Search Results for "cyber war"


  • Don’t Take The Bait!
    Having just discussed phishing on Monday, it makes sense to cover the social engineering practice called “baiting” today.  Typically, this involves an attacker leaving removable media such as a USB flash drive or SD Media card lying around in a public location. The exploit depends entir...
  • Fake Tech Support Claims To Be From Your ISP
    We have all received a fake tech support call from someone claiming to be a Microsoft employee.  Now there is a new twist on the scam involving a fake screen pop-up and tech support fakers who claim to be from your Internet service provider.  Google has an extensive collection of fake tech support...
  • Happy Independence Day
    Two hundred and forty years ago a bunch of “terrorists” (one man’s terrorist is another man’s freedom fighter) signed the Declaration of Independence in Philadelphia, Pennsylvania, and declared the founding of a new nation “conceived in liberty, and dedicated to the pro...
  • Smartphone and Tablet Security Solutions
    On Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to stea...
  • Your Smartphone and Tablet Need Security Too
    Mobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry aw...
  • Does Windows 10 Violate HIPAA, GLBA, and SOX?
    Microsoft has made Windows 10 one of the most highly personalized and cloud integrated operating systems ever, and this may introduce new security risks into using your computer.  They do this by keeping track of what you do, where you go an the Internet, and what you are typing.  This is how feat...
  • How Did They Get My Password?
    If I can get your user name and password, I can easily break into and use your computer and network resources just as if I were you.  Bruce Schneier wrote an article recently that discussed this issue.  Many of the largest exploits are started with stolen credentials, the user name and password t...
  • Important Alert for Lenovo Owners
    A rare Tuesday post, but this is too important to wait.  If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application.  A recent security advisory from Lenovo reveals that the Accelerator application can allow an attacker to access Lenovo computers “A vulnerability ...
  • How Did They Take Over My Computer?
    Keyboard – Enter key replace with a RED HELP Key Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails.  Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal market...
  • Typographical Errors Can Have Surprising Results
    This is not a gripe about Spell-Check, although I am driven mad when my phone tries to “correct” the spelling of something I spelled correctly.  Sometimes I get really funny and/or embarrassing results. Speaking of embarrassing, have you ever mis-typed a domain name and ended up at a po...
Page 130 of 148 «...100110120128129130131132...»