Your Laser Printer/Copier Hides Metadata on Your Document

Some people know that larger laser jet copiers and printers contain a hard drive that stores an image of everything that was printed or copied, and that these images can be used forensically to find the source of a document.  Did you know that color laser printers and copiers print tiny invisible dots of information on each sheet of paper that passes through ...

Continue Reading →
1

WPA3 Encryption to Improve Wi-Fi Security

With the expanded use of wireless networks connecting business computers, home computers, smartphone and tablets, and the ever expanding list of smart IoT devices, strong wireless network security is more important than ever.  Fortunately there is a new wireless security protocol, WPA3, that will fix some of the weaknesses inherent in the current standard, WPA2.

Wireless security is all ...

Continue Reading →
0

How to Read Your Credit Report

Since the Equifax breach, we have all become painfully aware that our personal credit information is in the wild.  Identity theft is something that could happen to any of us.  Even the FBI, in a recently released report, says, “Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen.”

There is little any of us can do about the information ...

Continue Reading →
0

Tales from the Crypt – Part 2

What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking?  Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking.  Today we will learn how to secure our computers, devices, and networks from this new exploit.

Target devices.  Really, any device with a network connection and a CPU is vulnerable ...

Continue Reading →
0

Tales from the Crypt – Part 1

Tales from the Crypt was the name of a series of E.C. Comics in the 1950s.  They were the inspiration for a TV show of the same name that ran for 7 seasons and 93 episodes on HBO from 1989 to 1996.  In 2018, the new tales of the crypt involve weird sounding terms such as crypto-currency, crypto-mining, and crypto-jacking.  ...

Continue Reading →
0

Securing Networking Infrastructure Against Global Threats

Just how secure are the servers, routers and other high end hardware that is running the global Internet?  This is a question posed in a pair of recent articles from US-CERT, the US Computer Emergency Readiness Team.

Because of the significant skills and capabilities of organized cyber-criminals, politically motivated hacker collectives, nation-state cyber armies and similar threat sources, operators of global network systems ...

Continue Reading →
0

Phishing on Facebook – Angler Phishing

Cyber-criminals are masquerading as customer service sites on Facebook, luring disgruntled customers to their Facebook page in order to trick them into divulging their user name, password, and other personal information.  This is called “angler phishing.”

The way this usually works is this.  Let’s say you have a bad experience with your bank.  Then you write and post a negative comment on Facebook or Twitter about bad service you received at your bank, for example.  A cyber-crime crew will be searching ...

Continue Reading →
0

Protect Your Business from Cyber-Scams

Two weeks ago we reported on the most common cyber-scams targeting individuals like you and me.  But businesses are also in the cross-hairs of scammers.  A recent effort by the Federal Trade Commission and the Better Business Bureau has created some resources to help small business owners and managers learn how to protect themselves from these scams.

It is important ...

Continue Reading →
0

WordPress JetPack Exploit Hijacks Websites for Tech-Support Scam

Bad actors are using compromised WordPress.com accounts and the popular Jetpack plugin to add a malicious plug-in of their own that turns compromised websites into a vehicle for perpetrating a fake tech support scam.  Attackers are using stolen user names and passwords from other breaches and trying these credentials on WordPress.com to find accounts.  They are even searching whois records for website domain names registered with the same email account as the stolen user name.

Continue Reading →
0
Page 51 of 107 «...2030404950515253...»