Windows Defender Gets Muscles

Windows10Tired of cyber-creeps kicking sand in your face at the virtual beach?  Microsoft wants to pump you up!!.  Businesses using the Enterprise version of Windows 10 will have the option of using Microsoft’s new enhanced Windows Defender Advanced Threat Protection.  In addition to providing end point security through Windows Defender, Defender ATP will connect with a cloud services based SIEM (security Information and Event Management) that will provide more ...

Continue Reading →
0

How Your Website Can Spread Malware

drive-by-downloadRecently, several major online advertising networks were tricked into distributing adverting that was infected with malware.  Google, AOL, Rubicon, and AppNexus were some of the advertising distributors that were affected, and this impacted elite online publishers such as BBC, Newsweek, The New York Times, and MSN, and many many others that accepted advertsing from these networks.  Most online advertising companies check ad submission for malware before publishing, but this ...

Continue Reading →
0

Inside the Perimeter

razor-wireAh, the good old days, when perimeter defenses and endpoint security software was all you needed to keep your network secure.  Was it ever really that simple? Probably not, but many business owners and IT professionals are still hoping that keeping the firewall and antivirus updated is enough.

Over 90% of exploits start as an email in somebody’s inbox.  According to NSS Labs, 97% of all breaches are enabled ...

Continue Reading →
0

Sunday Funnies – Memory Problems

Things-to-rememberI do “Remember the Alamo.”  Maybe this explains why I don’t remember what happened yesterday.  Brain all full of old stuff I learned in grade school, no room for new information.  New information tries to find space in brain, fails, and is dropped like some packet on a congested network route.

 

How to Secure Your Internet of Things

secure-iotWe have spent a couple weeks talking about the dreadful state of security with many IoT devices.  Now we are going to provide you will some solutions.

Most of the weaknesses inherent in these devices come from the fact that they are set up to be “easy for anyone to install.”  Which means that most of them will work straight from the box without a lot of painful configuration. ...

Continue Reading →
0

Millions of Insecure Devices Share The Same Keys

keySo how would it be if you found out that the key to your house also worked at your neighbor’s house.  What if it turned out the builder in your subdivision used the exact same lock on every house they built, and your key could get you into every house in your neighborhood?

This is essentially the situation that security researchers at SEC Consult discovered with a host of Internet ...

Continue Reading →
0
Page 200 of 278 «...170180190198199200201202...»