If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.
Tech company Gravity Payments instituted a $70 K minimum wage two years ago. It has long been my personal contention that the drop in real starting wages (against inflation) coupled with crushing ...Continue Reading →
Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne. This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.
This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices. Once installed, the attacker has full control of ...Continue Reading →
A security research found 10 “critical” security flaws in a popular D-Link wireless router. This is not the first time that poor security has painted this company with the ugly stick. They have previously been sued by the Federal Trade Commission, and we have reported about their deficiencies in this blog.
Security researcher Pierre Kim says the D-Link DIR-850L AC1200 Dual Band Gigabit Cloud router has 10 security vulnerabilities serious enough for him ...Continue Reading →
We will start with the good stuff for a change. Talk Like A Pirate Day is my second favorite unofficial Holiday. Check out the official website. Check out the cool pirate swag and order yourself a pirate hoodie or tee shirt.
WireX is a new botnet that runs on hijacked and compromised Android phones. A bot-net is a collection of compromised devices that can be coordinated by the hijacker to work together on a certain task. It might be bit-coin mining, or password cracking, or other tasks that require a lot of processing power. This bot-net, like last year’s Mirai and ...Continue Reading →
Sophos Naked Security alerted us to two Android apps that are included in the Google Play Store as legitimate apps. This makes these apps particularly dangerous, if you are following our advice to only install apps from legitimate sources. Once installed, they download a plug-in that harvests your text messages and sends them to a web server. Since the plug-in is downloaded after ...Continue Reading →
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera feeds ...Continue Reading →
There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.” Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.
This game is available on international gaming forums, and is being spread when gamers download a copy to ...Continue Reading →
Research firm IOActive recently released a an article that revealed some serious security deficiencies on popular Linksys Smart Wi-Fi products. They have notified Linksys, and Linksys is working on the firmware upgrades that will be necessary to fix these issue, and they have issued a security advisory.
Among the vulnerabilities discovered: