From BackgroundCheck.orgContinue Reading →
09/14/2018 02:19 PM EDT
NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, attachments, ...Continue Reading →
We know that the US government is spying on us. Just how deep the surveillance goes is a question that is hard to answer. If you are one of those people who thinks this surveillance is OK because you “have nothing to hide,” I suppose you could skip this article. But here’s my question – why do you get upset when your identity is stolen by a cyber-criminal, but yet you are unmoved when your own government does the same ...Continue Reading →
I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them. My next post is one of those times. My efforts at verifying the source has been an interesting ...Continue Reading →
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
87% of companies experienced an ...Continue Reading →
Some people know that larger laser jet copiers and printers contain a hard drive that stores an image of everything that was printed or copied, and that these images can be used forensically to find the source of a document. Did you know that color laser printers and copiers print tiny invisible dots of information on each sheet of paper that passes through ...Continue Reading →
The S in HTTPS stands for Secure, so does the S in IoT. The stuffed toys are stuffed with security problems that we’ve known about for over a ...Continue Reading →
Did you know that most traffic across the Internet travels in an unencrypted state. And when you make an open wireless connection in a coffee bar or other public location, the radio connection is unsecured and unencrypted, too. This traffic travels as plain text, and can be read by anyone with the skills to intercept the traffic and open the data packets.
We know ...Continue Reading →
The press has been relentless lately in its coverage of Russian cyber-espionage and disinformation campaigns on Facebook and other social networks prior to the last US Presidential campaign. But is Russia the first to engage in election rigging on this sort? Hardly. We thought that looking at the state of cyber-espionage as a tactic in international relations might be interesting, and we were right. It turns out that cyber-espionage is not ...Continue Reading →
From Naked Security – Crypto Coins Robbed at Gunpoint.
Good old fashioned stick-ups still a possibility.
Fake support scams – where the crooks help you “remove” malware you don’t have – are still a real ...Continue Reading →