US Cyber Command Changing the Rules of Engagement

The best defense is a good offense.  Especially if you are “defending forward.”  So what does that mean?

The US Cyber Command has a new leader.  Lt. Gen. Stephen G. Fogarty assumed command of U.S. Army Cyber Command on June 1, 2018.  His mission is to make Cyber Command more aggressive in its response to cyber-attacks on assets in the United States.  The ...

Continue Reading →
0

Using DNS Proxies for Security

What if there was a simple change you could make to your computer’s network configuration that would go a long way to protecting you from picking up malware on the Internet.  This change could even protect you from accidentally clicking on malicious links in phishing emails.  What if this simple fix could keep malware already on your computer from “phoning home” to the ...

Continue Reading →
1

Exploit Targets Info Tech Support Companies

The holy grail of a cyber-attacker is the ability to achieve remote access to a computer on a network.  It is even better when the attacker can get administrator privileges.  Then they have the ability to do anything they need to do on the compromised computer to cross the network and compromise other computers and servers.  Who has this kind of access ...

Continue Reading →
0

National Cyber Security Awareness Month

This October, National Cybersecurity Awareness Month is commemorating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online, while increasing the resiliency of the Nation during cyber-threats. DHS ...
Continue Reading →
0

Securing the Domain Name Service

One of the most important systems that makes the Internet easy to use has absolutely no security in its current form.  This means that your Internet service provider (and some others) can easily see every website that you visit. (Since  you have “nothing to hide” this should not be a problem, right?)

DNS or the Domain Name System is the networking protocol that finds websites and resources on ...

Continue Reading →
0

Anti-Malware for Linux Computers

Is Linux “safer” to use than Windows?  Is it immune to malware?  You may be under the assumption that Linux is not vulnerable to the same exploits that plague Windows systems.  If so, you would be incorrect.  Linux has its very own set of vulnerabilities and working exploits, and Linux servers and computers need anti-malware software protection just as much as their Windows counterparts.  Today we will look at some ...

Continue Reading →
1

Keeping Your Accounts Offline Is Not More Secure

You think you are the clever one because you never use the Internet for online banking, online shopping, or managing accounts like your retirement account, gas and electric utilities, telephone, cell phone, and Internet.  Open a Facebook account?  Never!  You think you are safer from account hijacking and identity theft because you never set up any online accounts.  If you don’t have it, they can’t hack it – right?  Wrong!

If ...

Continue Reading →
0

Your Tax Dollars At Work – Governmental Surveillance

We know that the US government is spying on us.  Just how deep the surveillance goes is a question that is hard to answer.  If you are one of those people who thinks this surveillance is OK because you “have nothing to hide,”  I suppose you could skip this article.  But here’s my question – why do you get upset when your identity is stolen by a cyber-criminal, but yet you are unmoved when your own government does the same ...

Continue Reading →
0

Internet Anonymity – A Case Study

Who is Will McLauglin?  The Campaign for Privacy?  or Dennis Anon and Privacy.net?

I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them.  My next post is one of those times.  My efforts at verifying the source has been an ...

Continue Reading →
0
Page 18 of 61 «...101617181920...»