Phishing Sites Using HTTPS Too

When you see the secure HTTPS protocol at the beginning of a web address, or see the green “secure site” padlock symbol, does this mean that the site is safe?  Unfortunately, the answer is NO.  There is some confusion among computer users about what HTTPS really means.  This confusion is being exploited by cyber-criminals running phishing exploits.

HTTPS or secure hypertext transport ...

Continue Reading →
0

How Email Accounts Are Hijacked

The most devastating exploit that can happen to you is to have your email account hijacked.  We have spilled a lot of pixels on this subject (see below).  The reason we find this so dangerous is that it is that this is the attack most likely to happen to you.

Google recently released a study that analyzed how Gmail accounts are hijacked.  If you have an Android smartphone, you have a Gmail ...

Continue Reading →
0

The End of Passwords?

Every year some pundit declares that the password will soon be dead.  I have been proclaiming for several years now that the password, by itself, is no longer a suitably strong form of security, and have been a champion for two-factor authentication.

Microsoft has recently stated that their Windows Hello facial recognition system is a suitable replacement for passwords.  Windows Hello was ...

Continue Reading →
0

Congress Acts To Secure Electronic Voting Machines

As long as we are on the subject of election rigging and tampering, it is notable that Congress has finally weighed in on the subject of insecure and hackable electronic voting machines.  According to a recent TechDirt article, “A new bipartisan bill has been introduced, called the Secure Elections Act, that would actually target ...

Continue Reading →
0

Spy vs. Spy vs. Spy – What Countries Are Using Cyber-Espionage Tactics?

The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign.  But is Russia the first to engage in election rigging on this sort?  Hardly.  We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right.  It turns out that cyber-espionage is not ...

Continue Reading →
0

What the Heck is a Watering Hole Attack?

We’ve all seen this on National Geographic.  A lion, tiger, or other top predator hides near a water hole and waits for some sort of four-legged lunch to stop by for a drink.  Cyber-criminals and other attackers are using a similar technique to download and install malware from niche or industry specific websites to computer systems at targeted businesses.  Here’s how ...

Continue Reading →
0

Free Dark Web Report from Experian – Part Three

On Monday and Wednesday we took an in depth look at the free dark web scan being offered by Experian.  As we found out on Wednesday, I was not too impressed with the results of the free scan.  Better information is available from HaveIBeenPwned.com.

What is Experian really offering?  The free scan just looked for the email address I provided, the ...

Continue Reading →
0

Free Dark Web Report from Experian – Part Two

On Monday we started an investigation into the free dark web scan that is being offered by credit agency Experian.  Again, this is NOT Equifax, who breached our information last year.  This is a different credit agency.

When we ran the free scan on Experian, they found three results.  But I knew there was more to find, because I had already ...

Continue Reading →
0

Free Dark Web Report from Experian – Part One

I caught an ad on TV the other night that made me curious.  Experian is offering a “free dark web report,”  ostensibly to see if any of your personal data is for sale on the Dark Web.  Well I don’t really need a test to tell me that.  Since the Equifax breach, I am pretty sure all of us have information for sale ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


20 Worst Passwords of 2017

Nearly identical to last year’s list.  Some people never learn.  If you are using any of these passwords, please change them now!


Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course from Heimdal Security.


Microsoft Word slams the ...

Continue Reading →
0
Page 5 of 52 «...34567...»