Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


MS-ISAC Releases Advisory on PHP Vulnerabilities

10/12/2018 06:37 PM EDT  Original release date: October 12, 2018

The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory on multiple Hypertext Preprocessor (PHP) vulnerabilities. An attacker could exploit some of these vulnerabilities to take control of an affected system.  NCCIC encourages users and administrators to review Continue Reading →

0

The Must Have Characteristics of a Cybersecurity Pro

So you think you want to be a cybersecurity professional?  Or maybe you know (or are) a middle school (that’s right, start ’em young),  high school, or college student who is looking at cybersec as a career path.  What personality characteristics would you need to be successful?  What drives, motivates, and challenges a cybersecurity professional?  Just what kind of wingnut are ...

Continue Reading →
0

Problems with Password Manager Phone Apps

If you use a password manager app on your smartphone, it may be vulnerable to package name spoofing, which would allow the password manager’s autofill feature to enter your login credentials on a spoofed web form.  This vulnerability applies to popular apps from LastPass, Dashlane, Keeper, and 1Password.

I have been an advocate for password managers.  They are part of the solution to creating ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


National Cybersecurity Awareness Month: Cybersecurity at Home

10/02/2018 06:32 AM EDT  Original release date: October 02, 2018

October is National Cybersecurity Awareness Month (NCSAM), an annual campaign to raise awareness about cybersecurity. The National Cyber Security Alliance (NCSA) has published general tips to help ...

Continue Reading →
0

What Might A Future Cyber-War Look Like?

We have entered the age of cyber war.   Believe it or not, cyber war operations are going on right now in many places across the globe.  Most of these operations are covert, and often hard to attribute directly to a particular nation-state or adversary.

Marc Cancian has written a gripping report titled Coping with Surprise in Great Power Conflicts.  It ...

Continue Reading →
0

US Cyber Command Changing the Rules of Engagement

The best defense is a good offense.  Especially if you are “defending forward.”  So what does that mean?

The US Cyber Command has a new leader.  Lt. Gen. Stephen G. Fogarty assumed command of U.S. Army Cyber Command on June 1, 2018.  His mission is to make Cyber Command more aggressive in its response to cyber-attacks on assets in the United States.  The ...

Continue Reading →
0

Using DNS Proxies for Security

What if there was a simple change you could make to your computer’s network configuration that would go a long way to protecting you from picking up malware on the Internet.  This change could even protect you from accidentally clicking on malicious links in phishing emails.  What if this simple fix could keep malware already on your computer from “phoning home” to the command ...

Continue Reading →
0

Sunday Funnies – A Day In The Life

What I say: I’m a computer support technician.

What people hear: I can resolve any tech issue you have or ever will have on any machine that exisits in the universe. I am an expert on every operating system and software application ever written.  I am jacked into the Matrix at all times. I am an IT god – look ...

Continue Reading →
0
Page 5 of 145 «...34567...»