7 Steps For Securing Your Email Account

EmailIf you  are using Gmail, Yahoo Mail, or any flavor of Microsoft mail (Outlook.com, MSN, Hotmail, etc.) there are additional steps you should take to ensure that your email is not only secure, but that in the event your email account is hijacked and taken over by bad actors on the web, that you can recover it with a minimum of inconvenience.  Here are the steps:

  1. Create a strong ...
Continue Reading →
0

Is My Flashlight App Spying On Me?

There has been a bit of a dust up on the Internet over a video from Fox News between journalist Bret Baier and security consultant Gary Miliefsky, SnoopWall CEO.  In the interview Gary claims that the top ten smartphone flashlight apps are collecting information on the user and sending it to foreign countries such as India, Russia, and China.  He states that this information is probably being used to mount cyber-attacks against American assets.  interestingly enough his ...

Continue Reading →
0

Application Whitelisting–Anti-Malware Solution

The problem with preventing or blocking malware exploits is two-fold.  The first issue, frankly, is that the opponents and the tools they are deploying are just so damn good.  This is distressing, and has changed the defensive game from blocking and tackling (prevention) to one of constant vigilance, early detection, and quick recovery.  Basically, we have conceded the network edge, and are fighting the battle from inside the network perimeter.

Continue Reading →
0

Should Your Business Have Cyber-Insurance?

Short answer, probably.  In a guest blog on Virus Bulletin, Sorin Mustaca takes a look at this issue, and unfortunately does not develop a real conclusion to his opening question.  Nevertheless, his article is a great read if you are beginning to think about this issue, because it goes into detail about how cyber risks might be assessed by an insurer, and steps the insured business entity can take to mitigate risk, or that the insurer may require ...

Continue Reading →
0

Sunday Funnies: Competition

Here is another contribution from Aaron Miller and the people at Miller Auto Repair in Somerset Wisconsin.

Fighting competition

The shopkeeper was dismayed when a brand new business much like his own opened up next door and erected a huge sign which read BEST DEALS.  He was horrified when another competitor opened up on his right, and announced its arrival with an even larger sign, reading LOWEST PRICES. The shopkeeper was panicked, until he got an idea. He put the biggest sign ...

Continue Reading →
0

Your Wireless Router–How Hackable Is It?

An event at DEF CON 22, called “SOHOpelessly Broken” took a look at how easy it might be to crack eleven popular small office /home office wireless routers and access points.  The losers are listed below – these you might want to avoid.

  • Asus AC66U – #7 in top selling computer routers on Amazon at the time of this post.
  • Netgear WNDR-4700
  • DLink 865L
  • Belkin N900
  • Linksys EA6500
  • Trendnet TEW-812DRU
  • Actiontec Q1000

So the bad news – seven of the ...

Continue Reading →
0

2014–Year of the Data Breach

And now it is Staples.  And before that Kmart.  And before that Home Depot.  And Cub Foods, and Dairy Queen.  List is extremely long, and most of the time the cyber-crooks are using the same exploit package that took down Target.  If it seems to you that the security environment has never been worse, you a right.  To date in 2013 and 2014 91 retailers have been hacked for customer credit card information.  (up from 77 in since September 9!)  ...

Continue Reading →
0

Data Breaches–What Should I Do?

I just learned that my credit- and debit-card information was part of a data breach.  What should I do?

Now, more than ever, consumers are relying on the convenience of credit and debit cards to make everyday purchases, such as gas and groceries, and to make online purchases. With this convenience, however, comes the risk of having your account information compromised by a data breach.

In recent years, data ...

Continue Reading →
0

Yahoo and Google Partner on Secure Email

A recent post on Silicon Beat detail how Google and Yahoo are working on a “spy-free” email service that will us PGP (Pretty Good Privacy) encryption to keep prying eyes such as your government, cyber-criminals, your employer, even Yahoo and Google themselves, from being able to capture and read your email.

We will be keeping an eye on this development, a report further news when it is available.  You can read more on Silicon Beat or this Continue Reading →

0
Page 80 of 127 «...5060707879808182...»