From Pinterest
Continue Reading →JUN
US-CERT (The United States Computer Emergency Readiness Team) has released a report listing the top 30 exploited software vulnerabilities. This shows that one of the biggest problems is still that software is not being patched and updated in a timely manner, if at all. And the HP Cyber Risk Report explores this issue further, and offers four strategies ...
Continue Reading →If you are on LinkedIn, as I am, today is a good day to change your password. It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website. While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and Continue Reading →
TOR, or The Onion Router is a method of surfing the Internet anonymously. TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret. One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.
There is a ...
Continue Reading →Here’s another gem from my friends at Miller Brothers Auto Repair of Somerset Wisconsin.
A duck walks into a restaurant around lunchtime, sits down and orders a soda and a sandwich.
The bartender looks at him and says, “Wow, a talking duck! What are you doing here?”
The duck replies, “I’m dry-walling the building across the street. I’ll be in ...
Continue Reading →Rombertik is a new password stealing malware product that works by copying everything you type into a web browser window, and basically works as a keylogger. The goal is to steal your user credentials for online sites such as email, social network accounts, shopping accounts, and bank or other financial accounts. This is a pretty scary bit of malicious software. But there is more.
Rombertik has a revenge feature built into ...
Continue Reading →The Mac platform has become a popular target of cyber-criminals, partly because they have increased their percentage of the personal computer marketplace from 3% to 7%, partly due to the popularity of the iPhone, and partly because the consumer demographics of Apple customers generally point to people with more money who willing spend more to get the “best.” In any event, if you are an Apple user clinging to the belief that the Mac is invulnerable, you are wrong. You ...
Continue Reading →Whether active duty, deployed, or veteran, we thank our military for their sacrifice and service today.
Continue Reading →(Sung to the Bob Marley/Eric Clapton tune “I Shot the Sheriff”)
Ok, so the picture is a Dell, not a Gateway, but Dell doesn’t fit the lyric. The story is about a man named Lucas Hitch of Colorado Springs, who found a new way to deal with the infamous Windows “Blue Screen of Death.” He just carried the computer into the alley, whipped ...
Continue Reading →Google has introduce a Chrome extension called Password Alert that will warn you any time you try to use your Google password at a non-Google site. This is a great way to protect yourself and your Gmail account from phishing attacks that employ a fake cloned Gmail login page in an attempt to get your Gmail user ID and ...
Continue Reading →