Google Says: Bet You Can’t Hack A Chromebook

google-logoWe have been recommending the Google Chromebook to our clients for use as a dedicated online banking system.  The reason we like this platform even more than a Linux LiveCD boot disk is that because the Chrome operating system simply supports the operation of the notebook itself, and the Chrome browser.  That’s it.  There is not a way to install any programs to a ...

Continue Reading →
0

How Your Website Can Spread Malware

drive-by-downloadRecently, several major online advertising networks were tricked into distributing adverting that was infected with malware.  Google, AOL, Rubicon, and AppNexus were some of the advertising distributors that were affected, and this impacted elite online publishers such as BBC, Newsweek, The New York Times, and MSN, and many many others that accepted advertsing from these networks.  Most online advertising companies check ad submission for malware before publishing, but this ad ...

Continue Reading →
0

Inside the Perimeter

razor-wireAh, the good old days, when perimeter defenses and endpoint security software was all you needed to keep your network secure.  Was it ever really that simple? Probably not, but many business owners and IT professionals are still hoping that keeping the firewall and antivirus updated is enough.

Over 90% of exploits start as an email in somebody’s inbox.  According to NSS Labs, 97% of all breaches are enabled by ...

Continue Reading →
0

How to Secure Your Internet of Things

secure-iotWe have spent a couple weeks talking about the dreadful state of security with many IoT devices.  Now we are going to provide you will some solutions.

Most of the weaknesses inherent in these devices come from the fact that they are set up to be “easy for anyone to install.”  Which means that most of them will work straight from the box without a lot of painful configuration.  Of ...

Continue Reading →
0

The Internet of Insecure Security Things

cameraIf the title seems confusing, it is not your fault.  It is really tough to get my head around the epic failure of purported security companies who bring products like these to market.  This practically qualifies as fraud!

The first story is about a manufacturer of security camera and DVR systems.  This company is a white box manufacturer, in that they build products that are privately labelled by other ...

Continue Reading →
0

The Internet of Insecure Things and DDoS

IOTI have been collecting article links about cybersecurity issues affecting the increasing number of non-computer Internet connected devices, commonly known as the Internet of Things or IoT.  In our enthusiasm to connect every device we own (thermostats, lighting controls, baby monitors, nanny cams and home security systems, etc.) to a smartphone app, the brilliant creators of these products are ...

Continue Reading →
0

No Fooling – How to Secure WordPress

WordPresslogoI know it’s April Fool’s Day, but this is a straight up serious post.  If you own, operate, host, support, or develop WordPress sites, this article is for you.

We have written a few articles covering the subject of WordPress security.  I recently received an email from John Stevens over at HostingFacts.com, inviting me to review their excellent tutorial, 28 Ways ...

Continue Reading →
0

World Backup Day

backupMarch 31st is World Backup Day.  On my way to the office today I saw someone driving down the highway in reverse. Not completely clear on the concept.

It has been three months since you made your New Year’s Resolution to really backup you data this year for sure!!  Still kicking this one down the road?  Well today is your day.  Sign up for something easy like Carbonite and be ...

Continue Reading →
0

Perils on the Edge Revisited – More Bad Router News

router diagramWe recently reviewed the bad state of affairs in the world of edge devices, routers, cable and DSL modems, and wireless access points.  I just read an article on CSO the talked about the dangers that exist with the routers that router traffic and basically run the Internet.  The problem is that these routers are running a Linux kernel in their core that is ...

Continue Reading →
0

Trust In Technology?

We have heard plenty of stories about people who blindly followed their GPS over a cliff or missing bridge to their doom.  Now this bit of research from Slate Magazine.

 “Researchers at Georgia Tech had 42 volunteers follow a seemingly autonomous robot into a conference room. However, the robot was actually guided by a hidden researcher, whose goal was to intentionally lead the test subjects astray in order to establish the bot’s unreliability.

Continue Reading →
0
Page 31 of 41 «...10202930313233...»