Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 things you might not know about modern ransomware and how Nefilim makes money

Trend Micro case study explains how the new business model works and how the multistep attacks unfold.  A must read.


How could the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The Latest Scams You Need to Be Aware Of

While you always need to be wary of scammers and the methods they use, you may want to approach situations with an extra level of scrutiny during the ongoing COVID-19 (coronavirus) crisis. Fraudsters know people are more vulnerable to scams when they’re desperate, ...

Continue Reading →
0

Can Your Wireless Keyboard Be Hacked?

Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless link is protected with some form of encryption.  Last week I was teaching a CISSP class, and we were discussing the security vulnerabilities inherent in wireless networking, when one of the students asked if wireless keyboards are secure.  The research I did while answering ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Safety and Security While Video Conferencing with Zoom

With much of the world shifting to working from home due to public health concerns with COVID-19, video conferencing is booming. Businesses, and even schools, are turning to platforms such as Zoom, Microsoft Teams, Google hangouts and other technologies to stay connected.


5 things ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[INFOGRAPHIC] Introducing The Psychology of Passwords

From LastPass – It feels like almost every day there’s another data breach in the news, or a case of user credentials up for sale on the Dark Web. Despite the headlines, and repeated warnings from experts about weak passwords and the dangers of password reuse, users have yet to change their ...

Continue Reading →
0

Two Easy Ways To Breach Company Networks

Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and even information technology.  All of the companies were breached with little difficulty.  The two easiest methods of unauthorized network access were not terribly surprising:  Wi-Fi networks, and company employees.

Continue Reading →
0

WPA3 Encryption to Improve Wi-Fi Security

With the expanded use of wireless networks connecting business computers, home computers, smartphone and tablets, and the ever expanding list of smart IoT devices, strong wireless network security is more important than ever.  Fortunately there is a new wireless security protocol, WPA3, that will fix some of the weaknesses inherent in the current standard, WPA2.

Wireless security is all ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


“Ghosting” is making the hiring process harder.

You found the perfect candidate and are ready to make an offer, then your “purple unicorn” stops responding to phone calls, texts, and emails.  What gives?  Not a tech issue, but more an HR issue.  Still, if you can’t find qualified technical staff, this might be an issue.


Continue Reading →
0

Page 1 of 3 123