In our earlier post, we issued a warning to users of the Social Warfare plugin regarding a zero-day vulnerability affecting their sites. At this time, the plugin’s developers have issued a patch for the flaw. All users are urged to update to version 3.5.3 immediately.
Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer. Today we are looking at this from another angle.
A keylogger, if you don’t know, is ...Continue Reading →
If you are a small business owner or manager, you have a target on your back. You face a special set of risks from cyber-crime exploits. Most often, you do not have the financial resources to afford a full time IT support employee. You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems. You might not even have a firewall, or ...Continue Reading →
It’s April Fools Day, and in honor of those people who are still trading away safety for convenience when working with a computer or online, we have a short list of simple and basic security methods. If you are someone who provides “tech support” for a family member or are the “go-to” unofficial tech support in a small business, this is a good place to start.
This is simple stuff, but important, ...Continue Reading →
Close enough, so I decided to write about my favorite IT style April Fool’s Day pranks:
Switch right and left mouse buttons – In the control panel, mouse, there is a check box to switch the left and right buttons. While ostensibly for left-handed people, this will pretty much try your victim batty.
BSOD Screensaver. The infamous Blue Screen of Death means your computer ...Continue Reading →
March 31 is World Backup Day. Monday is April Fool’s Day. Coincidence? I think not. I you are one of the hold-outs who is going to get around to it someday, today is your chance.
Google’s Project Zero researchers have revealed a “high ...Continue Reading →
Here’s a kick in the head. Your tax dollars at work in a way that may save you a bunch of money. The National Security Agency has voluntarily released a software reverse engineering tool called Ghidra at the RSA security conference. The NSA has been using this tool internally to take apart and analyze malicious code, and to find vulnerabilities in commercial software ...Continue Reading →
If you are running a fleet of virtual machines using popular containerization solution Docker, you may be in for a nasty surprise. A couple of vulnerabilities have been discovered in Docker that has been exploited by cyber-criminals to run the Monero crypto-currency miner on affected Docker containers. This will of course have a serious impact on performance, and in an environment where billing is usage based, this will increase your costs.
Security ...Continue Reading →
I was interviewed for an articles in Financier World magazine, and the article appears in the April 2019 issue. The article is titled Cyber posture: the value proposition of security.
I recently reported on New WordPress Security Options, and my article was picked up and republished by ...Continue Reading →
This month marks the 30th anniversary of the World Wide Web. It is also the 50th anniversary of the Apollo space flight missions to the moon and back. More recently, the successful unmanned mission by the Space-X Crewed Dragon command module to the International Space Station, we finally see space flight becoming a business as opposed to being strictly a governmental exercise.
The underlying protocol of the web, and really all networking, ...Continue Reading →