Ten Signs of a Malware Infection

I just finished helping a client with a strange issue that I thought might be malware related, and we successfully fixed his issue by email, without having to meet or even set up a remote support session.  And it occurred to me that I have not covered the issue of malware remediation in ages.  Since this can be a fairly easy DIY project for most computer users, I thought a fresh ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable to ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  Today ...

Continue Reading →
0

How to Block Malware on Small Business Networks

Most of the small business clients I work with do not have a huge budget for a cybersecurity program, and something like a managed security service program (MSSP) is beyond their reach.  They have money for a firewall, and endpoint security, but that is about it.  Sound like your business?  Then read  on.

There are eight simple, free or low-cost things that small business IT professionals or IT support providers can do ...

Continue Reading →
0

Why Would Someone Hijack My Website?

If you own a small business, you have a website.  Would you be surprised to learn that your site is a top target of cyber-criminals?  Most people believe their business is too small and insignificant to be interesting to attackers, but your website is valuable to them precisely because it is small.

What makes a small business website an attractive target?   It is ...

Continue Reading →
0

USB Exploits Pose Security Threats

Often when I am writing about cybersecurity, the situation seems worse than ever.  But its not more dangerous than its ever been, it dangerous in ways that its never been.

A team of Israeli researchers have cataloged 29 different USB exploits and attacks.  These attacks can come disguised as a smartphone charger connection, or may come hidden on a USB thumb drive.  Plugging an unknown ...

Continue Reading →
0

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were the ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, phishing, ...

Continue Reading →
0

New Exploit Uses Disk Images to Deliver Malware

There is a new email attachment exploit making the rounds, that uses a file type called a disk image.  The file extension for this kind of file is ISO.  ISO files are not inherently dangerous, and in the exploit work much the same way that a ZIP attachment works.  This file type can sneak past email security filters because it is generally seen as benign, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Famous cryptographer’s tombstone cryptogram decrypted

A paper at Schmoocon DC over the weekend revealed a delightful cryptogram on William and Elizebeth Friedmans’ tombstone.  This is a fun story and will introduce you to the Bacon cypher.


Cryptocurrency as the lure, an ISO as the attachment – why not open it?

Phishers are using the hot topic ...

Continue Reading →
0
Page 2 of 9 12345...»