Continue Reading →
There is a new threat appearing on corporate and personal networks called “fileless malware.” It can sneak by traditional signature recognition endpoint security programs. It is able to hide and stay resident by using trusted operating system and software application files to run the exploit.
Fileless malware exploits are estimated to comprise almost 30% of new exploits, and that percentage is rising as cyber-crime group move to this newer technology. Fileless malware exploits are being target at financial institutions and other ...Continue Reading →
Yale Privacy Lab has discovered hidden trackers in hundreds of popular Android apps that send app manufacturers your location, activity, and other personal info.
That Bluetooth Cayla doll and i-Que surveillance robot can be taken ...Continue Reading →
Many companies and organization are moving their data repositories to the cloud, to places such as Amazon Web Services (AWS). Hopefully, if your company is moving to the cloud, you are doing a better job securing this information than the Department of Defense or the National Security Agency.
The first story involves a trove of data left on AWS servers, and discovered by security ...Continue Reading →
A guest post by Megan Wells from InvestmentZen.com
Identity theft. Those words are enough to start the heart racing. You think, “How can this be? I do everything possible to protect my private information.” Yes, and the criminals always seem to be one step ahead.
Recent financial industry changes like EMV (chip cards), reduced card-cloning in retail stores and some restaurants, but gas stations’ deadline for conversion is ...Continue Reading →
Let’s say you have finally committed to creating new, unique, and long passwords for all your online, network, business, and machine user accounts. How are you going to keep track of the dozens, if not hundreds of uniquely different passwords? Using a system makes your passwords guessable, and writing them down in a spiral notebook is a hassle, and makes your ...Continue Reading →
11/28/2017 11:10 PM EST Original release date: November 28, 2017
As part of National Tax Security Awareness Week—November 27 to December 1—the Internal Revenue Service (IRS) is releasing daily security tips to help taxpayers protect their data and identities against tax-related identity theft.
US-CERT encourages taxpayers to visit the ...Continue Reading →
On Wednesday, we looked at the built-in password manager provided by Google Smart Lock. Today we will review Apple’s iCloud Keychain. Keychain works automatically with iPhones, iPads, and Macs, and is shared an updated to all your devices automatically. Most of the Apple users I talk to are familiar with Keychain. Keychain works with devices that are using ...Continue Reading →
We are advocates of using a password manager to create, manage, and securely store the dozens (or hundreds) of unique and long passwords that we need to be using these days. For many people, password managers can seem difficult to set up and a bit of a hassle to use. The good news its that there are two easy and built-in alternatives, Continue Reading →
We have been writing for a while about the grievous lack of security on Internet-connected “smart” appliances, web cameras, baby monitors, door locks, thermostats, personal assistants, Wi-Fi, Cable, and DSL routers, and other ...Continue Reading →