This image from Pinterest seemed familiar to me. In technology we have similar sayings. Terms such as PEBKAC (Problem Exists Between Keyboard And Chair), Identity Error or ID-10T/1D-10T error (idiot error), PICNIC (Problem In Chair, Not In Computer), IBM error (Idiot Behind Machine error) and other similar phrases are used as slang in technical circles with derogatory meaning.Share
12/28/2018 03:57 PM EST Original release date: December 28, 2018
During the holidays, internet-connected devices also known as Internet of Things (IoT) are often popular gifts—such as smart TVs, watches, toys, phones, and tablets. This technology provides a level of convenience to our lives, but it requires that we share more information than ever. The security of ...Continue Reading →
Are you wondering what exploits represent the biggest threats in 2019? It can be difficult and expensive to defend against everything. If your company is budget-constrained, it may make more sense to defend against what is “likely” instead of everything that is “possible.” Today we look at some of the biggest cyber-attack methods from the past, the present and the future.
While these threats ...Continue Reading →
The new year gives us the opportunity to plan and deploy the computer and network security upgrades we need to implement to protect us from the exploits of cyber-criminals and other bad actors. What is on your list? Going to start using a ...Continue Reading →
I have been warning about the weakness of the password for a number of years. Passwords no longer provide strong security. Passwords are too easy to crack using automated techniques, and are stored insecurely in many environments. Most passwords are too short, or easily guessable. Many users reuse the same password on multiple sites. But the password remains the most popular form of authentication among most users. Two-factor and multi-factor authentication ...Continue Reading →
I was trying to do some research on encryption and discovered that due to “lack of funding,” government websites are down. This is crazy. Costs the same to run this page as it does to leave the whole site up! Trump shuts down the government – solution – spank the taxpayers!https://csrc.nist.gov/publications/fips/fips197/fips-197.pdfShare
From Pinterest – our favorite thing – passwords
Check out the top 25 most used and least secure passwords of 2018 and whether yours made the cut.
1. 123456 (Rank unchanged from last year)
2. password (Unchanged)
3. 123456789 (Up 3)
4. 12345678 (Down 1)
5. 12345 (Unchanged)
6. 111111 (New)
7. 1234567 (Up 1)
8. sunshine (New)
9. qwerty (Down 5)
Continue Reading →
More disconcerting news for router owners – a new assessment of 28 popular models for home users failed to find a single one with firmware that had fully enabled underlying security hardening features offered by Linux.
CITL (Cyber Independent Testing Laboratories) says it made this unexpected discovery after analysing firmware images from Asus, ...Continue Reading →