9 New Year’s Resolutions–Cybersecurity Version

In 2015, I resolve to:

  • Back up my data – this means your work product, pictures, music and any other irreplaceable files stored on your hard drive.  Backup once to an external drive attached to your computer, and a second time to an online service such as our recommended solution, Carbonite.
  • Create longer and complex passwords (10 characters or more).  Long passwords take more time to crack using brute force methods.  A 7 character password can generally be cracked in a ...
Continue Reading →
0

Secure Your Android Phone

Image result for android logoAccording to a November 20th post in the New York Times Bits blog, Android phone users need to be protecting themselves from a sophisticated class of malware called NotCompatible.  This malware has been on the loose for a couple of years, and is installed either as a drive-by downloaded from an infected web page, or more recently as a “security patch” delivered ...

Continue Reading →
0

Best Job Sites for IT Pros

Let’s say one of your New Year’s Resolutions is to get a better job in 2015.  If you are an IT professional looking for your next employment opportunity, below is a short list of employments sites, many that specialize exclusively in information technology jobs.  For those of you who are looking at information security as a career move, be aware that there is a –7% unemployment rate in this sector.  That’s right, there are 7% more jobs than qualified applicants ...

Continue Reading →
0

Detecting Point of Sale Malware

Every day seems to bring a fresh report of yet another POS breach and the release of yet another batch of credit card numbers stolen by one of the variants of the BackOff point of sale exploit. You have to be asking yourself at this point why haven’t security companies been able to come up with a way to detect and remove this malware?  It has been around ...

Continue Reading →
0

How to Remove Government Sponsored Spyware

imageIn addition to the traditional malware problems that we face from the cyber-criminals that are after your computer, your money, and your identity, we are now faced with a similar threat from governments both foreign and domestic.  How do you know if your computer is under government surveillance? Software developer ...

Continue Reading →
0

FTC Takes Down Fake Telephone Support Operations

screen shot showing "errors" on computerYou are on your computer and get a pop-up telling you that your computer is horribly infected, and that you need to buy this special malware remover to fix your computer.  During the installation process you are told to call an 800 number to complete registration and activation.  $300 later, you have allowed the bad guys to install remote access software ...

Continue Reading →
0

Is Windows Defender Good Enough?

windowsdefender_lead_w_180[1]Windows 8 and 8.1 come with a security software product preinstalled in the operating system, Microsoft’s Windows Defender.  This is an extension of the Microsoft Security Essentials products that has been freely available for some time.  Most computer manufacturers continue to sell Windows 8.1 systems with other security products from ...

Continue Reading →
0

Sunday Funnies–Etymology Division

The problem with following someone is you never really know where you are going to end up.  So it goes today, in a post where the old English major pops back to life.  I have always been fascinated with where words come from, and how then change over time.  Found the following article by way of Silicon Beat.  I rarely repost something in it’s entirety like this, but it happens.  Hope you enjoy.

This article is courtesy of Mental ...

Continue Reading →
1
Page 228 of 278 «...200210220226227228229230...»