LinkedIn Passwords Found on Russian Site

linkedin-logoIf you are on LinkedIn, as I am, today is a good day to change your password.  It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website.  While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and Continue Reading →

0

Privatoria – TOR Plus

TOR, or The Onion Router is a method of surfing the Internet anonymously.  TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret.  One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.

There is a ...

Continue Reading →
0

Macs Need Security Too

The Mac platform has become a popular target of cyber-criminals, partly because they have increased their percentage of the personal computer marketplace from 3% to 7%, partly due to the popularity of the iPhone, and partly because the consumer demographics of Apple customers generally point to people with more money who willing spend more to get the “best.”  In any event, if you are an Apple user clinging to the belief that the Mac is invulnerable, you are wrong.  You ...

Continue Reading →
0

Weakest Cybersecurity Link – It’s Your Staff

coworkersAll the expensive high-tech cybersecurity goodies cannot prevent someone in your employ from clicking a malicious link in an email and opening a gateway to further network exploitation.  That is the findings of ProofPoint in The Human Factor Report 2015.  The discouraging point for those of us who advocate employee training as an important part of an overall cybersecurity strategy is that in spite of training, people are still more likely ...

Continue Reading →
0

I’ve Been Hacked – Forensic Issues

forensicsWhen you discover that one or more computers in your business has been breached, it is easy to get very excited and try to eliminate your risk by taking systems offline, and having your computer support personnel wipe the hard drive and re-install a fresh operating system and set of applications.  This is the wrong course of action if you were hoping to take legal action against the perpetrators.

Most local police ...

Continue Reading →
0

Cyber Attacker Using Fake “Updates”

updatesCyber criminals are using fake software “updates” to trick company employees into downloading Trojan horse malware to allow the attackers to gain access to the company network.

This is an especially nasty bit of trickery, as we advise our clients repeatedly to keep their software and operating systems updated to maintain the security and integrity of the software.

Once the malware is installed the cyber attackers are able to move around the company ...

Continue Reading →
0

Traffic Lights Are Easy To Hack

green lightAccording to a presentation made by Cesar Cerruda, a security researcher and CTO at IOActive Labs, computerized city infrastructure components such as traffic lights and other utilities are vulnerable to cyber attacks.

Remember the scene in the movie “The Italian Job” where “the Napster” took control of the traffic lights in order to give his cohorts a literal green light to escape?  Or the scene in “Live Free and Die Hard” ...

Continue Reading →
0

Cybersecurity Pros Train Free at Cybrary

cybraryInformation technology certification has always been a daunting proposition.  The books and study materials are expensive, and classroom training is expensive, and the exams themselves are not cheap either.  Couple these costs with the time it takes to study, prepared, and test, time that can’t be billed to a client, and therefore hits your bottom line.

Finally, some good news for cybersecurity professionals, and those that would like to be:  Cybrary ...

Continue Reading →
0
Page 34 of 36 «...1020303233343536