Recovering From A Data Breach

Data breaches are becoming so commonplace at this point that whether or not your company has one is less a matter of “if” and more a matter of “when.”  It is a almost an inevitable certainty that your company will have one – if you haven’t already.  And if you are not looking for them, you may never know that it has happened to you.

Ignorance may be bliss – right up until the day you succumb to a Continue Reading →

0

Sunday Funnies: The Good Old Days Part Two–No Wi-Fi

Again from Tech Dirt.  The basic message again – the “future” is here, get over it.

Comments on this image included:

  • NO “TELEPHONES”. TALK TO EACH OTHER. FACE TO FACE ONLY. WRITE A LETTER. SEND A TELEGRAM TO YOUR MOM. PRETEND IT’S 1860. LIVE.
  • NO ‘WRITING’… TALK TO EACH OTHER. THROW A ROCK AT YOUR MOM. PRETEND IT’S 10,000 BCE. LIVE.
  • NO ‘HIGHER BRAIN FUNCTIONS’ …USE YOUR REPTILIAN BRAIN
Continue Reading →
0

80 Million Honeypots Scour the Web for Threats

I recently read an article on Tech Republic that described how the cybersecurity firm Norse Corporation is using a network of 80 million honeypots to track malicious activity on the web.  A honeypot is a special computer or server that has been placed on the Internet to attract attackers, like Winnie-the-Pooh to honey.  80 million honeypots are going to track a lot of data, over 130 terabytes per day.  This information is displayed on a Continue Reading →

0

Anti-Malware Apps Can Restore Post-Infection Computers

Finally some good news, this time from Tech Republic.  Recently an independent security lab, AV-Test, put seventeen popular anti-malware applications through their paces, specifically looking for how well the applications could detect and remove malware on systems that were already infected.  Anti-malware applications also prevent malware from installing through signature based and behavioral detection, but this test focused on whether the apps would work on a computer where malware had already been installed. 

The testers used 30 malware ...

Continue Reading →
0

Microsoft Patch Tuesday Boo-Boo Causes Blue Screen

Hey, it happens.  Sophos has a great article giving the step by step you need to recover from this without reinstalling everything from scratch.  Everything below is from Sophos.  Thanks, guys.

Microsoft has published a workaround that will get you up and running again, but it involves a fair amount of fiddling.
You need to:

  1. Boot from installation media or go into Recovery Mode.
  2. Delete the crash-triggering file %WINDOWS%system32fntcache.dat.
  3. Reboot normally, which should now succeed.
  4. Save the registry key ...
Continue Reading →
0

Employees Who Quit Take Your Security With Them

In a recent survey of 379 former employees by Intermedia and Osterman Research  found that 89% of them still had access to their former employers Salesforce, PayPal, email, SharePoint, Facebook, and other accounts, and 60% of them were not asked for their Internet logins when they quit, 45% retained access to confidential employer data, and 49% logged in to company accounts after leaving their employer.

And who knows what went out the door on that USB flash drive…

This points to a ...

Continue Reading →
0

CryptoLocker Keys Available For Free

I’ve read about this a few places and decided to alert my readers, too.  Security firms FireEye and Fox-IT have a way to possibly decrypt your affected files, if you still have them, without paying the ransom.  In order to check, go to https://www.decryptcryptolocker.com and submit one of your encrypted files for possible decryption.  This is accomplished by running the file through all of the captured private decryption keys that were recovered during Operation Tovar, when some of the ...

Continue Reading →
0
Page 234 of 278 «...210220230232233234235236...»