From Pinterest
And again from Pinterest
Good question. A recent article in Tech Republic quoted a CompTIA IT Security Report that said that nearly half of IT managers believed their cybersecurity was “good enough.” This may be wishful thinking, or it may mean that many organizations have done the work to firm up their network defenses. What about your business or organization?
There are a ...
Continue Reading →JUN
I am always mystified when clients of mine fall for fake tech support phone calls or browser pop-ups. Didn’t their Mom tell them not to talk to strangers? After all, they are my clients, shouldn’t they be calling me FIRST?
Naked Security reported on May 13th that Microsoft’s search service, Bing, will no longer accept advertising for online tech support companies. This is good news for everyone except the legitimate computer ...
Continue Reading →JUN
If I can get your user name and password, I can easily break into and use your computer and network resources just as if I were you. Bruce Schneier wrote an article recently that discussed this issue. Many of the largest exploits are started with stolen credentials, the user name and password that we all use to access our computer, network, and ...
Continue Reading →JUN
Nothing to say about this other than what can you expect when Germans do trains? How about a working airport? How about automobile and truck traffic? A UFO?
Want to see more awesome train sets?
On Wednesday we looked at the obvious, visual symptoms of a malware infection. Today we will explore some changes in performance that can indicate that your computer is infected.
Performance Symptoms
Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.
- Constantly Flashing Hard Drive Light – If the hard drive activity light is ...
JUN
Today we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.
Visual Symptoms
These are signs that you will see on your computer display, and are the most obvious symptoms.
- Ransomware – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
- Fake Security Pop-Up – I ...
JUN
A rare Tuesday post, but this is too important to wait. If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application. A recent security advisory from Lenovo reveals that the Accelerator application can allow an attacker to access Lenovo computers
Continue Reading →“A vulnerability was identified in the Lenovo Accelerator Application software which could lead to exploitation by an attacker ...
JUN
Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails. Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal marketplaces. Or sometimes you are tricked into giving them up on clever fake websites. Phishing is one way that credentials are stolen. The links in phishing emails often will direct the unwary user to the fake web page with the helpful web ...
Continue Reading →JUN