How to Read Your Credit Report

Since the Equifax breach, we have all become painfully aware that our personal credit information is in the wild.  Identity theft is something that could happen to any of us.  Even the FBI, in a recently released report, says, “Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen.”

There is little any of us can do about the information disclosures ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable to ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  Today ...

Continue Reading →
0

Securing Networking Infrastructure Against Global Threats

Just how secure are the servers, routers and other high end hardware that is running the global Internet?  This is a question posed in a pair of recent articles from US-CERT, the US Computer Emergency Readiness Team.

Because of the significant skills and capabilities of organized cyber-criminals, politically motivated hacker collectives, nation-state cyber armies and similar threat sources, operators of global network systems face ...

Continue Reading →
0

Phishing on Facebook – Angler Phishing

Cyber-criminals are masquerading as customer service sites on Facebook, luring disgruntled customers to their Facebook page in order to trick them into divulging their user name, password, and other personal information.  This is called “angler phishing.”

The way this usually works is this.  Let’s say you have a bad experience with your bank.  Then you write and post a negative comment on Facebook or Twitter about bad service you received at your bank, for example.  A cyber-crime crew will be searching ...

Continue Reading →
0

Protect Your Business from Cyber-Scams

Two weeks ago we reported on the most common cyber-scams targeting individuals like you and me.  But businesses are also in the cross-hairs of scammers.  A recent effort by the Federal Trade Commission and the Better Business Bureau has created some resources to help small business owners and managers learn how to protect themselves from these scams.

It is important to ...

Continue Reading →
0

WordPress JetPack Exploit Hijacks Websites for Tech-Support Scam

Bad actors are using compromised WordPress.com accounts and the popular Jetpack plugin to add a malicious plug-in of their own that turns compromised websites into a vehicle for perpetrating a fake tech support scam.  Attackers are using stolen user names and passwords from other breaches and trying these credentials on WordPress.com to find accounts.  They are even searching whois records for website domain names registered with the same email account as the stolen user name.

Continue Reading →
0

How to Block Malware on Small Business Networks

Most of the small business clients I work with do not have a huge budget for a cybersecurity program, and something like a managed security service program (MSSP) is beyond their reach.  They have money for a firewall, and endpoint security, but that is about it.  Sound like your business?  Then read  on.

There are eight simple, free or low-cost things that small business IT professionals or IT support providers can do ...

Continue Reading →
0

Protect Yourself From Cyber Scams – Part 2

In our last post we looked at common web and phone based scams that I have seen personally, or have been targeted at a client.  Today we will examine other scams that are popular with cyber-criminals.

Some of these are targeted at specific industries or at people in positions of leadership or ownership of an organization or business.

  • Charity scams – ...
Continue Reading →
0
Page 5 of 60 «...34567...»