Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Guidance on Sharing Cyber Incident Information

Original release date: April 7, 2022

CISA’s Sharing Cyber Event Information Fact Sheet provides our stakeholders with clear guidance and information about what to share, who should share, and how to share information about unusual cyber incidents or activity.

CISA uses this information from partners to build a common understanding of ...

Continue Reading →
0

Do You Need a Wi-Fi Extender?

You probably deal with enough distractions when working from home, and spotty internet service shouldn’t be one of them. If you suffer from an unreliable connection, a network extender (also known as a WiFi extender, range extender, booster, or repeater) could help by extending the reach of your home’s WiFi network.

While a booster can improve coverage if you have a dead zone or two, it will not increase your bandwidth or speed, and it can blanket every part of a ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Yes, There Really Is A Windows 11

Microsoft announces Windows 11, with a new design, Start menu, and more. A new version of Windows is officially on the way.


Urgent Alert –  WD My Book Live users wake up to find their data deleted

Storage-device maker advises customers to unplug My Book Lives ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Some good news for a change.

3 Native American tribes use Nokia tech to bring 4G and 5G to remote towns in four states

Tribes in Oklahoma, North and South Dakota, and California will use hardware originally designed for private 5G networks.


FBI-DHS-CISA Joint Advisory on Russian Foreign Intelligence Service Cyber Operations

Original release date: April ...

Continue Reading →
0

Can Your Wireless Keyboard Be Hacked?

Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless link is protected with some form of encryption.  Last week I was teaching a CISSP class, and we were discussing the security vulnerabilities inherent in wireless networking, when one of the students asked if wireless keyboards are secure.  The research I did while answering ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Bogus Security Technology: An Anti-5G USB Stick

[2020.05.29] The 5GBioShield sells for £339.60, and the description sounds like snake oil:

…its website, which describes it as a USB key that “provides protection for your home and family, thanks to the wearable holographic nano-layer catalyser, which can be worn or ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


[INFOGRAPHIC] Introducing The Psychology of Passwords

From LastPass – It feels like almost every day there’s another data breach in the news, or a case of user credentials up for sale on the Dark Web. Despite the headlines, and repeated warnings from experts about weak passwords and the dangers of password reuse, users have yet to change their ...

Continue Reading →
0

Two Easy Ways To Breach Company Networks

Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and even information technology.  All of the companies were breached with little difficulty.  The two easiest methods of unauthorized network access were not terribly surprising:  Wi-Fi networks, and company employees.

Continue Reading →
0
Page 1 of 4 1234