- Emerging technologies and the Internet of Things (IoT). It seems that all of our new toys are Internet enabled in some way, and many of these devices present a new attack surface for cyber-criminals. The ...
STOP THE MADNESS!! It drives me crazy when a client calls me AFTER spending an hour on the phone with some tech support scammer, and then thinks to call me after they have a problem “fixed” that they never had in the first place.
One of my clients recently fell for an interesting variation of the Tech Support Scam. She did a Google search to find the HP technical support number, but the company she called, while at the top of ...Continue Reading →
The newly released Windows 10 operating system comes with a feature called “Wi-Fi Sense” that I think is pretty questionable from a security standpoint. The basic idea is that, under Windows 10, when you connect to a wireless network for the first time, you have an opportunity to “share” you new wireless connection with your family, friends, and coworkers. I consider this be to a security concern. The problem as I see it is that you share your connection to ...Continue Reading →
Made me think of my favorite Parks and Recreation quote:
Continue Reading →
“I enjoy government functions like I enjoy getting kicked in the nuggets with a steel toed boot. But this hotel always served bacon wrapped shrimp. That’s my number one favorite food wrapped around my number three favorite food. I’d go ...
One of the major trends in technology is the proliferation of smart devices, also known as the Internet of Things (IOT). The FBI recently released a public service announcement titled “Internet of Things Poses Opportunites For Cyber Crime.” More and more devices are are coming with software, processors and network capability, and connecting to our home and business ...Continue Reading →
I know I usually focus on writing articles that are useful to the average business owner or computer user, but I received something in my inbox recently that I just have to share. This is from another blog on Postmodern Security titled “MALWARE ANALYSIS AND INCIDENT RESPONSE TOOLS FOR THE FRUGAL AND LAZY”. If you are a cybersecurity professional you ...Continue Reading →
Back on Sept 18 we criticized presidential candidate Jeb Bush, FBI Director James Comey, and other politicians for complaining that encryption was making it too hard to fight the “evil doers” and suggesting that some sort of “master key” or “backdoor” was needed by law enforcement and intelligence services to do their jobs. We of course disagreed.
Around the same time that ...Continue Reading →
The number one method used by cyber-criminals to infect your PC with malware is the phishing email. Today we will show you how to check out suspicious emails yourself. These cleverly designed emails encourage you to open an attachment or click on and website link in order to download and install their malicious applications and exploits. I recently received the email below, and as an exercise, checked it out on ...Continue Reading →