Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[INFOGRAPHIC] Introducing The Psychology of Passwords

From LastPass – It feels like almost every day there’s another data breach in the news, or a case of user credentials up for sale on the Dark Web. Despite the headlines, and repeated warnings from experts about weak passwords and the dangers of password reuse, users have yet to change their online ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Microsoft disrupts Fancy Bear election meddlers

In a new skirmish, Microsoft took control of six internet domains that were about to be used by the group to spoof US political organizations.


SamSam: The (almost) $6 million ransomware

New research reveals that SamSam ransomware has affected far more victims, and raised far more ransom, than previously thought.


Continue Reading →
0

Inside Iran’s Operation Cleaver

While the US Cyber Command has been focusing on the Chinese, North Koreans, and the Russians, and their respective intrusions into the networks of US companies, energy utilities, our military, and government agencies, Iran has been creating a world-class cyber-ops unit of their own.  Details about what is being called “Operation Cleaver” has been released by security company Cylance.

The Iranian ...

Continue Reading →
0

Safe and Legal Places to Exercise Your Pen-Testing Foo

In our last post we looked at a great way to set up a pen-testing lab.  Fortunately, the quandary over finding a safe place to practice your pen-testing skills has led to the creation of dozens of hacker-friendly learning sites.  Several have been provided by OWASP, and there are other contributors out there with multiple sites.  Here are a bunch of good options.

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Hackers break into voting machines within 2 hours at Defcon

Hackers from around the world (not just Russia) had the rare opportunity to crack election-style voting machines this weekend in Las Vegas.


Malicious Cyber Activity Targeting ERP Applications

07/25/2018 07:55 AM EDT  Original release date: July 25, 2018

Digital Shadows ...

Continue Reading →
0

Six Simple Malware Removal Tips Anyone Can Use

You think you just got a malware infection on your computer, but you’re not sure, and you aren’t sure what to do.  Take it to the Geek Squad or another qualified IT shop?  If only there were simple things you could try on your own.  The good news is there are, and we will show you some of them today.

  • So it seems you might have a malware issue.  These are my ...
Continue Reading →
0

Ten Signs of a Malware Infection

I just finished helping a client with a strange issue that I thought might be malware related, and we successfully fixed his issue by email, without having to meet or even set up a remote support session.  And it occurred to me that I have not covered the issue of malware remediation in ages.  Since this can be a fairly easy DIY project for most computer users, I thought a fresh ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Windows 10 security can be bypassed by Settings page weakness

The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.


Here are the 4 best ways to train employees for better cybersecurity

87% of companies experienced an ...

Continue Reading →
0

WordPress JetPack Exploit Hijacks Websites for Tech-Support Scam

Bad actors are using compromised WordPress.com accounts and the popular Jetpack plugin to add a malicious plug-in of their own that turns compromised websites into a vehicle for perpetrating a fake tech support scam.  Attackers are using stolen user names and passwords from other breaches and trying these credentials on WordPress.com to find accounts.  They are even searching whois records for website domain names registered with the same email account as the stolen user name.

Continue Reading →
0
Page 1 of 8 12345...»