Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Programmer from hell plants logic bombs to guarantee future work

At some dark moment, have you ever wondered: what if the programmers are adding the bugs deliberately?


Yubico Security Keys with a Crypto Flaw

Wow, is this an embarrassing bug:  Yubico is recalling a line of security keys used by the U.S. government due to ...

Continue Reading →
0

Remote Desktop Protocol is Still a Top Attack Vector

Phishing for login credentials may still be the way most network breaches happen, but insecure use of remote desktop protocol is another favorite vulnerability used by attackers to enter a network..  Sophos Naked Security reported their findings on the use of RDP or the Remote Desktop Protocol as a launch vector for accessing and ...

Continue Reading →
0

Hash and Salt – A Recipe for Password Security

I love hash, especially corned beef hash, with a little salt.  Maybe a couple of poached or over-easy eggs perched on top.  Wait!  This is not a foodie blog!  That’s not what I am writing about today.  As it turns out, using a hash plus a salt is a great recipe for keeping passwords secure on a web server or an authentication database.

If your password has been extracted from a ...

Continue Reading →
0

Guest Post – Evolution of Phishing: Spear Phishing and Whaling Scams Explained

Due to the high-profile cases of cybercrime in recent years, including the Facebook-Cambridge Analytica scandal back in 2018, the Equifax data breach in 2017, and the Russian interference with the US presidential election in 2016, cybersecurity is now a top priority for businesses, institutions, and individuals alike.

In order to implement effective countermeasures against cyber attacks, one has to ...

Continue Reading →
0

The Internet Is Not Killing Newspapers – They are Killing Themselves

The newspaper industry has been blaming the Internet for its immanent and perhaps inevitable demise for decades.  Let’s forget the convenient facts like paywalls don’t work because I can get the information elsewhere for free.  Or that the subscription price of a newspaper I buy at the store or have delivered to my door covers the cost of physical delivery of the ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 2

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the last article and this article ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 1

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help.  ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The US is reportedly seeding Russia’s power grid with malware

The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid.

My comment:  Anybody who wonders why the bad guys are always attacking the US, well, it’s because we are doing it ...

Continue Reading →
0
Page 36 of 107 «...1020303435363738...»