Getting Certified? Here’s How to Prepare for Your Exam

You have been diligently studying the material in preparation for the exam.  The next step is to start practicing in a simulated exam environment, so you get comfortable with the look and feel of the testing environment and the test questions.

What to expect – The testing authority usually has a web page that explains what sort of test you will be taking, and what ...

Continue Reading →
0

Sunday Funnies – Enormous Michigan Fungus VS World’s Largest Aspen Tree.

What is the biggest plant in the world?  The fungus that ate the UP?  This is the second largest organism in the world, right behind another gigantic fungus in Oregon that covers 3 square miles.  But wait, there’s a quaking aspen grove in Utah that is one large genetic clone organism weighing 13 million pounds and sharing a single root system.   An interesting pair of articles from the SmithsonianFungus vs Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Holiday Scams and Malware Campaigns

11/19/2018 09:18 PM EST Original release date: November 19, 2018

As the holidays approach, NCCIC reminds users to be aware of seasonal scams and malware campaigns. Users should be cautious of unsolicited emails that contain malicious links or attachments with malware, advertisements infected with malware, and requests for donations from fraudulent charitable organizations, ...

Continue Reading →
0

Failures in Encryption – IronPhone

Netherlands security company Black Box Security was raided by the Dutch Police and shuttered on suspicion of money laundering and operating a criminal enterprise.  Black Box was the inventor of the Iron Phone and the Iron Chat app.  Together, they were supposed to provide an unbreakable encrypted chat service.  This service became a popular favorite among cyber and other criminals.

According ...

Continue Reading →
0

Another Problem with MFA – Slow Adoption

Do the web sites your frequently visit offer two-factor authentication?  Have you enabled 2FA where it is available to you?  Is the particular implementation of 2FA or MFA security really adding any extra protection for you?   Not sure?  Please read on.

Password management company Dashlane recently ranked 34 of the top websites for their implementation of two-factor or multi-factor authentication options for ...

Continue Reading →
0

Google Blazes New Trails in Authentication

Two-factor and multi-factor authentication historically have been based on using two or more of three criteria:  something you know (passwords), something you have (security token) or something you are (biometrics such as fingerprints).  There have been two new additions to MFA criteria: something you do (keyboard cadence or mouse movement), and somewhere you are (geo-location through GPS or public IP address).

Google has been busy heightening the security for it’s account ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Passcodes are protected by Fifth Amendment, says court

You do not have to give your passcode to the police.  The courts say it amounts to self-incrimination.  The government isn’t really after the password, after all; it’s after any potential evidence it protects. In other words: fishing expedition.


ST15-003: Before You Connect a New Computer to the ...

Continue Reading →
0

Better Two-Factor Security from Google Titan

This article is an amusing collision between our last two topics – the problems with two-factor and multi-factor authentication and our four-part story on Google’s data mining habits.  Google has developed and released their Titan MFA security key as a more secure way to implement multi-factor authentication that can’t be attacked through phishing and man-in-the-middle exploits.  So if you can ...

Continue Reading →
0
Page 129 of 272 «...100110120127128129130131...»