What’s For Sale On The Dark Net ?

Your computer might be for sale on the Dark Net.  And to add insult to injury, it might be worth just two cents!  How can this be?  Well if your computer has been hijacked and is part of a botnet, you can buy 1000 computers in a botnet for just $20 on the Dark Web.  That’s two cents apiece.

What other items are for sale in the cyber-crime markets on the Internet?  For $25 you can get someone’s personal identity, something ...

Continue Reading →
0

Windows 7 and 8 Users Will Get Free Upgrade to Windows 10

What happens when you are the market leader for computer operating systems, but your latest release is a widely reviled disaster?  Well the last time (Windows Vista, anyone, anyone?) Microsoft gave Vista buyers a period of time to upgrade to Windows 7 for free.  It looks like the free upgrade to Windows 10 will be offered again, not just to Windows 8 and 8.1 buyers, but also to ...

Continue Reading →
0

Reviewing Spam Nation by Brian Krebs

I hardly ever read a book twice, in fact except for the Bible (3 times) and the collection of Ian Fleming’s James Bond books, I can’t remember having read another book more than one time.  Just too many good books out there, and the unread pile of recent purchases in my office mocks me daily.  But Brian Krebs new book Spam Nation has made it to ...

Continue Reading →
1

PCI-DSS Standards Tougher in 2015

If you accept credit cards for payment in your business, then you are subject to the Payment Card Industry Data Security Standard or PCI-DSS.  Up to now, this standard has really been more about compliance, but this year the Payment Card Industry is definitely focusing on real 24/7 365 security.  The industry has been hit hard in the last two years by the BackOff POS exploits that have affected major retailers such as Target, Home Depot, and Staples, as well ...

Continue Reading →
0

FIDO to Replace Passwords

imageWe have come to a point in the history of networking and cybersecurity where we are seeing the effectiveness of passwords falling to the improved cracking tools of cyber-criminals.  At this point the encrypted hash of an 8 character password can be solved in less ...

Continue Reading →
0

Manual Account Hijacking: When It Gets Personal

The vast majority of account hijacking attempts are an automated variety running on botnets.  Recently Google released a whitepaper that takes a look at a less common, but more damaging threat – manual account hijacking.  The distinction here is that the affected account is hijacked by a human rather than a machine, and then is exploited for maximum revenue generation by the cyber criminal.

As with the vast majority of all cyber-exploits, this one starts with a phishing email.  The email ...

Continue Reading →
0
Page 180 of 232 «...150160170178179180181182...»