Five Worst Passwords Ever!

If you are using one of these passwords, you might as well not have a password.  This is according to a recent post on the Microsoft blog.

  • Password
  • Letmein
  • Monkey
  • A pet’s name (i.e. Fluffy)
  • 12345678

This five is from another list on the CBS News website that lists the 25 most commonly used passwords in 2013.

  • 123456
  • password
  • 12345678
  • qwerty
  • abc123

Two of these passwords were common to both lists.

You may be wondering how we know what ...

Continue Reading →
0

Sunday Funnies: Josh Blue Humor

Doing Sunday Funnies on Saturday.  Sorry – by Sunday I tend to forget to do it.  Sometimes Sunday is a “laptop free day.”  Hey – it happens.

A shout out to my friend and former barber Milo David.  Yes – Colorado is too far to drive for a haircut!  Anyway he shared this on Facebook, and I couldn’t resist, since I love the movie “Taken” and kind of like the State Farm commercial.

Please do it.

0

Is Your Computer a Cyber Warrior?

According to Bruce Schneier in the September issue of his newsletter Crypto-Gram The NSA and the British counterpart the GCHQ are engaged in a worldwide port scanning operation in order to find vulnerable computers that can be recruited and turned into an ORB, or Operational Relay Box.  Basically our government is creating large “standing armies” of botnets that can be used to attack our “enemies,” real, imaginary, or otherwise.

The issue for business or personal computer users is this:  ...

Continue Reading →
0

How Does POS Malware Work?

POS malware attack 2

So in the last two years there have been over 400 retail companies, including many big national chains, that have fallen victim to the BackOff or other Point of sale (POS) malware exploits, revealing millions of credit card and customer records.  So how does this exploit work?

My friends at Calyptix Security sent me another article that should be interesting to anyone who is running a ...

Continue Reading →
0

Network Switches: Today’s Problems and the Possibilities of the Future

This article was written by guest blogger Richard Thompson.  Richard Thompson works for MilesTek which has been providing complete connectivity solutions since 1981. His goal is to provide relevant information to tech conversations across the Internet.  Richard discusses some common vulnerabilities in network switches that can be exploited by cyber-attackers.

Network switches are the hardworking hardware devices we rely on to connect computer networking devices. With so much emphasis put on developing software to combat attacks (such as ARP Spoofing), ...

Continue Reading →
0

Real Hackers Are Not Evil

The term “hacker” has been used loosely by the news media and in popular culture to refer to people who break into computers and do nasty things on networks.  Nothing could be farther from the truth.

So what is a “hacker” actually.  Last year, I attained a high level security certification that qualifies me as a “Certified Ethical Hacker.”  So I guess that means I might be a hacker.  I can assure you that I am not engaged in any sort ...

Continue Reading →
0

Macro Viruses Make a Comeback

Microsoft Office VBA macro viruses were a pretty powerful exploit back in the 1990’s, but security changes by Microsoft and other security software vendors had pretty much made them moot by 2000.  Surprisingly enough malware writes are giving them a new life by tricking users into disabling macro protection. Here is how it works:

VBA or Visual Basic for Applications is a software language created by Microsoft to allow advanced users to write bits of code called “macros.”  Macros allow a ...

Continue Reading →
0

Cybersecurity–Where Do I Start?

If you have been following this blog for a while, you may find yourself thinking that the time has definitely come to do “something” about cybersecurity in your business.  As a busy and successful entrepreneur, business owner or senior manager you may have no idea where to begin, or where you will find the time to create and implement a plan.  The National Institute for Standards and Technology (NIST) has created a 41 page roadmap for businesses to use in ...

Continue Reading →
0
Page 70 of 116 «...4050606869707172...»