What the Heck is a Watering Hole Attack?

We’ve all seen this on National Geographic.  A lion, tiger, or other top predator hides near a water hole and waits for some sort of four-legged lunch to stop by for a drink.  Cyber-criminals and other attackers are using a similar technique to download and install malware from niche or industry specific websites to computer systems at targeted businesses.  Here’s how ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


20 Worst Passwords of 2017

Nearly identical to last year’s list.  Some people never learn.  If you are using any of these passwords, please change them now!


Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course from Heimdal Security.


Microsoft Word slams ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Made a Fortune in BitCoin?  Be careful who you tell.

From Naked Security – Crypto Coins Robbed at Gunpoint.

Good old fashioned stick-ups still a possibility.


Watch out – fake support scams are alive and well this Christmas

Fake support scams – where the crooks help you “remove” malware you don’t have – are still a ...

Continue Reading →
0

Identity Theft: It’s Not Going Away

A guest post by Megan Wells from InvestmentZen.com

Identity theft. Those words are enough to start the heart racing. You think, “How can this be? I do everything possible to protect my private information.” Yes, and the criminals always seem to be one step ahead.

Recent financial industry changes like EMV (chip cards), reduced card-cloning in retail stores and some restaurants, but gas stations’ deadline for conversion is ...

Continue Reading →
0

Integrated Password Managers – Apple iCloud Keychain

On Wednesday, we looked at the built-in password manager provided by Google Smart Lock.  Today we will review Apple’s iCloud Keychain.  Keychain works automatically with iPhones, iPads, and Macs, and is shared an updated to all your devices automatically.  Most of the Apple users I talk to are familiar with Keychain.  Keychain works with devices that are ...

Continue Reading →
0

Google Offers Advanced Protection Program for High Risk Individuals

If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.

Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Today is Veterans Day – Thanks for Your Service

Veteran’s day is a remembrance of all U.S. military veterans – past and present. It is celebrated every November 11th, and has been a federal holiday since 1926.


Protecting Critical Infrastructure from Cyber Threats

10/31/2017 08:14 AM EDT  Original release date: October 31, 2017

Building resilience in critical ...

Continue Reading →
0

Details on New Email Exploit – No Attachment Required

People often ask me if it is dangerous to simply open an email, if it is possible to get a malware inflection just by reading an email.  My answer has been a qualified “not at this time.”  Unfortunately, this is no longer true.  It is possible to get a malware installation from the new DDE (Dynamic Data Exchange) exploits reveal by Sophos Labs on October 13 2017.  This can be accomplished without an attachment or link if the email is ...

Continue Reading →
0

Dragonfly Wants To Punch Our Lights Out? Round Four

Over the last four posts, we have focused on the US-CERT alert, but cybersecurity firm Symantec has actually been working this case since 2011.  Their report on Dragonfly can be found on their website.  While they are cautous when providing attribution, reading between the lines indicates that Dragonfly is probably a Russian based group, possibly working on ...

Continue Reading →
1
Page 27 of 30 «...10202526272829...»