VPN Encryption Protocols Explained

A VPN can provide a way to keep your location private by replacing the IP address of your ISP’s gateway router with an anonymous IP from the VPN provider’s pool.  It will prevent your ISP, or Google and other websites from discovering your location, tracking your activity online, or saving your search history.  The contents of your communications are changed from plaintext to ...

Continue Reading →
0

How to Pick a VPN

If you are looking to protect yourself and your computer communications by using a VPN, the hardest part often is knowing where to start.  There are dozens of companies providing VPN services for a fee.  How can you know which one is best for you?

There are a number of features to consider when shopping for a VPN service.  Some of the features ...

Continue Reading →
0

Russia Disconnecting From The Internet?

Russia has announced plans to temporarily “disconnect” itself from the global Internet. What does this mean for Russia, its citizens, and the rest of the world that is connected to the World Wide Web?

Russia is not the first country to disconnect the Internet.  In January the government of the Democratic Republic of Congo turned off its Internet during the presidential elections there.  ...

Continue Reading →
1

Smartphone Malware Exploits On The Rise

Lately there have been a spate of incidents involving smartphone apps for the iPhone and Android phones that were discovered to be malicious in various ways.  The important commonality in these revelations was that cyber-criminals had actually modified legitimate apps by hijacking several developer’s credentials, including their “Developer Certificate.”  The developer key provides a digital signature that validates the app as being ...

Continue Reading →
0

New Container Security Bug – Fix Now!

Virtualization and containerization technologies allow developers, pentesters, network admins and server admins to create multiple virtual instances of a computer system, running inside the actual, physical host system.  This is an easy way to quickly deploy and manage dozens or even hundreds of systems used in a learning lab, test network, or even to run full fledged user systems on a single server.

Virtual machines (VM) are created using hypervisor products ...

Continue Reading →
0

Global Cyber Threats to the United States

In our last post we singled out North Korea as a key source of cyber-war action against the United States and other countries.  But they are not the only countries that the US is actively engaged with in cyber-space.  On January 29, 2019, Daniel Coats, Director of National Intelligence, released a report to the Senate, titled Worldwide Threat Assessment ...

Continue Reading →
0

North Korean Botnet Attacked by FBI

The North Korean Cyberwar Operations group is known variously as Lazarus Group, Guardians of Peace, or Hidden Cobra. A few of their notable achievements include the 2014 attack on Sony Pictures inspired by the satirical Seth Rogan film “The Interview, ” the $81 million cyber bank heist  against Bangladesh’s central bank, and the 2017 WannaCry ransomware attack.

In June 2017, US-CERT sent a   Continue Reading →

0

Cyber Attacks Against Businesses – Frequency and Methodology

Cyber attacks against businesses, regardless of size, are increasing in the number of attacks, the types of attacks, and the costs of the attacks.  Company losses include theft of cash assets, employee identity information, stolen files and proprietary information, network downtime, loss of sales, and reputation costs.  For a small privately held business, a serious breach can put them out of business.

For ...

Continue Reading →
0
Page 42 of 107 «...1020304041424344...»