Congress Acts To Secure Electronic Voting Machines

As long as we are on the subject of election rigging and tampering, it is notable that Congress has finally weighed in on the subject of insecure and hackable electronic voting machines.  According to a recent TechDirt article, “A new bipartisan bill has been introduced, called the Secure Elections Act, that would actually target ...

Continue Reading →
0

Russia Meddles in Another Election – Sweden

I recently caught a story on the BBC World News via PBS.  Anders Thornberg, the director of Swedish Security Services (SAPO) was accusing the Russians of engaging in social media driven misinformation campaign very similar to what happened in recent elections in France and Germany, and in the US during the last Presidential Election.  Evidently Putin is concerned that Sweden may join NATO, and is actively campaigning for candidates who are opposed to NATO.

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Google removed 60 games that contained code to display porn pop-ups and other malicious activities.  Click through to see list of bad apps.  If you installed any of them, you will need to remove these yourself.


Visa joins other major credit ...

Continue Reading →
0

Fifty Years of Computing – Doug Engelbart

Fifty years ago, in 1968, computers were big mainframe systems that were programmed using large decks of punch cards.  All output came out of a printer.  There were no computer displays yet, just rows of blinking light bulbs that were call a “monitor.”  All programs were run as batch jobs, one at a time.  There were no windows, no multi-tasking, no interactive computing as we know it today.

On December 8, 1968 a computer engineer named Doug Engelbart made a presentation ...

Continue Reading →
0

Spy vs. Spy vs. Spy – What Countries Are Using Cyber-Espionage Tactics?

The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign.  But is Russia the first to engage in election rigging on this sort?  Hardly.  We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right.  It turns out that cyber-espionage is not ...

Continue Reading →
0

What the Heck is a Watering Hole Attack?

We’ve all seen this on National Geographic.  A lion, tiger, or other top predator hides near a water hole and waits for some sort of four-legged lunch to stop by for a drink.  Cyber-criminals and other attackers are using a similar technique to download and install malware from niche or industry specific websites to computer systems at targeted businesses.  Here’s how ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Top 9 Free Phishing Simulators

Looking to run a phishing attack against your team?  Here’s a article from Infosec institute on the top 9 free phishing simulation products.


Your Nigerian Prince is a 67 year old from Louisiana

Sure looks like a prince to me.  Like Prince Charles.  (Those ...

Continue Reading →
0

Free Dark Web Report from Experian – Part Three

On Monday and Wednesday we took an in depth look at the free dark web scan being offered by Experian.  As we found out on Wednesday, I was not too impressed with the results of the free scan.  Better information is available from HaveIBeenPwned.com.

What is Experian really offering?  The free scan just looked for the email address I provided, the ...

Continue Reading →
0
Page 3 of 123 12345...»