Internet Anonymity – A Case Study

Who is Will McLauglin?  The Campaign for Privacy?  or Dennis Anon and Privacy.net?

I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them.  My next post is one of those times.  My efforts at verifying the source has been an interesting ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[INFOGRAPHIC] Introducing The Psychology of Passwords

From LastPass – It feels like almost every day there’s another data breach in the news, or a case of user credentials up for sale on the Dark Web. Despite the headlines, and repeated warnings from experts about weak passwords and the dangers of password reuse, users have yet to change their online ...

Continue Reading →
0

Data Breach – What To Do Next

Your IT manager comes to you with a look on his or her face that is a combination of panic, shock, and depression.  “We’ve been breached, and it looks like they got into the customer database, but I’m not sure how long they’ve been on our network, and what else they might have done.”  Do you know what you need to do next?

In previous articles we have covered Continue Reading →

0

The Swiss Army Knife of Hacker-ware

Have you ever wondered just what an attacker can do once they gain access to your computer?  A 21 year old software coder is facing prison time for developing the ultimate Swiss Army knife of an “administrators'” tool-kit.  This tool was sold to over 6,000 people through an extensive affiliate marketing network.  Many of his customers were cyber-criminals who used the ...

Continue Reading →
0

Inside Iran’s Operation Cleaver

While the US Cyber Command has been focusing on the Chinese, North Koreans, and the Russians, and their respective intrusions into the networks of US companies, energy utilities, our military, and government agencies, Iran has been creating a world-class cyber-ops unit of their own.  Details about what is being called “Operation Cleaver” has been released by security company Cylance.

The Iranian ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Hackers break into voting machines within 2 hours at Defcon

Hackers from around the world (not just Russia) had the rare opportunity to crack election-style voting machines this weekend in Las Vegas.


Malicious Cyber Activity Targeting ERP Applications

07/25/2018 07:55 AM EDT  Original release date: July 25, 2018

Digital Shadows ...

Continue Reading →
0

Two Easy Ways To Breach Company Networks

Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and even information technology.  All of the companies were breached with little difficulty.  The two easiest methods of unauthorized network access were not terribly surprising:  Wi-Fi networks, and company employees.

Continue Reading →
0

Preventing the Next VPN Filter Bot-Net Attack

Back on May 30, 2018 the FBI asked us all to reboot our Internet access devices, the cable and DSL modems that allow most of us to use the Internet.  Supposedly, this would remove the VPN Filter malware, if our router was infected.  This was not exactly the truth.  The FBI had taken over the “toknowall” command and control server for ...

Continue Reading →
0

Best Web Browsers for Private or Anonymous Browsing part 2

In our last post we kicked off a review of web browsers and other services that provide improved security, privacy protection, and anonymity when traveling on the web.  Today we wrap up our report.  The last three items in our list are not technically a browser, but provide unique solutions to privacy and anonymity that we thought were worthy of inclusion..

Continue Reading →

0

Best Web Browsers for Private or Anonymous Browsing part 1

There has been a lot of new information about secure web browsing crossing my desktop lately.  Back in May, we wrote a series of articles about browser hacking and hijacking, which described in depth the dangers to our privacy and anonymity that we face when we are casually web browsing.  In this article we are going to be looking at secure ...

Continue Reading →
0
Page 3 of 45 12345...»