Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

Many of these articles are from Bruce Schneier’s blog


New edition of The Internet Protocol Journal available for download

I’ve been reading this journal since 2002.  If you are into networking, this is a must read, and is free of charge and free of advertising.


CISA Insights: Guidance for MSPs and Small- ...

Continue Reading →
0

Popular Marvel, DC Comics, and Star Wars Themed Passwords to Avoid

As I have been saying for years, passwords by themselves no longer represent a secure form of authentication.  This is because passwords can be easily guessed, or solved using automated password cracking techniques such as the Dictionary Attack or Brute Force Attack.  There are also pre-cracked lists of passwords called Rainbow Tables available on both the light and dark web.

There are plenty of Rainbow Table available for the most commonly ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Yes, There Really Is A Windows 11

Microsoft announces Windows 11, with a new design, Start menu, and more. A new version of Windows is officially on the way.


Urgent Alert –  WD My Book Live users wake up to find their data deleted

Storage-device maker advises customers to unplug My Book Lives ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 things you might not know about modern ransomware and how Nefilim makes money

Trend Micro case study explains how the new business model works and how the multistep attacks unfold.  A must read.


How could the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the ...

Continue Reading →
0

Cybersecurity Tips for Startups

Many people have started new businesses over the last year or so as a result of the pandemic. This could result from people reflecting about their career, looking to earn on the side, or perhaps they have lost their main job. Starting a new business is exciting, but it is vital that every entrepreneur is aware of the threat of cybercrime, particularly in 2021. Cybercrime has skyrocketed as a result of the pandemic, with so many people working remotely, and ...

Continue Reading →
0

Guest Post – What exactly does “code obfuscation” imply?

Code obfuscation is the process of modifying an executable so that it is no longer valuable to a hacker while remaining fully functioning. Although the procedure may alter method instructions or metadata, it has no impact on the program’s output. To be clear, practically any code can be reverse-engineered with enough time and effort. On a number of ...

Continue Reading →
0

Ransomware has become a successful criminal business

Ransomware is a form of malicious software designed to restrict users from accessing their computers or files until they pay a ransom to cybercriminals.  Ransomware typically operates through the crypto virology mechanism by using symmetric as well as asymmetric encryption to prevent users from performing managed file transfers or accessing particular files or directories.  The cybercriminals are using ransomware to lock files from being accessed assuming that the locked files ...

Continue Reading →
0
Page 2 of 93 12345...»