What Happens When Your Website Is Hijacked?

I don’t often re-post other people’s web content, but the video below from Sucuri is worth the look if you are interested in learning why an attacker would want your website, and what they could possibly do with it, how that affects your reputation, and most importantly, what you could do to prevent it in the first place.  If you have the time, take a look.  The running time is 25 minutes.  With the Q&A Session, it goes out to 40 ...

Continue Reading →
0

Tax Dollars At Work – Good News For A Change

scalesThe US House of representatives passed the Email Privacy Act.  Finally the Congress passes a bill that actually protects the public from warrantless search and seizure of email records.   What makes this vote special is that it was unanimous – 419-to 0!  When does that ever happen?  Rarely, but considering this bill would protect our representatives too, maybe not all that surprising.

This bill ...

Continue Reading →
0

Panama Papers Attackers Exploited WordPress Flaw

panama-papersWe have written before about the importance of properly securing your WordPress website.  According to a recent post on the WordFence blog, the Mossack Fonseca breach, commonly known as the “Panama Papers,” was apparently made possible by an unpatched WordPress plugin, and also a mail program that stored user credentials in plaintext..

This again reiterates the importance of keeping your WordPress version up to date (version 4.5 as of 4-16-2016), ...

Continue Reading →
0

Best Data Security – Throw It Out!

databaseI read a couple of thought provoking articles recently on the subject of data security, and more directly, on how data destruction can serve to permanently “secure” the data that is destroyed.  One article appeared in the Wordfence security blog, and the other article from security and encryption guru Bruce Schneier on CNN.com.

The Wordfence article was looking at improving WordPress website security by removing unused items and information, things ...

Continue Reading →
0

Google Says: Bet You Can’t Hack A Chromebook

google-logoWe have been recommending the Google Chromebook to our clients for use as a dedicated online banking system.  The reason we like this platform even more than a Linux LiveCD boot disk is that because the Chrome operating system simply supports the operation of the notebook itself, and the Chrome browser.  That’s it.  There is not a way to install any programs to a ...

Continue Reading →
0

Windows Defender Gets Muscles

Windows10Tired of cyber-creeps kicking sand in your face at the virtual beach?  Microsoft wants to pump you up!!.  Businesses using the Enterprise version of Windows 10 will have the option of using Microsoft’s new enhanced Windows Defender Advanced Threat Protection.  In addition to providing end point security through Windows Defender, Defender ATP will connect with a cloud services based SIEM (security Information and Event Management) that will provide more protection, ...

Continue Reading →
0

How Your Website Can Spread Malware

drive-by-downloadRecently, several major online advertising networks were tricked into distributing adverting that was infected with malware.  Google, AOL, Rubicon, and AppNexus were some of the advertising distributors that were affected, and this impacted elite online publishers such as BBC, Newsweek, The New York Times, and MSN, and many many others that accepted advertsing from these networks.  Most online advertising companies check ad submission for malware before publishing, but this ad ...

Continue Reading →
0

Inside the Perimeter

razor-wireAh, the good old days, when perimeter defenses and endpoint security software was all you needed to keep your network secure.  Was it ever really that simple? Probably not, but many business owners and IT professionals are still hoping that keeping the firewall and antivirus updated is enough.

Over 90% of exploits start as an email in somebody’s inbox.  According to NSS Labs, 97% of all breaches are enabled by ...

Continue Reading →
0

How to Secure Your Internet of Things

secure-iotWe have spent a couple weeks talking about the dreadful state of security with many IoT devices.  Now we are going to provide you will some solutions.

Most of the weaknesses inherent in these devices come from the fact that they are set up to be “easy for anyone to install.”  Which means that most of them will work straight from the box without a lot of painful configuration.  Of ...

Continue Reading →
0
Page 49 of 65 «...2030404748495051...»