Search Results for "cyber war"


  • D-Link Does Bad Security Again
    A security research found 10 “critical” security flaws in a popular D-Link wireless router.  This is not the first time that poor security has painted this company with the ugly stick.  They have previously been sued by the Federal Trade Commission, and we have reported about their def...
  • An Interesting New Twist on WordPress Site Hijacking
    This story reads like fiction.  OK, not great fiction, but this story illustrates another way that WordPress websites can be hijacked and used to promote a cyber scam. WordPress websites are often hijacked so a phisher can host their landing page on a site that does not lead back to them.  And Wor...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Yahoo! braces itself for enormous class-action suit over breaches A court ruling means that Yahoo! and its parent company, Verizon, could end paying a heavy price for the huge breaches that saw more than 1 billion peopleR...
  • Onliner Spambot Uses List of 711 Million Email Accounts
    Is your email address one of the 711 million emails that are being used by the Onliner spam-bot?  I checked my email address at Have I Been Pwned and found it on the list.  You can click through the link and see if yours is on the Onliner list, or part of some other breach. Onliner is currently r...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Talk Like A Pirate Day Coming on September 19 We will start with the good stuff for a change.  Talk Like A Pirate Day is my second favorite unofficial Holiday.  Check out the official website.  Check out the cool pirate s...
  • WireX Turns Android Phones into DDoS Botnet
    WireX is a new botnet that runs on hijacked and compromised Android phones.  A bot-net is a collection of compromised devices that can be coordinated by the hijacker to work together on a certain task.  It might be bit-coin mining, or password cracking, or other tasks that require a lot of process...
  • What You Can Do After The Equifax Breach
    Wanted for insider trading and consumer fraud, and impersonating someone who gives a damn about information security. The Equifax breach has been all over the news this weekend, and it should be.  This is worse than they are telling us.  It most certainly DOES affect you, if you are adult and ha...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Equifax Security Breach Is A Complete Disaster… And Will Almost Certainly Get Worse ‘Pulse wave’ DDoS – another way of blasting sites offline If there’s one thing we’ve learned, it’s that any n...
  • Phishing Protection In Outlook and Office 365
    There are four ways that a typical business user on a Microsoft Outlook/Exchange/Office 365 platform can utilize.  While these may not be perfect, and all of them have issues, applying these solutions will help prevent your users for falling victim to phishing emails.  These solutions are additive...
  • Autonomous Robotic Weapons
    We already have some highly sophisticated weapons systems that use computer technology and electronics to do things on a battlefield undreamed of even a few decades ago.  This does include robotic weapons systems.  The important ingredient in all this tech is the presence of human control.  At th...
Page 120 of 148 «...90100110118119120121122...»