Secure Your Android Phone

Image result for android logoAccording to a November 20th post in the New York Times Bits blog, Android phone users need to be protecting themselves from a sophisticated class of malware called NotCompatible.  This malware has been on the loose for a couple of years, and is installed either as a drive-by downloaded from an infected web page, or more recently as a “security patch” delivered ...

Continue Reading →
0

Best Job Sites for IT Pros

Let’s say one of your New Year’s Resolutions is to get a better job in 2015.  If you are an IT professional looking for your next employment opportunity, below is a short list of employments sites, many that specialize exclusively in information technology jobs.  For those of you who are looking at information security as a career move, be aware that there is a –7% unemployment rate in this sector.  That’s right, there are 7% more jobs than qualified applicants ...

Continue Reading →
0

Detecting Point of Sale Malware

Every day seems to bring a fresh report of yet another POS breach and the release of yet another batch of credit card numbers stolen by one of the variants of the BackOff point of sale exploit. You have to be asking yourself at this point why haven’t security companies been able to come up with a way to detect and remove this malware?  It has been around ...

Continue Reading →
0

How to Remove Government Sponsored Spyware

imageIn addition to the traditional malware problems that we face from the cyber-criminals that are after your computer, your money, and your identity, we are now faced with a similar threat from governments both foreign and domestic.  How do you know if your computer is under government surveillance? Software developer ...

Continue Reading →
0

FTC Takes Down Fake Telephone Support Operations

screen shot showing "errors" on computerYou are on your computer and get a pop-up telling you that your computer is horribly infected, and that you need to buy this special malware remover to fix your computer.  During the installation process you are told to call an 800 number to complete registration and activation.  $300 later, you have allowed the bad guys to install remote access software ...

Continue Reading →
0

Is Windows Defender Good Enough?

windowsdefender_lead_w_180[1]Windows 8 and 8.1 come with a security software product preinstalled in the operating system, Microsoft’s Windows Defender.  This is an extension of the Microsoft Security Essentials products that has been freely available for some time.  Most computer manufacturers continue to sell Windows 8.1 systems with other security products from ...

Continue Reading →
0

Sunday Funnies–Etymology Division

The problem with following someone is you never really know where you are going to end up.  So it goes today, in a post where the old English major pops back to life.  I have always been fascinated with where words come from, and how then change over time.  Found the following article by way of Silicon Beat.  I rarely repost something in it’s entirety like this, but it happens.  Hope you enjoy.

This article is courtesy of Mental ...

Continue Reading →
1

Five Methods of Two Factor Authentication

The password may not be dead, but it is on life support, and the prognosis is bad.  Death is not only inevitable, it is immanent.  The increasing power of password cracking software and machines, and the proliferation of complete Rainbow tables of solved passwords on the Dark Web markets mean your clever 8, 9 or 10 character password probably has been cracked already and is for sale on the Internet.

One solution to this situation has been the increased use of ...

Continue Reading →
0

Peeling the Onion: How the FBI Hacked TOR

The FBI and other international law enforcement agencies recently scored a big coup in Operation Onymous.  They managed to track down and shutter over 410 services running 27 dark web markets including the notorious Silk Road 2.0.  These operations were all running on the “Dark Web” and using TOR (The Onion Router) and it’s huge network of proxy servers to obscure their Internet address and hide the physical location of their illegal operations from discovery.

Continue Reading →

0
Page 7 of 49 «...56789...»