USB Exploits Pose Security Threats

Often when I am writing about cybersecurity, the situation seems worse than ever.  But its not more dangerous than its ever been, it dangerous in ways that its never been.

A team of Israeli researchers have cataloged 29 different USB exploits and attacks.  These attacks can come disguised as a smartphone charger connection, or may come hidden on a USB thumb drive.  Plugging an unknown ...

Continue Reading →
0

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


History of Flying Saucer Sightings

From the Smithsonian:  A look at the history of unexplained flying objects through the lens of human technological change.


FTC Warns of Online Dating Scams

02/01/2018 09:22 PM EST Original release date: February ...

Continue Reading →
0

Crypto-Mining Exploits On The Rise

Fighting cyber-crime is a lot like whack-a-mole.  By the time cyber-defenders come up with countermeasures that work against one exploit, the cyber-criminals have moved on to another different and more profitable exploit.  Old malware is updated with new versions, and the new versions often slide right by the same defenses that stopped the old version.

Cyber-crime has moved from spamming, fake anti-virus, credit card fraud, and “Canadian” pharmaceuticals, to password cracking, ...

Continue Reading →
0

SCADA Plus Smartphone Equals Insecure Utilities

What if cyber-criminals or enemy nations could take over the computer control systems that run electric utilities, water systems, or traffic control systems for traffic lights and commuter trains.  The effects could be disastrous.

We have written about these systems before.  These are known as SCADA (supervisory control and data acquisition) or ICS (industrial control systems).  One of the claims of the industries that use SCADA systems is that they are ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft Awareness Week

File early or an impostor may get your refund.  Especially now that the Equifax credit trove is in the wild.

01/29/2018 08:27 AM EST  Original release date: January 29, 2018

Tax Identity Theft Awareness Week is January ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Google removed 60 games that contained code to display porn pop-ups and other malicious activities.  Click through to see list of bad apps.  If you installed any of them, you will need to remove these yourself.


Visa joins other major ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


20 Worst Passwords of 2017

Nearly identical to last year’s list.  Some people never learn.  If you are using any of these passwords, please change them now!


Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course from Heimdal Security.


Microsoft Word slams ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Made a Fortune in BitCoin?  Be careful who you tell.

From Naked Security – Crypto Coins Robbed at Gunpoint.

Good old fashioned stick-ups still a possibility.


Watch out – fake support scams are alive and well this Christmas

Fake support scams – where the crooks help you “remove” malware you don’t have – are still a ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Over 75% of Android apps are secretly tracking users

Yale Privacy Lab has discovered hidden trackers in hundreds of popular Android apps that send app manufacturers your location, activity, and other personal info.


Cayla doll too eavesdroppy to put under the Christmas tree, says France

That Bluetooth Cayla doll and i-Que surveillance robot can be ...

Continue Reading →
0
Page 6 of 10 «...45678...»