Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


BlueBorne Bluetooth Vulnerabilities

09/12/2017 05:26 PM EDT  Original release date: September 12, 2017

US-CERT is aware of a collection of Bluetooth vulnerabilities, known as BlueBorne, potentially affecting millions of unpatched mobile phones, computers, and Internet of Things (IoT) devices. A remote attacker could exploit several of these vulnerabilities to take control ...

Continue Reading →
0

New Phishing Scam Uses FBI and IRS Logos

There is a new twist on an old tax scam appearing in email inboxes recently.  The new phishing exploit uses both IRS and FBI emblems to scare recipients into provide personal information on a downloadable questionnaire.  You can read the official warning here.

I like to remind people that the IRS only communicates with taxpayers by postal mail.  Sometimes they might send a US Marshal.  And the FBI certainly would not be sending an email when they can ...

Continue Reading →
0

Security Issue With CCleaner

Piriform’s CCleaner is a popular computer cleaning and optimizing product that many people use.  I have my doubts about the real effectiveness of these utilities, but many of my clients swear by it.  I have used CCleaner myself several times as one of the tools I used to clean up a malware infection.

Recently, the CCleaner software code was modified  to include a malicious backdoor.  This warning was published earlier in ...

Continue Reading →
0

The Weakest Link In Cybersecurity is in Your Mirror

That’s right, it’s still you.  Sorry.

October is Cybersecurity Awareness Month, and this week’s theme is Simple Steps to Online Safety.

The toughest part of cybersecurity is securing the human mind, emotions, behaviors, and responses from the making a decision or taking an action that will open the door for a cyber-attacker.  The reality is that it is much easier to secure systems than humans. And unfortunately, humans have been given ...

Continue Reading →
0

BlueBorne Bluetooth Hijacker – What Do We Know?

Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne.  This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.

This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices.  Once installed, the attacker has full control ...

Continue Reading →
0

D-Link Does Bad Security Again

A security research found 10 “critical” security flaws in a popular D-Link wireless router.  This is not the first time that poor security has painted this company with the ugly stick.  They have previously been sued by the Federal Trade Commission, and we have reported about their deficiencies in this blog.

Security researcher Pierre Kim says the D-Link DIR-850L AC1200 Dual Band Gigabit Cloud router has 10 security vulnerabilities serious enough for ...

Continue Reading →
0

An Interesting New Twist on WordPress Site Hijacking

This story reads like fiction.  OK, not great fiction, but this story illustrates another way that WordPress websites can be hijacked and used to promote a cyber scam.

WordPress websites are often hijacked so a phisher can host their landing page on a site that does not lead back to them.  And WordPress sites can be interesting targets for other cyber-criminals who export ...

Continue Reading →
0

Sunday Funnies: Moose

How Bullwinkle Taught Kids Sophisticated Political Satire

I grew up on Rocky and Bullwinkle, Dudley Doright, and Peabody and Mr Sherman.  Here’s a great article from the Smithsonian.  It explains how I became a political independent, doubter, freethinker, and rule avoider.  It was the subversive cartoons of my childhood!  And all on TV!


Now that I am spending a lot of time in the wilds of northwest Wisconsin, ...

Continue Reading →
0
Page 161 of 273 «...130140150159160161162163...»