WyzGuys Appearing on Web Talk Radio

Just a quick update to announce that we were a guest again on Sarah Westall’s Talk radio program, Business Game Changers.  The link for the June program is below, as well as links to my other appearances in December and September of last year.

June 8, 2015 – Business Game Changers – Cyber Espionage, the Dark Web, and loss of Billions to US Businesses

Dec 8, 2014 – Cybercriminals use Government Espionage Tools to Steal Billions and how the US ...

Continue Reading →
0

Creating a Cybersecurity Policy

cybersecurityOne of the early steps a small business needs to undertake is the creation of a cybersecurity policy.  This is not a trivial undertaking, and taking a look at the information below will undoubtedly make this project look daunting to the average small business owner.  A good solution would be to find a cybersecurity professional with experience in policy creation and ...

Continue Reading →
0

Your Brain Waves Could Be Your Password

brainwavesWe have been relying on the trusty password for years, but as password cracking technologies improve, even longer and more complex passwords are being solved and sold on rainbow tables.  So passwords are for the most part over.  Two factor authentication is possibly a solution, but biometrics are becoming a big part of what is next in the field of user authentication.  We have already seen fingerprint scanners on some ...

Continue Reading →
0

LinkedIn Passwords Found on Russian Site

linkedin-logoIf you are on LinkedIn, as I am, today is a good day to change your password.  It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website.  While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and Continue Reading →

0

Privatoria – TOR Plus

TOR, or The Onion Router is a method of surfing the Internet anonymously.  TOR uses a chain of proxy servers and redirection to keep the original IP address (your IP) and hence your identity a secret.  One of the problems with using TOR is that there is a bit of a learning curve, and your Internet browsing speed will likely be reduced to the speed of the slowest Internet connection to one of the proxies in your chain.

There is a ...

Continue Reading →
0

Rombertik Malware Can Wreck Your PC

rombertikRombertik is a new password stealing malware product that works by copying everything you type into a web browser window, and basically works as a keylogger.  The goal is to steal your user credentials for online sites such as email, social network accounts, shopping accounts, and bank or other financial accounts.  This is a pretty scary bit of malicious software.  But there is more.

Rombertik has a revenge feature built into ...

Continue Reading →
0

Macs Need Security Too

The Mac platform has become a popular target of cyber-criminals, partly because they have increased their percentage of the personal computer marketplace from 3% to 7%, partly due to the popularity of the iPhone, and partly because the consumer demographics of Apple customers generally point to people with more money who willing spend more to get the “best.”  In any event, if you are an Apple user clinging to the belief that the Mac is invulnerable, you are wrong.  You ...

Continue Reading →
0
Page 215 of 273 «...190200210213214215216217...»