Is Hacktivism A Good Thing?

hacktivistHacktivism is an electronic form of civil disobedience.  These cyber-attacks are instigated for reasons that are political, economic, or based in civil rights, liberty, freedom, or social justice.  In nearly every case, these attacks are illegal.  But does that make them a bad thing?

As the saying goes, “one man’s terrorist is another man’s freedom fighter.”  Looking back on our own national history, the men who we fondly refer to as “the ...

Continue Reading →
0

Sunday Funnies: Geek Christmas Continued

Need some last minute tech gifts for your favorite tech, geek, or nerd?  Let me introduce you to The Grommet.  They have the perfect gift for the person who wants to really know what the check engine light is really trying to tell him or her.  The Automatic App Fueled Car Diagnostic is just the thing.  Just plug it into the diagnostic link connector under the dash, and check the smartphone app for more detailed information. ...

Continue Reading →
0

Fair Use Reaffirmed by Library of Congress

DMCAThere has been a running battle on the subject of copyright in the digital age, between content creators and their customers, the content consumers.  The doctrine of Fair Use has protected consumers who engage in making copies of protected works for their own use or for backup purposes.  The content creators and the companies and lawyers that serve them have been trying to reduce or restrict the doctrine of fair ...

Continue Reading →
0

Alert: WPEngine User Credentials Breached

WordPresslogoJust received an email from WordFence, the WordPress security plugin-developer, that popular WordPress hosting company WPEngine had a breach that may have included customer user name and password information.  The full text of the email I received follows.

“We learned about an hour ago that there has been a data breach at WPEngine. Some of their customer login credentials have been exposed. ...

Continue Reading →
0

Feds Create Cybersecurity Program for Banks

ffiecIf you are involved in the management of a commercial bank, The Federal Financial Institutions Examination Council (FFIEC) has developed a Cybersecurity Assessment Tool that was released in June 2015.  As a cybersecurity practitioner who provides security audits, compliance audits, vulnerability scans, and penetration tests, I was encouraged to see another example of a federal government agency getting serious about improving cybersecurity ...

Continue Reading →
0

New Tor Messenger App Offers Encrypted Communications

TORlogoThe Tor Project released the beta of their new Messenger app.  This messenging client is based on Mozilla’s Instantbird, and works with several popular messaging platforms, including Facebook Chat, Twitter, Google Talk, and Jabber.

The encryption piece is handled using Tor’s OTR Protocol (for Off-The Record), and requires that users exchange a secret key.  This is available in Windows, Linus, and OSX versions from the Tor website.

For more information:

Continue Reading →
0

US Gov Ups Its Cybersecurity Game

white-houseI was surprised to discover proof that my business is a target of cyber-criminals.  After installing some security and reporting tools on my websites, I was alerted to the almost constant state of attack that they were under.  And all I am doing is writing a cybersecurity blog.  And you, dear reader, what of your business?  There is a good chance that you are too, but simply don’t know it ...

Continue Reading →
0

Good Question

free-wifiMy Facebook friend Jeff Wegge asked:  “Security question Bob. Is the hotspot on my mobile verizon phone any more secure than public Wi-Fi?”

This is a most excellent question! Generally speaking, the mobile hotspot will be more secure for two reasons The first is that only you are likely to be using it, unless you explicitly shared the SSID (network name) and passphrase with someone else. The second reason ...

Continue Reading →
0

There Is No Perimeter

castle2Classical computer and network security has relied on perimeter defense, in the form of firewalls, intrusion detection devices, and similar technologies for quite some time.  This is usually coupled with some form of endpoint security, typically in the form of a security software package.  We are finding that this no longer is working. The reasons are many, but the big one ...

Continue Reading →
0
Page 2 of 21 12345...»