This image from Pinterest seemed familiar to me. In technology we have similar sayings. Terms such as PEBKAC (Problem Exists Between Keyboard And Chair), Identity Error or ID-10T/1D-10T error (idiot error), PICNIC (Problem In Chair, Not In Computer), IBM error (Idiot Behind Machine error) and other similar phrases are used as slang in technical circles with derogatory meaning.
A quick Saturday digest of cybersecurity news articles from other sources.
Securing New Devices
12/28/2018 03:57 PM EST Original release date: December 28, 2018
During the holidays, internet-connected devices also known as Internet of Things (IoT) are often popular gifts—such as smart TVs, watches, toys, phones, and tablets. This technology provides a level of convenience to our lives, but it requires that we share more information than ever. The security ...
Continue Reading →JAN
Are you wondering what exploits represent the biggest threats in 2019? It can be difficult and expensive to defend against everything. If your company is budget-constrained, it may make more sense to defend against what is “likely” instead of everything that is “possible.” Today we look at some of the biggest cyber-attack methods from the past, the present and the future.
Past
While these ...
Continue Reading →JAN
How many of last year’s cybersecurity resolutions did you actually deploy in 2018? Not as many as you had hoped?
The new year gives us the opportunity to plan and deploy the computer and network security upgrades we need to implement to protect us from the exploits of cyber-criminals and other bad actors. What is on your list? Going to start using ...
Continue Reading →JAN
I have been warning about the weakness of the password for a number of years. Passwords no longer provide strong security. Passwords are too easy to crack using automated techniques, and are stored insecurely in many environments. Most passwords are too short, or easily guessable. Many users reuse the same password on multiple sites. But the password remains the most popular form of authentication among most users. Two-factor and multi-factor ...
Continue Reading →DEC
I was trying to do some research on encryption and discovered that due to “lack of funding,” government websites are down. This is crazy. Costs the same to run this page as it does to leave the whole site up! Trump shuts down the government – solution – spank the taxpayers!https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
ShareFrom Pinterest – our favorite thing – passwords
Check out the top 25 most used and least secure passwords of 2018 and whether yours made the cut.
1. 123456 (Rank unchanged from last year)
2. password (Unchanged)
3. 123456789 (Up 3)
4. 12345678 (Down 1)
5. 12345 (Unchanged)
6. 111111 (New)
7. 1234567 (Up 1)
8. sunshine (New)
9. qwerty (Down ...
DEC
A quick Saturday digest of cybersecurity news articles from other sources.
Home Routers Lack Basic Linux Security
More disconcerting news for router owners – a new assessment of 28 popular models for home users failed to find a single one with firmware that had fully enabled underlying security hardening features offered by Linux.
CITL (Cyber Independent Testing Laboratories) says it made this unexpected discovery after analysing firmware images from ...
Continue Reading →DEC
We occasionally get requests from other writers who want to post on our blog. This is one of those times. Thanks to Panda Security for this infographic. To read the accompanying article, please click through to their site.
Continue Reading →DEC
Today we feature another guest post from Kim Turner.