Your Home or Business Security System Can Be Hacked

More good news (NOT) from the hacker frontier.  In a talk that is scheduled twin cybersecurity conferences BlackHat (August 2-7. Mandalay Bay Hotel) and DefCon in Las Vegas (Aug 7-10 Rio Hotel and Casino), cybersecurity researcher Logan Lamb will present a demonstration on how home and business security systems are vulnerable to hacking.

The problem lies with the newer wireless security systems.  Wireless window, door, and motion sensors are largely unencrypted, and can be intercepted and spoofed ...

Continue Reading →
0

Did You Shop Somewhere That Was Breached?

Hey – short answer – yes very probably.  But how can you find out if your personal data or credit card information has been compromised somewhere you shop, patronize, or frequent, either online or in person?

I originally intended to put together a list of the larger breaches, but seriously, there were too many of them.  In 2013 and 2014, there have been 835 breaches that exposed 265.5 million records.  Totally frightening statistics.  So where did I find this information.  I ...

Continue Reading →
0

Sunday Funnies: One Liners

I know I am a day late, but what can I say.  Another fun collection form my pal and car mechanic Aaron Miller, of Miller Bros Auto Repair in Somerset Wisconsin.

  • I’m going to stand outside. So if anyone asks, I am outstanding.
  • I’m so bright my mother calls me son.
  • My eyelids are so sexy, I can’t keep my eyes off them.
  • The past, present and future walk into a bar. It was tense.
  • Silence is golden, Duct ...
Continue Reading →
0

Adding SSL Web Site Security Will Improve Your Google Page Rank

According to an article on Sophos, turning your website into an HTTPS secure site will improve your Google page rank.  Google is making securing the web one of their top priorities, and something that web developers and web site owners can do is acquire a security certificate from a Certificate Authority and apply it to their web site.  This will make every transaction, no matter how mundane, a  more secure experience for site visitors by encrypting all information ...

Continue Reading →
0

September 10th–Internet Slowdown Day

From the Electronic Freedom Foundation (EFF)

On September 10th, just a few days before the FCC’s net neutrality comment deadline, internet users and tech companies will unite for the “Internet Slowdown” to show the world what’s at stake if we lose net neutrality, the “First Amendment of the Internet.”

We need everyone’s help right now to make this huge. Here’s what you can do right now to help make the Internet Slowdown go viral:

1. Forward this post to your friends and ...

Continue Reading →
0

Recovering From A Data Breach

Data breaches are becoming so commonplace at this point that whether or not your company has one is less a matter of “if” and more a matter of “when.”  It is a almost an inevitable certainty that your company will have one – if you haven’t already.  And if you are not looking for them, you may never know that it has happened to you.

Ignorance may be bliss – right up until the day you succumb to a Continue Reading →

0

Sunday Funnies: The Good Old Days Part Two–No Wi-Fi

Again from Tech Dirt.  The basic message again – the “future” is here, get over it.

Comments on this image included:

  • NO “TELEPHONES”. TALK TO EACH OTHER. FACE TO FACE ONLY. WRITE A LETTER. SEND A TELEGRAM TO YOUR MOM. PRETEND IT’S 1860. LIVE.
  • NO ‘WRITING’… TALK TO EACH OTHER. THROW A ROCK AT YOUR MOM. PRETEND IT’S 10,000 BCE. LIVE.
  • NO ‘HIGHER BRAIN FUNCTIONS’ …USE YOUR REPTILIAN BRAIN
Continue Reading →
0

80 Million Honeypots Scour the Web for Threats

I recently read an article on Tech Republic that described how the cybersecurity firm Norse Corporation is using a network of 80 million honeypots to track malicious activity on the web.  A honeypot is a special computer or server that has been placed on the Internet to attract attackers, like Winnie-the-Pooh to honey.  80 million honeypots are going to track a lot of data, over 130 terabytes per day.  This information is displayed on a Continue Reading →

0

Anti-Malware Apps Can Restore Post-Infection Computers

Finally some good news, this time from Tech Republic.  Recently an independent security lab, AV-Test, put seventeen popular anti-malware applications through their paces, specifically looking for how well the applications could detect and remove malware on systems that were already infected.  Anti-malware applications also prevent malware from installing through signature based and behavioral detection, but this test focused on whether the apps would work on a computer where malware had already been installed. 

The testers used 30 malware ...

Continue Reading →
0
Page 228 of 273 «...200210220226227228229230...»