Zero Days – Documentary About Cyber War

zero-daysWe have written about Stuxnet a couple of times.  (Here and here)  My fascination with this incredible piece of malware writing is that it represents the first documented case of cyber war between nation-states.  As we now know, Iran, specifically the nuclear facility at Natanz, was attacked by the United States, and our ally Israel.  I recently watched a documentary ...

Continue Reading →
1

What is The Dark Web?

dark-web-1When I am doing a cybersecurity presentation, someone is bound to ask about the Dark Web.  What is it, exactly, and how does someone get there?  The how part we discussed on Friday.  Linux Tails is a great tool for accessing and browsing the Dark Web, should you be so inclined.  Before we delve into the Dark Web, let’s talk about the different parts of the web.

  • The Clear Web – ...
Continue Reading →
0

October is Cybersecurity Awareness Month

DHSFrom the Department of Homeland Security website:  “October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events ...

Continue Reading →
0

Use Linux Tails for Privacy

Linux-TailsYou don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy.  Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook.  Maybe you would like a little privacy in your online life.

Linux Tails is ...

Continue Reading →
0

Using The Risk Equation To Set Security Priorities

risk-equationUntil recently most cybersecurity efforts focused on prevention, and this created the anti-malware software, firewall and perimeter defense industries.  But the fact of the matter is that cyber-attackers are going fly right past your perimeter defense and get into your network via port 80 or 110, firewall ports that are open on every network for email and web browsing.  our recommendation is to start managing the consequences of the inevitable security breach. ...

Continue Reading →
0

Mobile Security Tips

smartphone-securityAs we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important.  Smartphones, tablets, wearable tech,  and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off.  When these devices are stolen, you lose much more than the hardware.  Every bit of information on the device is up for grabs too, from contact lists, personal information, ...

Continue Reading →
0

Sunday Funnies: Good Luck!

Another funny sign from Pinterest.  This has special meaning to Americans as we approach the upcoming Presidential Elections.  By the way, Gary Johnson, the Libertarian candidate for President would be a better way to squander your vote this year rather than wasting it on either of the major party candidates.  Just saying….you are going to be wasting that vote anyway, how about we try something new?  The Republican party was a minor party right up to the point ...

Continue Reading →
0
Page 6 of 23 «...45678...»