This is not a new story, and I decided not to write about it when this “sale” of pilfered NSA hacking tools was offered last August by a group identified as the Shadow Brokers. But this story has taken an amusing turn, so I have included it in a Tuesday post.
The stolen trove of NSA goodies was originally offered as a winner ...
Continue Reading →OCT

When I am doing a cybersecurity presentation, someone is bound to ask about the Dark Web. What is it, exactly, and how does someone get there? The how part we discussed on Friday. 
From the Department of Homeland Security website: “October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events ...
You don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy. Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook. Maybe you would like a little privacy in your online life.
Until recently most cybersecurity efforts focused on prevention, and this created the anti-malware software, firewall and perimeter defense industries. But the fact of the matter is that cyber-attackers are going fly right past your perimeter defense and get into your network via port 80 or 110, firewall ports that are open on every network for email and web browsing. our recommendation is to start managing the consequences of the inevitable security breach. ...
As we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important. Smartphones, tablets, wearable tech, and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off. When these devices are stolen, you lose much more than the hardware. Every bit of information on the device is up for grabs too, from contact lists, personal information, ...
The National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well. Still in draft from, the standards can be found on the document