Millions of Insecure Windows XP Systems Still In Use

Windows XP was released on 2001 replaced by Windows Vista (ugh) in 2006, and Windows 7 in 2009.  Official support from Microsoft, including security updates, ended in 2014.  It is now 16 years old.  Yet 7% of PCs worldwide are still running Windows XP.  Considering there are about 3 billion PC in use, that’s a whopping 210 million computers.  It is easy to assume that most of these computers are located ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, phishing, ...

Continue Reading →
0

Securing Your Smart IoT Devices

It seems that everything you can buy comes with a smartphone app and an Internet connection.  As cool and shiny and modern as this is, every Internet connected device is one more place for a cyber-attacker or criminal to get onto your network and into your business.  There are steps you need to take to protect these cool toys from exploitation.

These devices include security cameras, refrigerators, thermostats, light bulbs and light ...

Continue Reading →
0

Turn On Your Router’s Firewall

Your Internet Service Provider has provided you with a free hardware firewall, but often the firewall features are not enabled by default.  This is sort of like having seat belts in your car, but not wearing them.  It is foolish and risky.

On Monday we discussed how to find out of there are unnecessary open ports on your Internet router’s firewall settings.  Today we ...

Continue Reading →
0

How To Check Your Router For Security Holes

For nearly all home computer users, and many small businesses, the router that connects your home or business to the Internet is the first line of defense. How can you know if there are vulnerable security holes or open ports on your Internet router that might allow access for an attacker?

These routers are also called cable modems or DSL modems, and ...

Continue Reading →
0

New Exploit Uses Disk Images to Deliver Malware

There is a new email attachment exploit making the rounds, that uses a file type called a disk image.  The file extension for this kind of file is ISO.  ISO files are not inherently dangerous, and in the exploit work much the same way that a ZIP attachment works.  This file type can sneak past email security filters because it is generally seen as benign, ...

Continue Reading →
0

SCADA Plus Smartphone Equals Insecure Utilities

What if cyber-criminals or enemy nations could take over the computer control systems that run electric utilities, water systems, or traffic control systems for traffic lights and commuter trains.  The effects could be disastrous.

We have written about these systems before.  These are known as SCADA (supervisory control and data acquisition) or ICS (industrial control systems).  One of the claims of the industries that use SCADA systems is that they are inherently ...

Continue Reading →
0

Typosquatting – When Domain Name Typing Errors Produce Unfortunate Results

Registering common misspellings of popular website domain names is a big business.  A recent study found that 80% of all possible one-character typographical variants of Facebook, Google, and Apple are registered.  Registering close misspellings of domain names is know as “typosquatting.”

Security company Sophos recently analysed all the possible one-letter variations of six popular websites, a whopping 2249 unique site names.  Of the 2249 possibilities, 67% or 1502 domain names were actually registered.  Many ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft Awareness Week

File early or an impostor may get your refund.  Especially now that the Equifax credit trove is in the wild.

01/29/2018 08:27 AM EST  Original release date: January 29, 2018

Tax Identity Theft Awareness Week is January 29 ...

Continue Reading →
0

Do You Accept Credit Cards? How Credit Card Breaches Happen

If your business accepts credit cards for payment, then your a subject to the regulations of the Payment Card Industry.  This is known as PCI-DSS Compliance.  PCI compliance company Security Metrics recently released an infographic that shows the main compliance failures that lead to credit card breaches in 2017.  Here are some of the startling take-aways:

  • Businesses that took credit cards ...
Continue Reading →
0
Page 4 of 52 «...23456...»