John McAfee Disses McAfee Security Software

I have had McAfee security software products on my DO NOT RECOMMED list for several years now, due to recurring and strange network connectivity and system performance issues that I have solved by uninstalling the McAfee products I find on the affected systems.  And lets not forget the surprisingly bad virus signature update that incorrectly marked Windows processes as malware and disabled tens of thousands of Windows PCs in April 2010.

Anyway, Intel bought McAfee in 2010 (a coincidence?) and has ...

Continue Reading →
0

Six Social Engineering Tricks To Avoid

One way that cyber criminals use to get personal information, such as user IDs and passwords, from unsuspecting computer users is to trick them out of it.  These sorts of methods are called “social engineering” in the computer security trade.  Social engineering is using trickery, deceit, or fraud to get the victim to help the cyber criminal in their exploit, and relies on the natural human tendency to help, cooperate, or comply with authoritative sounding requests.  Unfortunately, the weakest link ...

Continue Reading →
0

CryptoLocker and On-Line Backup Services

I have been writing about the latest threat, CryptoLocker, and promised I would report what ever Carbonite replied to my inquiry about whether CryptoLocker could encrypt online backups.  Here is what they said:

Computers infected with the CryptoLocker virus would indeed be at risk to having their online Carbonite backups also encrypted. In fact we see this on a daily basis unfortunately. Carbonite recognizes when a file previously backed up changes and automatically seeds it for backup. Assuming the client software ...

Continue Reading →
0

CryptoLocker–an update

I recently wrote about the threat that CryptoLocker is to your personal files and data.  After doing more research into it, this is what I know so far:

Information I am reading about this says that CryptoLocker only can encrypt local drives (those installed in your computer and USB external drives attached to your computer) and connected shared network drives (drives located on another computer or shared drive that shows up on your computer as a mapped drive).

I am not ...

Continue Reading →
0

Chinese Hackers Have Sense of Humor

I got a fake “your email box is full” message from my “Email Administrator.”

Social_Engineering_For_You

I know this is fake, because we have our own email service and I am the administrator.   One of the things I like to do is hover (DO NOT CLICK ON LINK) over the link to discover the actual destination of the link.

In this ...

Continue Reading →
0

We Are Moving Our Web Site to WordPress

This is our first post on the new platform.  Mainly we are developing this site to provide a place for us to refocus our web presence on our new business specialty: computer, network, and web security.  This will also let us combine our website and blog at one site.  So eventually the posts at WyzGuys Tech Talk on Blogger will be imported to this site.

My friend and business associate Troy king of King Web Design will be providing ...

Continue Reading →
0

CryptoLocker–New Ransomware Encrypts Your Files

CryptoLocker is a new exploit where the bad guys encrypt your personal files in your Documents, Pictures, Music, and Videos folder and holds them for ransom.  You have 72 hours to respond, and the cost to decrypt is $300.  Once your files are encrypted there is no getting them back!

This is a pretty serious exploit, as there is no way to decrypt the files without the encryption key that the bad guys want to sell you for $300. And of ...

Continue Reading →
0

A Scary Vision of the Future – 2020

Trend Micro has a nifty series of 9 – 5 minute videos that show just how dangerous the world could become with everything becoming network connected and moving to “the Cloud” (the Internet).  Check it out here.  With names like Switched Off, Stay Calm, We Didn’t See It Coming, it makes for interesting viewing.  Trend Micro is releasing one episode a week during Cyber Security Awareness Month and into November.

Go check it out.  This is very, very possible.

0

Your WordPress Blog Might Be Vulnerable to Attack

This alert was given early in September, but my post is by way of reminder to those of you who are running WordPress-powered blogs or web sites.  If you have been meaning to “get around to it,” go and do it today.  Below you will find your official “Round Tuit.”  Go ahead and get it done. 

You want to update our version of WordPress to 3.6.1, which fixes a Remote Code Execution vulnerability. For more information on this issue please ...

Continue Reading →
0

Cyber-Security Training For Employees–NCSAM

The weakest link in your security program is always going to be your employees.  Most people are too trusting, too gullible, and too uninformed when it comes to computer and network security.  A hacker does not need great skill or fancy software tools if a simple social engineering exploit such as a phone call will get them the user credentials of one of your employees.

The best solution, and possibly the only solution, is to provide training to your employees so ...

Continue Reading →
0
Page 109 of 145 «...8090100107108109110111...»