From Pinterest – Is this really misspelled, or just leet speak for Beam Me Up?Continue Reading →
If there’s one thing we’ve learned, it’s that any new way of DDoSing will reveal that there are a huge number of undefended devices online.
We haven’t looked at the sorry state of hotel security for a while, but we have done articles on hotel locks, and hotel business center computers before. The Naked Security blog recently published a story about the Russian hacker collective known as Fancy Bear, and their involvement in the use of the leaked NSA exploit Eternal ...Continue Reading →
SIX 60 MINUTE CLASSES
Learn something new! Attend one, some or all.
I know many of the other speakers and this looks like a terrific lineup. Block out the day and get some valuable information you can ...Continue Reading →
There are four ways that a typical business user on a Microsoft Outlook/Exchange/Office 365 platform can utilize. While these may not be perfect, and all of them have issues, applying these solutions will help prevent your users for falling victim to phishing emails. These solutions are additive, and each additional solution deployed provides a further layer of protection.
Junk Mail Filter – Outlook comes with a built-in Junk Mail filter that, while ...Continue Reading →
We already have some highly sophisticated weapons systems that use computer technology and electronics to do things on a battlefield undreamed of even a few decades ago. This does include robotic weapons systems. The important ingredient in all this tech is the presence of human control. At this point in time it still takes a human to drive these war machines.
But we are not the far from being able to create ...Continue Reading →
Occasionally I will write a book review for this blog, and then set up an Amazon link in a half-hearted attempt at “monetizing” my blog. Let’s just say I haven’t quit my day job just yet.
Here are some great books for coders, and they should be funny for coders and anyone who ever has used a computer program (the rest of us.)Continue Reading →
08/28/2017 02:40 PM EDT Original release date: August 28, 2017
US-CERT warns users to remain vigilant for malicious cyber activity seeking to capitalize on interest in Hurricane Harvey. Users are advised to exercise caution in handling any email with subject line, attachments, or hyperlinks related to Hurricane Harvey, even if it appears to originate ...Continue Reading →
When I am investigating an email exploit, I will take a look at the email headers. Email headers in an email are a lot like the html code in a web site. This is information that the machines that create, send, and receive the email use for routing, and for providing other information about the message. As a human, we do not see the headers unless we specifically look for them, ...Continue Reading →
NIST (National Institute for Standards and Technology) released Special Publication 800-53 version 4 recently, and it covers the shortcomings in privacy and security in the national power grid, water control systems, dams, oil and gas utilities and similar computer controlled systems. There are no coherent or enforceable standards for Industrial Control Systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems that ...Continue Reading →