WordPress Security Tips

WordPresslogoAs we have mentioned in previous postings, WordPress has become one of the world’s leading web design tools, with a 27% share of all web sites, and a 65% share of CMS or Content Management System type websites.  Because it is an open source product that is free to use, it has become hugely popular.  We have been designing in WordPress ourselves for ...

Continue Reading →
0

Linux Security

linux-logoIn our last post we may have introduced some of you to the idea of using Linux as a replacement for your Windows desktop or laptop.  Toward the end we touched on security, and this post will expand on that issue.

There is a fanatical cohort in the Linux realm that will tell you that Linux is secure by design and so security software is not necessary. And nobody is writing malware ...

Continue Reading →
0

The Other Free Operating System – Linux

linux-logoAll the excitement in the computer business lately has been about the free upgrade to Windows 10 that Microsoft has offered to owners of Windows 7 and Windows 8.1 computers.  Free is good.  We all love to get free stuff, and getting free stuff from Microsoft, well, it’s really special.

But let’s take a look at the operating system that has always been free, Linux, in its many flavors and distributions.  Currently the ...

Continue Reading →
0

Google Enhances Spam Filtering

spamThere are really two stories here.  The first is about how your Gmail account should become smarter about what you consider to be SPAM, as well as what you consider to be desirable email.  We are talking about a system actually learning your personal individual preferences over time.  For instance, I get a lot of email newsletters and marketing emails in my Inbox, ...

Continue Reading →
0

Baby You Can Hack My Car

This spring I bought a new Kia Forte that came with a whole lot of electronic goodies including Bluetooth synchronization, voice command, and driver programmable features galore.  And evidently, the potential to be hacked.

This is old news now, but security researchers were able to hack a Jeep Cherokee through the on-board Internet connectivity feature called “UConnect.”

“They were able to change the temperature of the air conditioning, turn on the windshield wipers and blast the wiper fluid to blur the ...

Continue Reading →
0

No Secrets, No Privacy, No Security

cybersecurity_436x270Last week we talked about the impossibility of keeping secrets over the long term, the liberation of secret information by groups or individuals who just wanted the secrets exposed.  A close cousin, conceptually, is privacy.  At this point, there is no privacy anymore, not really.

Time was when your life was largely unknown, and privacy was an easy thing to have. But this is ...

Continue Reading →
0

No More Secrets

Hacker movies are one of my favorite genres, and have been for a long time.  Go figure.  One of my favorites from the “olden days” is the 1992 movie “Sneakers.”  In this movie Robert Redford and his merry band of cybersecurity testers are tasked with the recovery of a mysterious “black box” which basically can solve for any type of encryption that was in use at that time.  At one point in the movie the blind hacker discovers ...

Continue Reading →
0

EMV Cards Due October – It’s About Time!

EMVcardEMV or “chip and PIN” cards have a much higher level of security built right into the card, and have been in common use in Europe for over a decade.  For some reason (too expensive to implement?  Really?) the United States has continued to use the horribly insecure magnetic stripe credit card, which is why exploits like the Target Christmas card breach are even possible.

On October 1st, the United States will FINALLY join ...

Continue Reading →
0
Page 55 of 60 «...3040505354555657...»