking, vulnerability scanning, spamming, and other illegal or illicit activities.

Not all bots are bad.  Some of these site visitors are helpful, such as the automated bots from ...

Continue Reading →
0

Anniversary of the World Wide Web and Pi Day

Yesterday marked the 28th anniversary of the World Wide Web protocol.  In 1989, Sir Tim Berners-Lee, who was a software consultant at CERN, the European Organization for Nuclear Research, proposed the concepts which became the World Wide Web. Prior to his proposal, the Internet existed almost solely as a research network for government and university science and engineering professionals. Sir Tim was concerned that saved research documents were ...

Continue Reading →
0

Is Your Vendor a Security Risk? A Look at Vendor Risk Management

What if the biggest security risk your company faced was from an employee at a trusted vendor company?  Third party risk management, or vendor risk management, is an emerging cybersecurity practice that larger companies are using to mitigate the risk that smaller, network connected third party and vendor companies can represent.

The classic example of the dangers a vendor can bring to another company ...

Continue Reading →
0

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were the ...

Continue Reading →
0

FTC Announces National Consumer Protection Week

Looking to protect yourself from fraud, identity theft, and scams? Maybe you’re wondering about the best way to use credit, how to shop for a used car, or maximize your security online.  Yesterday marked the start of National Consumer Protection Week.

National Consumer Protection Week (NCPW) is an event to encourage people and businesses to learn more about avoiding scams ...

Continue Reading →
0

A History of Cyber Warfare – Part 3

Today we finish our story on the history of cyber warfare.

Edward Snowden (May 2013)

Attributed to Edward Snowden.  The target was the National Security Agency of the United States.  Snowden was a former CIA employee, who, while working for Booz Allen Hamilton as a contractor to the NSA, copied and leaked NSA information, particularly the computer exploits that the NSA used abroad and in ...

Continue Reading →
0
Page 3 of 40 12345...»