How To Check Your Router For Security Holes

For nearly all home computer users, and many small businesses, the router that connects your home or business to the Internet is the first line of defense. How can you know if there are vulnerable security holes or open ports on your Internet router that might allow access for an attacker?

These routers are also called cable modems or DSL modems, and ...

Continue Reading →
0

New Exploit Uses Disk Images to Deliver Malware

There is a new email attachment exploit making the rounds, that uses a file type called a disk image.  The file extension for this kind of file is ISO.  ISO files are not inherently dangerous, and in the exploit work much the same way that a ZIP attachment works.  This file type can sneak past email security filters because it is generally seen as benign, ...

Continue Reading →
0

SCADA Plus Smartphone Equals Insecure Utilities

What if cyber-criminals or enemy nations could take over the computer control systems that run electric utilities, water systems, or traffic control systems for traffic lights and commuter trains.  The effects could be disastrous.

We have written about these systems before.  These are known as SCADA (supervisory control and data acquisition) or ICS (industrial control systems).  One of the claims of the industries that use SCADA systems is that they are inherently ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft Awareness Week

File early or an impostor may get your refund.  Especially now that the Equifax credit trove is in the wild.

01/29/2018 08:27 AM EST  Original release date: January 29, 2018

Tax Identity Theft Awareness Week is January 29 ...

Continue Reading →
0

Do You Accept Credit Cards? How Credit Card Breaches Happen

If your business accepts credit cards for payment, then your a subject to the regulations of the Payment Card Industry.  This is known as PCI-DSS Compliance.  PCI compliance company Security Metrics recently released an infographic that shows the main compliance failures that lead to credit card breaches in 2017.  Here are some of the startling take-aways:

  • Businesses that took credit cards ...
Continue Reading →
0

What the Heck is a Watering Hole Attack?

We’ve all seen this on National Geographic.  A lion, tiger, or other top predator hides near a water hole and waits for some sort of four-legged lunch to stop by for a drink.  Cyber-criminals and other attackers are using a similar technique to download and install malware from niche or industry specific websites to computer systems at targeted businesses.  Here’s how ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Top 9 Free Phishing Simulators

Looking to run a phishing attack against your team?  Here’s a article from Infosec institute on the top 9 free phishing simulation products.


Your Nigerian Prince is a 67 year old from Louisiana

Sure looks like a prince to me.  Like Prince Charles.  (Those ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


20 Worst Passwords of 2017

Nearly identical to last year’s list.  Some people never learn.  If you are using any of these passwords, please change them now!


Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course from Heimdal Security.


Microsoft Word slams the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Is Donald Trump Putin’s Revenge?

A two-part Frontline documentary on PBS titled Putin’s Revenge examines the rise to power of an obscure ex-KGB agent named Vladimir Putin and the tactics he used to influence the last U.S. Presidential Election.  Evidence would indicate that Putin prefers Republics to Democrats.  Worth a look.  Live stream them here.


Continue Reading →
0

Huge Worldwide WordPress Brute Force Attack

The rare Tuesday post, but this couldn’t wait.  If you are running a WordPress site, you need to know this.  This was just released by WordFence.

“Early this morning our team was woken up by systems alerts letting us know that we needed to scale up our attack logging capacity. The number of WordPress attacks we were monitoring per hour had ...

Continue Reading →
0
Page 4 of 9 «...23456...»