If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.
Over the last four posts, we have focused on the US-CERT alert, but cybersecurity firm Symantec has actually been working this case since 2011. Their report on Dragonfly can be found on their website. While they are cautous when providing attribution, reading between the lines indicates that Dragonfly is probably a Russian based group, possibly working on behalf ...Continue Reading →
Tech company Gravity Payments instituted a $70 K minimum wage two years ago. It has long been my personal contention that the drop in real starting wages (against inflation) coupled with crushing ...Continue Reading →
We haven’t looked at the sorry state of hotel security for a while, but we have done articles on hotel locks, and hotel business center computers before. The Naked Security blog recently published a story about the Russian hacker collective known as Fancy Bear, and their involvement in the use of the leaked NSA exploit Eternal ...Continue Reading →
I was recently introduced to a personal cybersecurity service called Rubica. If you are looking for a company that can provide you and your family or your small business with the kind of cybersecurity operations that are available to larger companies, this may be for you.
A bad day for me starts with a client calling to say, “I was hacked,” or to hear that they have fallen prey ...Continue Reading →
It is widely believed that Satoshi Nakamoto is the inventor of an encryption technique called “blockchain.” I just read a new book by Sarah Westall titled “FIRST: Meet the Inventor of Blockchain” that credits Dr Kelce Wilson as the true inventor of blockchain, a concept he developed between 2000 and 2001 while serving in ...Continue Reading →
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera feeds ...Continue Reading →
Toward the end of last year I made a pair of bold predictions. The first, that ransomware exploits would start declining, because anti-malware software companies were bringing products online that would prevent the encryption from taking place. The second, there would be an increase in Business Email Compromise (BEC) exploits, as cyber-criminals turned to new income streams. I was only half right.
BEC exploits have increased, because the potential returns are so ...Continue Reading →
On Wednesday we discussed the importance of backing up your website as part of a larger cybersecurity strategy. Today we are going to look at feature considerations for you as you decide which backup plugin is right for you.
Personally, I have used both Backup WordPress and Updraft Plus, and I have been satisfied with both of them. When you search for backup plugins, ...Continue Reading →
There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.” Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.
This game is available on international gaming forums, and is being spread when gamers download a copy to ...Continue Reading →