Preventing the Next VPN Filter Bot-Net Attack

Back on May 30, 2018 the FBI asked us all to reboot our Internet access devices, the cable and DSL modems that allow most of us to use the Internet.  Supposedly, this would remove the VPN Filter malware, if our router was infected.  This was not exactly the truth.  The FBI had taken over the “toknowall” command and control server for ...

Continue Reading →
0

Best Web Browsers for Private or Anonymous Browsing part 2

In our last post we kicked off a review of web browsers and other services that provide improved security, privacy protection, and anonymity when traveling on the web.  Today we wrap up our report.  The last three items in our list are not technically a browser, but provide unique solutions to privacy and anonymity that we thought were worthy of inclusion..

Continue Reading →

0

Best Web Browsers for Private or Anonymous Browsing part 1

There has been a lot of new information about secure web browsing crossing my desktop lately.  Back in May, we wrote a series of articles about browser hacking and hijacking, which described in depth the dangers to our privacy and anonymity that we face when we are casually web browsing.  In this article we are going to be looking at secure ...

Continue Reading →
0

Your Laser Printer/Copier Hides Metadata on Your Document

Some people know that larger laser jet copiers and printers contain a hard drive that stores an image of everything that was printed or copied, and that these images can be used forensically to find the source of a document.  Did you know that color laser printers and copiers print tiny invisible dots of information on each sheet of paper that passes through ...

Continue Reading →
0

WPA3 Encryption to Improve Wi-Fi Security

With the expanded use of wireless networks connecting business computers, home computers, smartphone and tablets, and the ever expanding list of smart IoT devices, strong wireless network security is more important than ever.  Fortunately there is a new wireless security protocol, WPA3, that will fix some of the weaknesses inherent in the current standard, WPA2.

Wireless security is all about ...

Continue Reading →
0

How to Read Your Credit Report

Since the Equifax breach, we have all become painfully aware that our personal credit information is in the wild.  Identity theft is something that could happen to any of us.  Even the FBI, in a recently released report, says, “Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen.”

There is little any of us can do about the information disclosures ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable to ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  Today ...

Continue Reading →
0

Securing Networking Infrastructure Against Global Threats

Just how secure are the servers, routers and other high end hardware that is running the global Internet?  This is a question posed in a pair of recent articles from US-CERT, the US Computer Emergency Readiness Team.

Because of the significant skills and capabilities of organized cyber-criminals, politically motivated hacker collectives, nation-state cyber armies and similar threat sources, operators of global network systems face ...

Continue Reading →
0
Page 3 of 59 12345...»