Guest Post – The Ultimate Online Privacy Guide Part 2

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second of ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 1

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scooped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we open a three ...

Continue Reading →
0

Most Americans Unaware of Personal Data Loss

Data breaches.  It seems that every week some other company is featured in the news as the latest victim.  But who really is the victim?  The company that was breached, or the people whose personal information was stolen?  Have you been affected by a data breach?  How would you know?

A recent survey published on Lexington Law ask over a thousand people whether they knew if their ...

Continue Reading →
0

Prepare For The Worst

Answer this question:  What is the worst thing that could happen, that would put me out of business?  Often, I am working with small business owners who really have no idea where to start when it comes to developing a cybersecurity program.  A really easy way to start is to prepare for the worst.  If you have thought about what ...

Continue Reading →
0

New Attacks Against SCADA, ICS, and Industrial Safety Control Systems

This can’t be good.  Klaxons sounding at the chemical plant only meant one thing, that the automatic safety systems were not working and that a dangerous explosion was immanent.  The explosion would release a toxic cloud of hydrogen sulfide gas that would kill everyone at the plant and hundreds of people living nearby.

A movie scene?  A spy novel plot?  Unfortunately not, this is an actual event that took place in ...

Continue Reading →
0

Personal and Business Uses for Keyloggers.

Would you like to use a keylogger to spy on your spouse?  How about your kids?  Is it legal?  Can an employer use a keylogger to monitor employee computer activity in the workplace?

Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer.  Today we are looking at this from another angle.

A keylogger, if you don’t know, ...

Continue Reading →
0

Cybersecurity Basics for Small Businesses

If you are a small business owner or manager, you have a target on your back.   You face a special set of risks from cyber-crime exploits.  Most often, you do not have the financial resources to afford a full time IT support employee.  You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems.  You might not even have a firewall, ...

Continue Reading →
0

Cybersecurity Basics

It’s April Fools Day, and in honor of those people who are still trading away safety for convenience when working with a computer or online, we have a short list of simple and basic security methods.  If you are someone who provides “tech support” for a family member or are the “go-to” unofficial tech support in a small business, this is a good place to start.

Behaviors

This is simple stuff, but ...

Continue Reading →
1

The NSA Releases Reverse Engineering Tool

Here’s a kick in the head.  Your tax dollars at work in a way that may save you a bunch of money.  The National Security Agency has voluntarily released a software reverse engineering tool called Ghidra at the RSA security conference.  The NSA has been using this tool internally to take apart and analyze malicious code, and to find vulnerabilities in commercial ...

Continue Reading →
0
Page 40 of 106 «...1020303839404142...»