LinkedIn Passwords Found on Russian Site

linkedin-logoIf you are on LinkedIn, as I am, today is a good day to change your password.  It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website.  While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and Continue Reading →

0

Privatoria – TOR Plus

TOR, or The Onion Router is a method of surfing the Internet anonymously.  TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret.  One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.

There is a ...

Continue Reading →
0

Rombertik Malware Can Wreck Your PC

rombertikRombertik is a new password stealing malware product that works by copying everything you type into a web browser window, and basically works as a keylogger.  The goal is to steal your user credentials for online sites such as email, social network accounts, shopping accounts, and bank or other financial accounts.  This is a pretty scary bit of malicious software.  But there is more.

Rombertik has a revenge feature built into it. ...

Continue Reading →
0

Macs Need Security Too

The Mac platform has become a popular target of cyber-criminals, partly because they have increased their percentage of the personal computer marketplace from 3% to 7%, partly due to the popularity of the iPhone, and partly because the consumer demographics of Apple customers generally point to people with more money who willing spend more to get the “best.”  In any event, if you are an Apple user clinging to the belief that the Mac is invulnerable, you are wrong.  You ...

Continue Reading →
0

Sunday Funnies: I Shot The Gateway

(Sung to the Bob Marley/Eric Clapton tune “I Shot the Sheriff”)

dead-computer_550Ok, so the picture is a Dell, not a Gateway, but Dell doesn’t fit the lyric.  The story is about a man named Lucas Hitch of Colorado Springs, who found a new way to deal with the infamous Windows “Blue Screen of Death.”  He just carried the computer into the alley, whipped out ...

Continue Reading →
0

Weakest Cybersecurity Link – It’s Your Staff

coworkersAll the expensive high-tech cybersecurity goodies cannot prevent someone in your employ from clicking a malicious link in an email and opening a gateway to further network exploitation.  That is the findings of ProofPoint in The Human Factor Report 2015.  The discouraging point for those of us who advocate employee training as an important part of an overall cybersecurity strategy is that in spite of training, people are still more likely ...

Continue Reading →
0

I’ve Been Hacked – Forensic Issues

forensicsWhen you discover that one or more computers in your business has been breached, it is easy to get very excited and try to eliminate your risk by taking systems offline, and having your computer support personnel wipe the hard drive and re-install a fresh operating system and set of applications.  This is the wrong course of action if you were hoping to take legal action against the perpetrators.

Most local police ...

Continue Reading →
0
Page 70 of 127 «...4050606869707172...»