Is Your Computer Part Of A Botnet?

computer-zombieA “bot-net” is a robot network comprised of hundreds, thousands, or even millions of “zombie hosts,” as computers that are infected with bot malware are called.  Botnets are created by a type of professional cyber-criminal known as a “bot-herder,” and generally rented out to other criminals for sending millions of spam messages daily, running huge parallel processing tasks such as password cracking operation, or used by extortionists, hacktivists, and government sponsored ...

Continue Reading →
0

Smartphone Kill Switches Are Here

kill-switch-170Minnesota’s new smartphone “kill switch” law takes effect on July 1, 2015.  It requires that all smartphones sold in Minnesota come with a preinstalled kill switch or a free app which provides the same function.  A similar law in California takes effect on the same date, but requires all phones come with the app preinstalled.  Federal legislation has been proposed, but so far ...

Continue Reading →
0

D-Link Wireless Routers Need Security Update

D-LinkAre you using a D-Link wireless router in your home or business, D-Link has released a firmware upgrade for several popular router models to fix a security vulnerability that would allow remote access and DNS spoofing.  By changing the DNS settings on a router, an attacker can forward your traffic to a proxy server where your communications could be monitored for useful content, as well as redirecting your to malware-laden websites, ...

Continue Reading →
0

Backup Your Stuff!

Tuesday Mar 31 was World Backup Day.  Wednesday April 1 was April Fool’s Day.  Any chance there is a connection?

Time to get of the dime and set up your computer to backup your important data, files, pictures, business records, Quickbooks data, etc.  All it takes a failed hard drive, theft, fire, tornado, or other natural or man-made disaster and all your important digital assets are gone.  Our favorite solution is Carbonite.

Go one – you can do it!

Continue Reading →
0

Will Self-Aware Computers Keep Humans as Pets?

“Never trust a computer you can’t throw out a window.” – Steve Wozniak, co-creator of the Apple computer

I just started reading a book from 1999, written by Ray Kurweil called The Age of Spiritual Machines.  This book explores the consequences of our technological changes as they relate to AI or Artificial Intelligence, sometimes called “the Singularity,” and the future of the human race in the age of self-aware machines.  We have all see the “Terminator” movie series, with its ...

Continue Reading →
0

Sunday Funnies: The Rules – Roadrunner Version

roadrunner-primaryThanks to Joe Soucheray and his radio show’ “Garage Logic” I learned that animator Chuck Jones of Looney Tunes fame had rules for this staff to follow when creating the story arc for a Road Runner cartoon.  Back in the day, when there were only 3 broadcast networks, a public broadcast network, and maybe an independent local channel, (that’s right kiddies ...

Continue Reading →
0

Personal Information: What is the Worst to Lose?

anthem-250I was reading an article on Sophos about the Anthem Healthcare breach, and putting this information together with some other articles I have read recently, and this question came to mind: what personal information is the worst to lose?  In the Anthem breach, people lost information that included their “names, dates of birth, member ID/social security numbers, addresses, phone numbers, email ...

Continue Reading →
0

Hackers Impersonate IT Staff To Gain Network Access

We have alerted our readers to many of the approach vectors that are used by cyber-criminals to gain network access, tactics such as phishing and spearphishing, drive-by downloads from compromised websites, installing remote access Trojan horse software, and the like.  Sometimes the easiest way to get the network credentials you need is simply to ask for them.  One of the methods that have been increasing is impersonating IT staff, either by email, or directly via a phone call.   We ...

Continue Reading →
0

1.2 Billion User Names and Passwords For Sale

Is it time to change your password?  Now that security researcher Alex Holden, of Hold Security in Milwaukee has uncovered a huge trove of stolen user credentials on the Dark Net, you might as well assume that yours are in this mammoth collection.

Alex Holden was born in the Ukraine, and his current surname is not the one he was given at birth.  But he discovered that Russian cyber-criminals had gathered 542 million email addresses and 1.2 billion unique email and ...

Continue Reading →
0
Page 102 of 156 «...708090100101102103104...»