Need I say more?
Continue Reading →
Happy World Password Day. I have been following the progress that NIST is making in formulating new standards for user authentication. Something I found surprising was that NIST is not recommending using biometrics as a form of authentication. The two main reasons are that biometrics, such as fingerprints, iris scans, and voice recognition, are not a secret. For instance, you leave your fingerprints behind everywhere you touch something. ...Continue Reading →
Back in December we wrote about FBI Operation Hard Copy in order to warn our readers about telemarketing lottery scams and how they work. Recently, the FBI reported that one of the people arrested in that operation had plead guilty to one count of wire fraud.
According to the FBI:
Continue Reading →
Ronald John Mendleski, 72, of Bokeelia, Florida, pleaded guilty to one count of wire fraud before U. S. Magistrate Judge ...
I received an email from Natasha Wentz at MakeAWebSiteHub.com. She had seen my earlier article on securing WordPress, and asked to be added to the resource list. I took a look at the article, and decided that it was too good to bury in a year-old post, and I offered to write this post to feature their article.Continue Reading →
I read an interesting article in the New York Times earlier this month, about how the United States is using cyber-warfare tactics against North Korea to slow the development of an inter-continental ballistic missile that can reach the United States. The effective range maps were startling. (see below)
It seems that Trump has inherited a cyber war program from the Obama administration that was started 3 years ago and targeted the North Korean missile development program. Since that time, there ...Continue Reading →
What if there was a new phishing scam that had an open rate of 90%. That’s right, this phishing email is so believable, 90 out of 100 recipients open the the attachment or click on the link without a second thought.
These attacks begin with the scammer researching the target victim. These targets usually work at companies where there is a lot of air travel. ...Continue Reading →
We have discussed the dangers to what NIST identifies as Critical Infrastructure that exists because SCADA and other industrial control systems are designed to be run on “air-gapped” networks that are not connected to the public Internet. Unfortunately, many of these systems are being connected to the Internet, if only in a tangential way.
The German security firm OpenSource Security recently found hard coded ...Continue Reading →
From Ellen, by way of Pinterest