Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Bug fixes, patching, and update edition

Seems to be a lot of bug fixes going around.  Patches and updates are a critical part of good security.  Here are a few important ones.


Bug Bounty Programs Are Being Used to Buy Silence

Investigative report on how commercial bug-bounty programs like HackerOne, Bugcrowd, and SynAck are being used ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Netflix account freeze – don’t click, it’s a scam!

The telltale signs are all there… but if you’re in a hurry, this Netflix scam passes the “visual appeal” test.


National Tax Security Awareness Week is December 2–6

Original release date: November 19, 2019

The Internal Revenue Service (IRS) has released an article announcing that National ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FSB hackers drop files online

Russia is working to de-anonymize TOR.  A hacking group that distributed files stolen from a Russian contractor to the media last week has published some of the documents online.


IRS Reminds Tax Professionals: Create a Data Security Plan

Original release date: July 24, 2019

The Internal Revenue Service (IRS) has ...

Continue Reading →
0

Best Web Browsers for Private or Anonymous Browsing part 2

In our last post we kicked off a review of web browsers and other services that provide improved security, privacy protection, and anonymity when traveling on the web.  Today we wrap up our report.  The last three items in our list are not technically a browser, but provide unique solutions to privacy and anonymity that we thought were worthy of inclusion..

Continue Reading →

0

Best Web Browsers for Private or Anonymous Browsing part 1

There has been a lot of new information about secure web browsing crossing my desktop lately.  Back in May, we wrote a series of articles about browser hacking and hijacking, which described in depth the dangers to our privacy and anonymity that we face when we are casually web browsing.  In this article we are going to be looking at secure ...

Continue Reading →
1

Blocking Is Not Just For Football

Blocking is used in football to prevent the opposing defense from tackling your quarterback or running back.  In cybersecurity, blocking can be used to prevent attacks from malicious sources.  Today  and Friday we will look at several blocking tactics:  IP blocking, geo-blocking, sender blocking, and domain blocking.

IP Blocking

Every time your computer connects to another computer or web server, there is an exchange of information that happens, including an exchange of IP ...

Continue Reading →
0
Page 1 of 2 12