Sunday Funnies: Competition

Here is another contribution from Aaron Miller and the people at Miller Auto Repair in Somerset Wisconsin.

Fighting competition

The shopkeeper was dismayed when a brand new business much like his own opened up next door and erected a huge sign which read BEST DEALS.  He was horrified when another competitor opened up on his right, and announced its arrival with an even larger sign, reading LOWEST PRICES. The shopkeeper was panicked, until he got an idea. He put the biggest sign ...

Continue Reading →
0

Your Wireless Router–How Hackable Is It?

An event at DEF CON 22, called “SOHOpelessly Broken” took a look at how easy it might be to crack eleven popular small office /home office wireless routers and access points.  The losers are listed below – these you might want to avoid.

  • Asus AC66U – #7 in top selling computer routers on Amazon at the time of this post.
  • Netgear WNDR-4700
  • DLink 865L
  • Belkin N900
  • Linksys EA6500
  • Trendnet TEW-812DRU
  • Actiontec Q1000

So the bad news – seven of the ...

Continue Reading →
0

2014–Year of the Data Breach

And now it is Staples.  And before that Kmart.  And before that Home Depot.  And Cub Foods, and Dairy Queen.  List is extremely long, and most of the time the cyber-crooks are using the same exploit package that took down Target.  If it seems to you that the security environment has never been worse, you a right.  To date in 2013 and 2014 91 retailers have been hacked for customer credit card information.  (up from 77 in since September 9!)  ...

Continue Reading →
0

Data Breaches–What Should I Do?

I just learned that my credit- and debit-card information was part of a data breach.  What should I do?

Now, more than ever, consumers are relying on the convenience of credit and debit cards to make everyday purchases, such as gas and groceries, and to make online purchases. With this convenience, however, comes the risk of having your account information compromised by a data breach.

In recent years, data ...

Continue Reading →
0

Yahoo and Google Partner on Secure Email

A recent post on Silicon Beat detail how Google and Yahoo are working on a “spy-free” email service that will us PGP (Pretty Good Privacy) encryption to keep prying eyes such as your government, cyber-criminals, your employer, even Yahoo and Google themselves, from being able to capture and read your email.

We will be keeping an eye on this development, a report further news when it is available.  You can read more on Silicon Beat or this Continue Reading →

0

Who Hacked My Computer Network? Its Your Employees

The was a short article that appeared in Silicon Beat that reiterates something I have been recommending for a long time.  The weakest point of entry into your computer network is your all too human employees.  The study found that 31% of cyber attacks start out from “unintended disclosures.”  Usually what has happened is that an employee has read and responded to some sort of clever phishing email, and provided user credentials to the network.  Another 24% were ...

Continue Reading →
0

Poor Excuses For Avoiding Security

If you are using any of these excuses in your business you are likely already in trouble.  Don’t say we didn’t warn you!

  1. I’m too small to be a target.  Sorry, but false.  Small and medium size businesses are seen as prime targets by my cyber-crime organizations just because they are usually poorly defended, easy to hack, and have assets worth the effort.  If you have cash in a bank account, that can be enough to attract an attack.
  2. Internet security ...
Continue Reading →
0

Advanced Evasion Techniques and Advanced Persistent Threats

In a previous article we discussed a bit about how Advanced Persistent Threats (APT) were making network defense more challenging for cybersecurity professionals.  A recent article on TechRepbulic takes a look at how Advanced Evasion Techniques (AET) are being used by cyber attackers to make APTs harder to discover.

aet-2.png

The illustration shows how AETs work, by cutting the exploit code into smaller pieces (fragmentation) and sending them on unexpected ports (obfuscation) in order to ...

Continue Reading →
0
Page 10 of 49 «...89101112...»