Securing Facebook

In the aftermath of the recent stories about how the personal information of 50 million Facebook users was acquired and misused by the Trump Presidential campaign, many people are wondering whether they should delete their Facebook account.  Others are just looking to see how they can more tightly secure their Facebook account from this sort of abuse.  Fortunately, securing Facebook is relatively easy.

  • Open your Facebook home page, and click on the ...
Continue Reading →
0

Something You Are: Typing Cadence

What would it be like if you could identify yourself and authenticate your account by the way you type?  A Romanian company, TypingDNA, has created a Chrome extension that does just that.

I am a big advocate of two-factor authentication, but there are some problems.  One of the three types of authentication is biometrics, which is “something you are.”  NIST, in SP 800-63B states ...

Continue Reading →
0

Using Artificial Intelligence in Cybersecurity

The problem with cybersecurity it that an attacker only needs to exploit a single vulnerability, while a defender needs to protect everything.  Defense has evolved from perimeter defense, to defending all endpoints, to adding automated detection and prevention appliances, to universal threat management that looks at not just north/south traffic passing through the Internet gateway, but also east/west traffic across the LAN between ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Second company claims it can unlock iPhone X

A tiny US company called Grayshift is reportedly quietly touting software it claims can unlock Apple’s flagship handsets, the iPhone X and 8.


How women are helping to fight ...

Continue Reading →
0

Is Your Vendor a Security Risk? A Look at Vendor Risk Management

What if the biggest security risk your company faced was from an employee at a trusted vendor company?  Third party risk management, or vendor risk management, is an emerging cybersecurity practice that larger companies are using to mitigate the risk that smaller, network connected third party and vendor companies can represent.

The classic example of the dangers a vendor can bring to another company ...

Continue Reading →
0

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were the ...

Continue Reading →
0

A History of Cyber Warfare – Part 3

Today we finish our story on the history of cyber warfare.

Edward Snowden (May 2013)

Attributed to Edward Snowden.  The target was the National Security Agency of the United States.  Snowden was a former CIA employee, who, while working for Booz Allen Hamilton as a contractor to the NSA, copied and leaked NSA information, particularly the computer exploits that the NSA used abroad and in ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


History of Flying Saucer Sightings

From the Smithsonian:  A look at the history of unexplained flying objects through the lens of human technological change.


FTC Warns of Online Dating Scams

02/01/2018 09:22 PM EST Original release date: February 01, ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, phishing, ...

Continue Reading →
0
Page 3 of 20 12345...»