I will be presenting a cybersecurity Lunch and Learn event that is sponsored by St Paul SCORE, Wells Fargo Bank, and Computer Integration Technologies, Inc. You can register here. This event is open to the public. I hope to see you there!
When
JAN
I will be presenting a cybersecurity Lunch and Learn event that is sponsored by St Paul SCORE, Wells Fargo Bank, and Computer Integration Technologies, Inc. You can register here. This event is open to the public. I hope to see you there!
Quick answer: Yes it can! A recent article in Bloomberg goes deeply into this subject, and reveals the experiences of a white hat hacker named Billy Rios. Billy and many others in the profession had been hired by the Mayo Clinic in Rochester Minnesota in 2013 to try to hack all the medical devices in the hospital that were connected to the network. ...
American students are not learning how to write computer code, at least not at the rate that is typical in other countries such as India and China. This is extremely bad news for the U.S. economy over the long term; we are not teaching enough computer coders to fill existing jobs, much less future jobs. And more to the point, this is where ...
Passwords – Is mine strong enough? How do I know? Every time I write a password article I feel as if this subject has already been done to death by me and others. But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions:
At the November meeting of Penguins Unbound, the local Linux Users Group, I was introduced to a group of people from CryptoPartyMN. These guys and gals are serious about anonymity on the web. On of the resources they discussed was a great website called Security in a Box. If you would like to learn how to be more secure in your online communications, this is certainly ...
I am getting posts from the FBI and the Internet Crime Complaint Center (IC3), and received this interesting warning on November 18th of last year. This warning was sent to law enforcement and public officials, but if you have come to the point in your life were you are feeling a bit overexposed on the Internet, these tips can help you too.
For some of us, a few of these suggestions ...
Continue Reading →Facebook has joined the crowd of major web services that allow you to set up two-factor authentication (2FA or TFA). I just finished setting it up on my account, and I was please to see that it works with Google Authenticator. According to the instructions, it will also work with the Facebook smartphone app for Android or iPhone. Tech Republic has a great step by step tutorial, so I ...
Yes you are reading the headline correctly, and no I am not out of my mind. The current crop of Microsoft products including the Windows 7, 8.1, and 10 operating systems are some of the best products in their class from a cybersecurity standpoint. This is according to a recent article in the New York Times, as well as from Microsoft’s ...
One of the security practices that I am always looking for is two-factor or multi-factor authentication. This is when you need a user name, a password, and a special code or device to provide the second authentication factor.
I have been using Google Authenticator with my extensive set Google accounts and with the password manager LastPass. I was happy to learn that I can ...
Continue Reading →Adobe’s Flash program has been a security nightmare. A favorite among malware writers for ages, Flash is useful for doing things like creating fake security pop-up alerts and conning computer users into buying security programs that don’t work and carry malicious content. And it seems that there is another “zero-day” vulnerability discovered every three days.
Do we really need Flash? No we don’t. iPhones and ...
Continue Reading →