Password Managers Look For Breached Passwords

Creating and remembering strong (long) passwords is a chore, and leads to poor security practices such as shorter passwords, reuse of passwords, and writing down passwords in a password list or book that could be stolen.  The best way to create strong passwords and store them for use is a password manager.

The easiest password managers are found in popular web browsers such as Chrome, Firefox, and Edge.  Safari uses the Apple ...

Continue Reading →
0

Corporate Execs Fear the Phish

A recent report says that 75% of corporate executives believe what 100% of cybersecurity professionals know:  phishing emails represent the greatest cyber-threat to business computer systems and networks.  Humans are still the weakest link in the cybersecurity chain.  Cybersecurity awareness training and simulated phishing testing is seen as the most effective way to improve detection and avoidance in employees.  To be truly effective training frequency should happen quarterly, but often ...

Continue Reading →
0

When Penetration Testing Goes Wrong

When I am speaking or training, and the subject turns to penetration testing, I make certain to explain to the class or audience that nearly everything a pen-tester does violates federal laws.  For starters, there is the Computer Fraud and Abuse Act.  There are many other computer laws at both the federal and state levels.

Penetration testing takes a vulnerability assessment to the ...

Continue Reading →
2

Sunday Funnies – Defrag This

Found this on Pinterest.  Did you know that defragmenting a hard drive or HDD ( the old spinning magnetic platter kind) is not necessary?  The newer Windows operating systems since Windows 7 do that automatically in the background when your computer is on but inactive.

And defragging a SSD or solid state drive DAMAGES the flash memory chips.  So just ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Detecting Credit Card Skimmers

Modern credit card skimmers hidden in self-service gas pumps communicate via Bluetooth. There’s now an app that can detect them:

The team from the University of California San Diego, who worked with other computer scientists from the University of Illinois, developed an app called Bluetana ...

Continue Reading →
0

Authentication Without Passwords

The password represents one of the weakest links in the cybersecurity chain, and is frequently one of the opening points of an attack.  Passwords can be collected in cleartext through phishing exploits such as an email link that directs you to a fake login page, or social engineering ploys such as bogus calls from “IT” or “tech support,” or keylogging software that captures the entire user name/password/web address triad.  Passwords ...

Continue Reading →
0
Page 106 of 273 «...8090100104105106107108...»