If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.
Veteran’s day is a remembrance of all U.S. military veterans – past and present. It is celebrated every November 11th, and has been a federal holiday since 1926.
10/31/2017 08:14 AM EDT Original release date: October 31, 2017
Building resilience in critical infrastructure ...Continue Reading →
October is Cybersecurity Awareness Month, and this week’s theme is Simple Steps to Online Safety.
The toughest part of cybersecurity is securing the human mind, emotions, behaviors, and responses from the making a decision or taking an action that will open the door for a cyber-attacker. The reality is that it is much easier to secure systems than humans. And unfortunately, humans have been given a ...Continue Reading →
Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne. This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.
This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices. Once installed, the attacker has full control of ...Continue Reading →
Two-factor and multi-factor authentication are becoming more important and more available as we struggle to secure our information from attackers. These factors are something you know, something you have, and something you are. Biometrics (something you are) are one of the three factors used in computer, network, and application authentication.
Biometrics include thumbprint or fingerprint readers, palm scanners, iris and retinal scanners, facial recognition, speech recognition, and even arcane systems that detect ...Continue Reading →
WireX is a new botnet that runs on hijacked and compromised Android phones. A bot-net is a collection of compromised devices that can be coordinated by the hijacker to work together on a certain task. It might be bit-coin mining, or password cracking, or other tasks that require a lot of processing power. This bot-net, like last year’s Mirai and ...Continue Reading →
Last Friday we covered some of the security issues travelers can face when staying at a hotel. Today we are going to look at air travel – specifically the bad things that can happen to you if you carelessly discard or foolishly post a picture online of your airline boarding pass.
For some reason, people like to post images of their boarding passes on ...Continue Reading →
Sophos Naked Security alerted us to two Android apps that are included in the Google Play Store as legitimate apps. This makes these apps particularly dangerous, if you are following our advice to only install apps from legitimate sources. Once installed, they download a plug-in that harvests your text messages and sends them to a web server. Since the plug-in is downloaded after ...Continue Reading →
No good deed goes unpunished – WannaCry defender accused of earlier involvement in 2014 with the Kronos banking malware.
From Sophos Naked Security – GhostCtrl, being distributed by rogue versions designed to look like legitimate apps, can ...Continue Reading →
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera feeds ...Continue Reading →