Guest Post – The Ultimate Online Privacy Guide Part 1

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scooped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we open a three part ...

Continue Reading →
0

New Attacks Against SCADA, ICS, and Industrial Safety Control Systems

This can’t be good.  Klaxons sounding at the chemical plant only meant one thing, that the automatic safety systems were not working and that a dangerous explosion was immanent.  The explosion would release a toxic cloud of hydrogen sulfide gas that would kill everyone at the plant and hundreds of people living nearby.

A movie scene?  A spy novel plot?  Unfortunately not, this is an actual event that took place in ...

Continue Reading →
0

Personal and Business Uses for Keyloggers.

Would you like to use a keylogger to spy on your spouse?  How about your kids?  Is it legal?  Can an employer use a keylogger to monitor employee computer activity in the workplace?

Usually, when I am discussing keyloggers, it is the kind of keylogger a cyber-criminal would use, and how to keep them off our computer.  Today we are looking at this from another angle.

A keylogger, if you don’t know, ...

Continue Reading →
0

Cybersecurity Basics for Small Businesses

If you are a small business owner or manager, you have a target on your back.   You face a special set of risks from cyber-crime exploits.  Most often, you do not have the financial resources to afford a full time IT support employee.  You do not have the budget for expensive Intrusion Prevention Systems (IPS), or Security Information and Event Management (SIEM) systems.  You might not even have a firewall, ...

Continue Reading →
0

Cybersecurity Basics

It’s April Fools Day, and in honor of those people who are still trading away safety for convenience when working with a computer or online, we have a short list of simple and basic security methods.  If you are someone who provides “tech support” for a family member or are the “go-to” unofficial tech support in a small business, this is a good place to start.

Behaviors

This is simple stuff, but ...

Continue Reading →
1

The NSA Releases Reverse Engineering Tool

Here’s a kick in the head.  Your tax dollars at work in a way that may save you a bunch of money.  The National Security Agency has voluntarily released a software reverse engineering tool called Ghidra at the RSA security conference.  The NSA has been using this tool internally to take apart and analyze malicious code, and to find vulnerabilities in commercial ...

Continue Reading →
0

Docker Vulnerability Allows Crypto-Miner Access

If you are running a fleet of virtual machines using popular containerization solution Docker, you may be in for a nasty surprise.  A couple of vulnerabilities have been discovered in Docker that has been exploited by cyber-criminals to run the Monero crypto-currency miner on affected Docker containers.  This will of course have a serious impact on performance, and in an environment where billing is usage based, this will increase your ...

Continue Reading →
0

WyzGuys the the Press

I am showing up online in places other than this blog, and I wanted to share two of the most recent mentions.

I was interviewed for an articles in Financier World magazine, and the article appears in the April 2019 issue.  The article is titled Cyber posture: the value proposition of security.

I recently reported on New WordPress Security Options, and my article was picked up and republished ...

Continue Reading →
0

Technology Milestones In The News

This month marks the 30th anniversary of the World Wide Web.  It is also the 50th anniversary of the Apollo space flight missions to the moon and back.  More recently, the successful unmanned mission by the Space-X Crewed Dragon command module to the International Space Station, we finally see space flight becoming a business as opposed to being strictly a governmental exercise.

The underlying protocol of the web, and really all ...

Continue Reading →
0
Page 12 of 61 «...1011121314...»