Junkin’ Jack Flash

flash-logoAdobe’s Flash program has been a security nightmare. A favorite among malware writers for ages, Flash is useful for doing things like creating fake security pop-up alerts and conning computer users into buying security programs that don’t work and carry malicious content.  And it seems that there is another “zero-day” vulnerability discovered every three days.

Do we really need Flash?  No we don’t.  iPhones and iPads ...

Continue Reading →
0

The End Is Near For IE10

IE logoIf you or your company is still using Internet Explorer 10 or older versions of IE, then it is important that you move to IE11 (at a minimum) before January 12 2016.  Microsoft will officially end support for browser products older than Internet Explorer 11.  Many businesses are using older versions of IE to provide compatibility with older line-of-business and internal web applications.  If you are not updating those apps ...

Continue Reading →
0

Sunday Funnies: Geek Christmas Continued

Need some last minute tech gifts for your favorite tech, geek, or nerd?  Let me introduce you to The Grommet.  They have the perfect gift for the person who wants to really know what the check engine light is really trying to tell him or her.  The Automatic App Fueled Car Diagnostic is just the thing.  Just plug it into the diagnostic link connector under the dash, and check the smartphone app for more detailed information. ...

Continue Reading →
0

Alert: WPEngine User Credentials Breached

WordPresslogoJust received an email from WordFence, the WordPress security plugin-developer, that popular WordPress hosting company WPEngine had a breach that may have included customer user name and password information.  The full text of the email I received follows.

“We learned about an hour ago that there has been a data breach at WPEngine. Some of their customer login credentials have been exposed. If ...

Continue Reading →
0

Feds Create Cybersecurity Program for Banks

ffiecIf you are involved in the management of a commercial bank, The Federal Financial Institutions Examination Council (FFIEC) has developed a Cybersecurity Assessment Tool that was released in June 2015.  As a cybersecurity practitioner who provides security audits, compliance audits, vulnerability scans, and penetration tests, I was encouraged to see another example of a federal government agency getting serious about improving cybersecurity practices ...

Continue Reading →
0

New Tor Messenger App Offers Encrypted Communications

TORlogoThe Tor Project released the beta of their new Messenger app.  This messenging client is based on Mozilla’s Instantbird, and works with several popular messaging platforms, including Facebook Chat, Twitter, Google Talk, and Jabber.

The encryption piece is handled using Tor’s OTR Protocol (for Off-The Record), and requires that users exchange a secret key.  This is available in Windows, Linus, and OSX versions from the Tor website.

For more information:

Continue Reading →
0

US Gov Ups Its Cybersecurity Game

white-houseI was surprised to discover proof that my business is a target of cyber-criminals.  After installing some security and reporting tools on my websites, I was alerted to the almost constant state of attack that they were under.  And all I am doing is writing a cybersecurity blog.  And you, dear reader, what of your business?  There is a good chance that you are too, but simply don’t know it because ...

Continue Reading →
0

Good Question

free-wifiMy Facebook friend Jeff Wegge asked:  “Security question Bob. Is the hotspot on my mobile verizon phone any more secure than public Wi-Fi?”

This is a most excellent question! Generally speaking, the mobile hotspot will be more secure for two reasons The first is that only you are likely to be using it, unless you explicitly shared the SSID (network name) and passphrase with someone else. The second reason is ...

Continue Reading →
0
Page 52 of 62 «...2030405051525354...»