Yahoo and Google Partner on Secure Email

A recent post on Silicon Beat detail how Google and Yahoo are working on a “spy-free” email service that will us PGP (Pretty Good Privacy) encryption to keep prying eyes such as your government, cyber-criminals, your employer, even Yahoo and Google themselves, from being able to capture and read your email.

We will be keeping an eye on this development, a report further news when it is available.  You can read more on Silicon Beat or this Continue Reading →

0

Who Hacked My Computer Network? Its Your Employees

The was a short article that appeared in Silicon Beat that reiterates something I have been recommending for a long time.  The weakest point of entry into your computer network is your all too human employees.  The study found that 31% of cyber attacks start out from “unintended disclosures.”  Usually what has happened is that an employee has read and responded to some sort of clever phishing email, and provided user credentials to the network.  Another 24% were ...

Continue Reading →
0

Poor Excuses For Avoiding Security

If you are using any of these excuses in your business you are likely already in trouble.  Don’t say we didn’t warn you!

  1. I’m too small to be a target.  Sorry, but false.  Small and medium size businesses are seen as prime targets by my cyber-crime organizations just because they are usually poorly defended, easy to hack, and have assets worth the effort.  If you have cash in a bank account, that can be enough to attract an attack.
  2. Internet security ...
Continue Reading →
0

Advanced Evasion Techniques and Advanced Persistent Threats

In a previous article we discussed a bit about how Advanced Persistent Threats (APT) were making network defense more challenging for cybersecurity professionals.  A recent article on TechRepbulic takes a look at how Advanced Evasion Techniques (AET) are being used by cyber attackers to make APTs harder to discover.

aet-2.png

The illustration shows how AETs work, by cutting the exploit code into smaller pieces (fragmentation) and sending them on unexpected ports (obfuscation) in order to ...

Continue Reading →
0

It’s Not Just the NSA: What Do Marketing Companies Know About You?

You do a certain amount of business online.  You belong to a number of social networks.  You shop at major retailers who have loyalty or rewards programs.  You have all sorts of fun apps on your smartphone.  Your smartphone knows your geographic location to within a few inches.  You have a collection of wearable devices that keep track of your footsteps, your travels, your heartbeat, temperature, and respiration, that record everything you see in front of you.  What happens with ...

Continue Reading →
0

Five Worst Passwords Ever!

If you are using one of these passwords, you might as well not have a password.  This is according to a recent post on the Microsoft blog.

  • Password
  • Letmein
  • Monkey
  • A pet’s name (i.e. Fluffy)
  • 12345678

This five is from another list on the CBS News website that lists the 25 most commonly used passwords in 2013.

  • 123456
  • password
  • 12345678
  • qwerty
  • abc123

Two of these passwords were common to both lists.

You may be wondering how we know what ...

Continue Reading →
0

Sunday Funnies: Josh Blue Humor

Doing Sunday Funnies on Saturday.  Sorry – by Sunday I tend to forget to do it.  Sometimes Sunday is a “laptop free day.”  Hey – it happens.

A shout out to my friend and former barber Milo David.  Yes – Colorado is too far to drive for a haircut!  Anyway he shared this on Facebook, and I couldn’t resist, since I love the movie “Taken” and kind of like the State Farm commercial.

Please do it.

0

Is Your Computer a Cyber Warrior?

According to Bruce Schneier in the September issue of his newsletter Crypto-Gram The NSA and the British counterpart the GCHQ are engaged in a worldwide port scanning operation in order to find vulnerable computers that can be recruited and turned into an ORB, or Operational Relay Box.  Basically our government is creating large “standing armies” of botnets that can be used to attack our “enemies,” real, imaginary, or otherwise.

The issue for business or personal computer users is this:  ...

Continue Reading →
0

How Does POS Malware Work?

POS malware attack 2

So in the last two years there have been over 400 retail companies, including many big national chains, that have fallen victim to the BackOff or other Point of sale (POS) malware exploits, revealing millions of credit card and customer records.  So how does this exploit work?

My friends at Calyptix Security sent me another article that should be interesting to anyone who is running ...

Continue Reading →
0
Page 172 of 218 «...140150160170171172173174...»