My plea (falling on deaf ears I suspect)
- If you are going to drive below the speed limit stay out of the left lane.
- Slow drivers please stay out of the center lane. I get it, you are avoiding the merging traffic in the right line (cuz ...
JAN
My plea (falling on deaf ears I suspect)
If you receive an email titled “Fwd: Daily Report” from a coworker this is a malware attack. Clicking on the attachment not only launches the Trojan horse downloader, which automatically calls out to a malicious server to download more malware, but it also emails a copy of itself to everyone in your address book. The details of the email are below:
Email subject: FW:Daily report
Attachment name: F44907162.zip
Body: Please review attached ...
We will be presenting a seminar on small business and personal cybersecurity this month. it is sponsored by the Stillwater Area Chamber of Commerce.
If you think your business is too small to be a target for cyber-criminals, the evidence would suggest otherwise! In fact, small ...
Continue Reading →This has happened to me a couple of times, and I always get panicked calls from clients when it happens to them. All of a sudden your email inbox is flooded with undeliverable return email messages, sent to people you have never heard of. Hundreds of them, spanning sometimes as much as a week’s time. See below.
Has your email account been hacked? Do you have to change your password? In a word, NO. You are merely the victim of “spoofing,” ...
Continue Reading →Here is a short video that gives the Hollywood version of computer hacking. Not terribly accurate, so don’t try this at home, it won’t work. The steps are:
In 2015, I resolve to:
According to a November 20th post in the New York Times Bits blog, Android phone users need to be protecting themselves from a sophisticated class of malware called NotCompatible. This malware has been on the loose for a couple of years, and is installed either as a drive-by downloaded from an infected web page, or more recently as a “security patch” delivered ...
Continue Reading →Let’s say one of your New Year’s Resolutions is to get a better job in 2015. If you are an IT professional looking for your next employment opportunity, below is a short list of employments sites, many that specialize exclusively in information technology jobs. For those of you who are looking at information security as a career move, be aware that there is a –7% unemployment rate in this sector. That’s right, there are 7% more jobs than qualified applicants ...
Continue Reading →Every day seems to bring a fresh report of yet another POS breach and the release of yet another batch of credit card numbers stolen by one of the variants of the BackOff point of sale exploit. You have to be asking yourself at this point why haven’t security companies been able to come up with a way to detect and remove this malware? It has been around ...
Continue Reading →In addition to the traditional malware problems that we face from the cyber-criminals that are after your computer, your money, and your identity, we are now faced with a similar threat from governments both foreign and domestic. How do you know if your computer is under government surveillance? Software developer ...
Continue Reading →