Search Results for "cyber war"


  • 20th Anniversary of Netscape
    On April 4 1994 the Mosaic Corporation, the company that became Netscape Communications, was founded by Marc Andreessen, a University of Illinois trained software programmer.  Netscape became the way that the average computer user was introduced to the Internet, and was responsible for turning ...
  • Target Breach–Where Are We Now?
    Target Stores stock price was at $67 in November, and fell to $54 in February, and over March has managed to recover back to $60 as of this morning.  Not terrible results for a company that was responsible to the loss of 40 million card transactions.  But their profits have fallen 46% sinc...
  • Chrome Defends Against Browser Hijacking
    Browser hijacking is a growing and super annoying problem.  I see way too many instances where a client of mine has downloaded a “free” program, only to have the program installer bring a host of unwanted and undesirable adware programs.  Many times these freeware programs and games wi...
  • FBI report Says to Expect More Breaches Like Target
    Security researcher Brian Krebs, who broke the Target story back in December, continues to be one of the best sources of the continuing story.  He recently posted a report from the FBI that warns us to expect more breaches involving the BlackPOS exploit that has affected checkout operations at ...
  • The Threat of Banking Trojans–Zeus and Neverquest
    I have been catching up on my reading, and came across an article on the new Neverquest banking malware on TechRepublic.  This article first discussed the Zeus Trojan exploit.  Zeus was released online in 2011, and was one of the first malware programs that required licensing.  Once i...
  • Target: What Do We Know, What Have We Learned
    What a mess!  Every day it seems some new fresh hell emerges from the Target Christmas attack story. Brian Krebs, a security consultant an blogger, releases a story first describing the exploit. 40 million credit card transaction sessions, including card number, expiration date and PIN number...
  • Sunday Funnies: Iran’s FARS News Agency Says USA Run by Space Aliens
    You may remember a while back that the Iranian state-run news agency, FARS, reported a news article found in the satirical US publication “the Onion” as if it were fact. Well the wacky and fun loving Iranians are at it again, repackaging information found on the insanely conspiracy theory laden ...
  • Six Social Engineering Tricks To Avoid
    One way that cyber criminals use to get personal information, such as user IDs and passwords, from unsuspecting computer users is to trick them out of it.  These sorts of methods are called “social engineering” in the computer security trade.  Social engineering is using trickery, dece...
  • About Bob Weiss
    Experienced cybersecurity for your business Personal Profile Bob has over 20 years of experience providing cybersecurity services to small business customers in the upper Midwest. Bob is a Microsoft Certified System Engineer, a Microsoft Small Business Specialist, a Certified Ethical Hacker (CEH...
  • Vulnerability Assessment
    Uncovering Network Vulnerabilities Vulnerability scanning use sophisticated software application that aggressively seeks out security flaws on a network.  It is based on a database of known vulnerabilities.  Testing is performed across a network on all attached systems for the presence of these ...
Page 145 of 148 «...120130140143144145146147...»