Android Game Hides Crypto-Ransomware Exploit

There is a new encryption ransomware exploit hiding inside a spoofed copy of the popular Chinese game “King of Glory.”  Right now, this malware is affecting users in China, but it is a matter of time before another cyber-criminal group modifies it for English speaking victims.

This game is available on international gaming forums, and is being spread when gamers download a copy to ...

Continue Reading →
0

Linksys Wireless Routers Have Security Vulnerabilities

Research firm IOActive recently released a an article that revealed some serious security deficiencies on popular Linksys Smart Wi-Fi products.  They have notified Linksys, and Linksys is working on the firmware upgrades that will be necessary to fix these issue, and they have issued a security advisory.

Among the vulnerabilities discovered:

  • Unauthenticated attacker can create a denial-of-service ...
Continue Reading →
0

Security Standards for the Internet of (Insecure) Things?

Everything you can think of and many things you have never dreamed of are being manufactured with little Linux operating systems and wireless Internet connections. Or in simpler terms, a brain, storage, and communications ability. This is the Internet of Things (IoT).  Lots and lots of “smart” devices talking to each other and phoning home to some data collection or dissemination point.  If only the people who are designing these devices, ...

Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you will ...
Continue Reading →
0

Your Smartphone and Tablet Need Security Too

phone-thiefMobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing information.

In ...

Continue Reading →
0

The Internet of Insecure Security Things

cameraIf the title seems confusing, it is not your fault.  It is really tough to get my head around the epic failure of purported security companies who bring products like these to market.  This practically qualifies as fraud!

The first story is about a manufacturer of security camera and DVR systems.  This company is a white box manufacturer, in that they build products that are privately labelled by other ...

Continue Reading →
0

Perils From The Edge – A Solution

turris-onamiaThere is a small company in the Czech Republic called Turris that developed a home and small office wireless router that may be the most secure small router available.  That is – when it’s available in April.  Right now its an Indegogo project.  You can pre-order it now for about $200.

This is an open-source project running OpenWrt.  According to the manufacturer, the router will be available in several ...

Continue Reading →
0

D-Link Wireless Routers Need Security Update

D-LinkAre you using a D-Link wireless router in your home or business, D-Link has released a firmware upgrade for several popular router models to fix a security vulnerability that would allow remote access and DNS spoofing.  By changing the DNS settings on a router, an attacker can forward your traffic to a proxy server where your communications could be monitored for useful content, as well as redirecting your to malware-laden websites, ...

Continue Reading →
0