Guest Post – Mac Threats Are On The Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

For the first time, cyberthreats targeting Mac devices have outpaced those targeting Windows machines. In 2018, there was an average of 4.8 threats detected per Mac endpoint. In 2019, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Anniversary of the dedication of the ENIAC computer in 1946.

ENIAC (/ˈiːniæk,  ˈɛ-/; Electronic Numerical Integrator and Computer) was among the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve “a large class of numerical problems” through reprogramming.

ENIAC was completed in 1945 and first put to work for practical purposes on December 10, 1945.  ENIAC was formally dedicated ...

Continue Reading →
0

Infographic – The Internet of Hackable Things in Your Daily Life

Today I share an infographic provided by repeat guest poster Siege Media.  The Internet of Things is full of cool new devices that connect to the network and Internet, and can be used from distant locations.  But if used without proper security controls, these smart devices can provide an easy remote entry point for an attacker.

I have not republished the excellent article that was part of the original post, 

Continue Reading →
1

Guest Post – How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them.

Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send files to a printer or ...

Continue Reading →
0

Trusted Sources for Threat Intelligence and Cybersecurity Information

Just how in the heck does a cybersecurity professional stay on top of the rapidly evolving threat landscape, the ever changing attacks and exploits, and new security solutions? I can assure you it involves a lot of reading.

Last month the Twin Cities chapter of (ISC)2 held a meeting on the topic of trusted sources for threat intelligence.  It seemed like a great topic idea, so I decided to share my list ...

Continue Reading →
1

What The Heck Is A Zero-Day?

What is a “zero-day,” exactly?   In information security, occasionally there is a brand new cybersecurity vulnerability or exploit in the news, and the reporter calls it a “zero-day” exploit.  What are they talking about.  This is a concept similar to “patient zero” in medical epidemiology. This is where the bad thing started to happen.

A zero-day vulnerability is a flaw ...

Continue Reading →
0
Page 1 of 13 12345...»