Search Results for "cyber war"


  • Security Audits
    Mandatory Annual Security Audits A security audit is a type of cybersecurity project where the auditor is given full access to the client company’s computers and network.  The audit usually involves collecting a complete inventory of all devices connected to the network including computers, p...
  • A Scary Vision of the Future – 2020
    Trend Micro has a nifty series of 9 – 5 minute videos that show just how dangerous the world could become with everything becoming network connected and moving to “the Cloud” (the Internet).  Check it out here.  With names like Switched Off, Stay Calm, We Didn’t See It Coming, it m...
  • Saving Your Passwords In Your Browser? Bad Idea!
    I just read an interesting article in Sophos about the rather insecure method that the Google Chrome browser saves passwords.  If you click on the click on the “Customize and Control” icon at the far right of the address bar, choose “settings” from the menu, click “Advanced Settings f...
  • Security Policy for On-line Banking
    If my last post made you want to tear out your Internet connection and go back to burying your money in coffee cans in the backyard, despair not.  Here is a really great idea that will allow you to secure your online banking in ways that will be hard to defeat.  This comes to us courtesy o...
  • How to Rob Two Arabian Banks of $45 Million Dollars
    You can’t pull this off with a ski mask and a gun.  A major bank heist that cleared a $45 million haul from two banks on the Arabian peninsula was pulled off by an international cyber-crime crew during two days, one in December 2012 and and the other in February 2013.  The story reads li...
  • Barnes & Noble Store PIN Pads Compromised
    63 B&N stores in California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania, and Rhode Island were discovered to have PIN pads at the checkout that sent credit card information to unknown recipients.   It appears the the software in the PIN pads thems...
  • Your Wi-Fi Encryption Key is Easily Cracked
    If you are running a wireless network in your home or business, the days of running an open and unsecured wireless access point are over.  You just open yourself up to way too much mischief and malicious activity by running an unsecured network.  If you are still using WEP encryption, you ...
  • The Problem of Easy Passwords
    I just read an article on Ars Technica that gave me the willies.  This is a longer article that explains why passwords are failing to do the job anymore, even longer, more difficult passwords that contain upper and lower case letters, numbers and symbols.  This little beauty shown below u...
  • Creating and Using a Strong Password
    Here are some guidelines for creating a bulletproof password. Longer is Better – almost all password cracking is done by a group of machines that is simply trying all possible combinations.  A three character password can be cracked in seconds, but a 14 character password takes longer, like ...
  • How to Report Phishing to Facebook
    If you get a fake email that looks like it is from Facebook, you can report it to Facebook simply by forwarding it to a new email address that was just set up by Facebook. Forward your suspicious email to phish@fb.com. That is all there is to it. We have warned people that they should never click on...
Page 146 of 148 «...120130140144145146147148