Why The Bad Guys Love Ransomware

Crypto-ransomware continues to be one of the most popular money making exploits for cyber criminals.  The reason for this is simple; its works, and the return on investment is quite high.  According to a recent article in Naked Security, the score will reach $1 billion in 2017.

A poll by the IBM company found that nearly 50% of the businesses polled had been hit by ransomware, and of those 70% paid ...

Continue Reading →
0

Sunday Funnies – British Tech Slang

Thanks to Quartz for this list.  I have posted just the tech slang, so be sure to click through for the full list.

  • Baklava code
    A piece of code that has too many layers, borrowing its name from the multi-layered, sweet pastry.
  • RTFM, PICNIC
    Two acronyms deployed by frustrated tech support workers when dealing with customers flummoxed by simple problems. RTFM is code for “read the freaking manual,” while PICNIC refers to “problem in chair, not in computer.”
  • Angry fruit salad
Continue Reading →
0

Netgear Routers Will Need Firmware Update.

If you own a Netgear wireless router, especially the R6200, R6250, R6400, R6700, R6900, R7000, R7100LG, R7300, R7900, R8000, D6220, and D6400 routers and possibly other models are vulnerable to arbitrary command injection.  This is a security bug that could allow a remote attacker to access your router.  This vulnerability was announced by US-CERT on December 9th, and reported in Naked Security on December 12th.

Vulnerabilities such as this one ...

Continue Reading →
1

Start Your Cybersecurity Plan

There are a number of great frameworks for developing your cybersecurity plan.  Two of our favorites are the NIST-CSF and the 20 CIS Controls.  We have written about these excellent tools before here (CIS Controls) and here (NIST-CSF).

Back in December we received an email from Pete Herzog of ISECOM about a new, open-source methodology manual for cybersecurity defense. ...

Continue Reading →
0

Watch Out For Fake Mobile Apps

The Federal Trade Commission recently released an warning about fraudulent mobile apps.  These apps are designed to steal personal information such as user names, passwords, credit card numbers, and other personal information.

My advise is to always get your app from an authorized app store, such as the Apple Store or the Google Store.  These apps have been tested for the most part.

Another idea to ...

Continue Reading →
0

The Russians Are Coming! Or Are They?

The United States recently accused the Russian government of trying to influence US elections last November, and has expelled 35 Russian diplomatic officials and closed two Russian diplomatic facilities, one in New York City, and the other in Maryland, near Washington DC.

The Russians are denying any direct involvement, of course, and are laying the blame on Russian cyber-criminal groups.    But we have discussed ...

Continue Reading →
0

U.S. House Supports Encryption

The House Judiciary Committee’s Encryption Working Group has released a report that comes out in favor of strong encryption, and opposed to the daft notion of creating encryption  “backdoors” for law enforcement and government to use.  As we have expressed in this blog previously, the concept that the secret backdoor keys could somehow be kept securely, when nothing else seems to be able to be kept secret, is the main fatal ...

Continue Reading →
0

Crystal Ball Gazing for 2017

This is the time of the year everyone writes either a year in review article, or a what’s coming in the new year post.  Guess which one this is?  I’ve been reading the pundits, and considering my own findings as a cybersecurity professional.  I pulled together the following list for your review, and to help you plan where to spend your time, talent, and budget in 2017.

  • Continued issues with crypto-ransomware in 2017 ...
Continue Reading →
0
Page 7 of 101 «...56789...»