The Internet of Insecure Security Things

cameraIf the title seems confusing, it is not your fault.  It is really tough to get my head around the epic failure of purported security companies who bring products like these to market.  This practically qualifies as fraud!

The first story is about a manufacturer of security camera and DVR systems.  This company is a white box manufacturer, in that they build products that are privately labelled by other ...

Continue Reading →
0

The Internet of Insecure Things and DDoS

IOTI have been collecting article links about cybersecurity issues affecting the increasing number of non-computer Internet connected devices, commonly known as the Internet of Things or IoT.  In our enthusiasm to connect every device we own (thermostats, lighting controls, baby monitors, nanny cams and home security systems, etc.) to a smartphone app, the brilliant creators of these products are ...

Continue Reading →
0

No Fooling – How to Secure WordPress

WordPresslogoI know it’s April Fool’s Day, but this is a straight up serious post.  If you own, operate, host, support, or develop WordPress sites, this article is for you.

We have written a few articles covering the subject of WordPress security.  I recently received an email from John Stevens over at HostingFacts.com, inviting me to review their excellent tutorial, 28 Ways ...

Continue Reading →
0

World Backup Day

backupMarch 31st is World Backup Day.  On my way to the office today I saw someone driving down the highway in reverse. Not completely clear on the concept.

It has been three months since you made your New Year’s Resolution to really backup you data this year for sure!!  Still kicking this one down the road?  Well today is your day.  Sign up for something easy like Carbonite and be ...

Continue Reading →
0

Perils on the Edge Revisited – More Bad Router News

router diagramWe recently reviewed the bad state of affairs in the world of edge devices, routers, cable and DSL modems, and wireless access points.  I just read an article on CSO the talked about the dangers that exist with the routers that router traffic and basically run the Internet.  The problem is that these routers are running a Linux kernel in their core that is ...

Continue Reading →
0

IRS Strikes Again – IP PIN Epic Fail

irs-logoWe wrote last year about how the IRS and their Get Transcript service was instrumental in helping identity thieves file fraudulent tax returns for big refunds.  The problem was that the IRS used static user identity information that was available elsewhere online.  They promised to fix this security problem, but have not.  This year, many users of the IP PIN  system that was supposed to harden security ...

Continue Reading →
0

Windows 10 Most Secure OS Yet – Or Is It?

Windows10Windows 10 is getting kudos from technology pundits everywhere for producing an operating system that is efficient, technically excellent, and more secure than anything Microsoft has ever produced.  But this is an operating system that is attached to cloud services, and that collects and transmits more personal data to Microsoft and other cloud providers.  Just like your smartphone, your Windows PC and all those Apps are keeping track of ...

Continue Reading →
0

Watch Out For HawkEye

hawkeyeWe haven’t seen macro viruses for a while, but they are back. HawkEye a new variant of the resurgent use of unpatched vulnerabilities in Microsoft Word and other office documents.   Using macros, written in Visual Basic, attackers are using Word document attachments to run code on victim computers.

Last week we wrote about the Locky ransomware exploit that encrypts your data ...

Continue Reading →
0

Who Killed Dyre Wolf? The Russians?

Bank-trojanDyre Wolf is one version in the family of banking Trojans that started with Zeus and NeverQuest, and now includes Dridex, SpyEye, Shylock,Shifu, Gozi, and Tinba.  Banking Trojans are designed to sit unnoticed on your computer, and to capture your banking and financial login credentials and send them to criminals who use the information to empty your accounts.  They are among the worst exploits that can happen to you, followed closely by ...

Continue Reading →
0

Crypto-Ransomware Round-Up

cryptolockerSome of the nastiest exploits going around are the many variants of the CryptoLocker and CryptoWall malware that encrypt all your personal files and hold them for ransom.  Payment in bitcoin is required, in amounts starting at $200 and ranging upward to the $17,000 (400 BTC) that Hollywood Presbyterian Hospital just paid to unlock their files.  Or even more.  The amount will be whatever the attackers think they can extract from the victim.

  • The latest ...
Continue Reading →
0
Page 34 of 49 «...1020303233343536...»