Posts Tagged ‘security’

How Secure Are Your Passwords? Probably Not Very.

Monday, August 21st, 2017


Using numbers and symbols in your passwords to keep them secure? You’re doing it wrong.

Chances are, all you’re doing is making it harder for you to remember – and super easy for a computer to guess.

Here’s some password protection myths blown right open, and what you should actually do to make them secure.


Found a Windows Bug? You Could Get a $15,000 Bounty

Wednesday, August 2nd, 2017


Found any kind of Windows flaw? Then you could be able to claim a big bounty from Microsoft, who announced all Windows flaws were now fair game.

While the company has been running bug bounty programs since 2013, it has expanded it year after year to include bugs in Hyper-V, Microsoft Edge, and exploit mitigation systems.

The company has released a list of payouts to bugs found, with some of the targeted schemes paying up to $250,000 for finding serious software weaknesses the developers overlooked.

So if you feel up to going ‘Full Fett’ on any part of Windows, you can turn that skill into some serious cash.


What Is an Air Gap, and Should You Do it? – A Handy Guide

Monday, March 20th, 2017

Use air systems to protect your data computers.

Ever heard of air gapping? It’s an important technique to keep your systems secure, and your files and folders free of malware.

In other words, you should learn to do it, and implement it in your backup strategy immediately. Here’s why.


The Dark Web Knight Rises? The Anti Ransomware Batman

Wednesday, February 8th, 2017

Is there an anti ransomware batman out there?

Remember how we predicted in 2017 that with law enforcement unable to do anything about ransomware, vigilantes would rise up to fill the void?

Well, it’s already happened. Just two days ago, cyber-vigilantes took down 10,000 underground websites on the Dark Web. Many of these sites were black markets for weapons, drugs, illegal pornography, and downloading ransomware.

With the mass take down, over 100 Bitcoin scams, 1000+ carding and counterfeit sites, and multiple Bitcoin escrow and wallet sites have also been terminated.

For a list of our other predictions for 2017, here’s our article. To hear more about the landmark Dark Web hacking, read on.


Over 70% of Washington DC’s CCTV Hacked Before Trump Inauguration

Wednesday, February 1st, 2017


Scant days before President Trump’s inauguration, the majority of Washington DC’s surveillance cameras were hacked by criminals in a massive cyber attack.

The infection downed 123 of its 187 network video recorders, each controlling four cameras each. And the perpetrator’s virus and motivations aren’t hard to guess.


Invisible Malware Can Now Hide In Banner Pixels with “Stegano”

Thursday, December 22nd, 2016

Stegano can hide in banner pixels

Over the last two months, millions of visitors to mainstream websites have been exposed to a new form of malware embedded in banner pixels. And if you didn’t see it, don’t be surprised.

The new malware, “Stegano”, is nearly invisible to the naked eye. Its code has been embedded in parameters controlling the transparency of pixels used to display banner ads. Since it’s buried in the alpha channel, even watchful ad networks find it difficult to detect.

The malware’s name borrows from the word Steganography; the practice of concealing secret messages inside a larger document. The medium is new, but the practice dates back to at least 440BC.


Amazing Phishing Attempt: A Must See!

Monday, November 14th, 2016

Amazed man at spear phishing attempt

This spam e-mail is so well crafted, it’s both incredible and horrifying. Would your users know this was spam, or would they think it was real?


Does Counter-Phishing Work? Half of People Click Whatever They Are Sent

Monday, October 17th, 2016

Jackie chan's mind is blown by counter-phishing

You know the feeling. A user has done something incredibly dumb. Like opening a strange attachment despite all the counter-phishing training you did last month. And your brain cells all scream at once, just one single word.


It’s said that common sense isn’t common. When it comes to IT, it’s even more true. A recent study found one in two users would click on links sent to them by strange senders via Facebook or E-mail.

And even worse? The same study found even if the subjects knew the risks involved, they still clicked on them.

Given that phishing—and in particular, spear phishing—can cost your company $150,000 or more, it’s a rather big deal. But the big question is this: what in the heck can you actually do about it?


EOL Products Are a Server Security Risk; IT Experts

Wednesday, August 24th, 2016

EOL Expiry Date Security Risks

Software, like milk, has an expiry date. It’s called the software’s End of Life (EOL). Just like your milk, when it reaches this date it’s time to throw it out.

You wouldn’t keep and drink old milk, right? That’d be gross, and bad for your health. What a lot of people don’t realize it’s just as bad to do the same with EOL software, except it risks your business’s health instead.

According to BDNA president Walker White, more than 99 percent of malware and viruses that target software vulnerabilities enter through old, outdated software with known weak points.

“These products may remain on a network and are not removed because no one is using them, and no one has turned off their lights,” White said. “A hacker will exploit that kind of leftover artifact.”


Elite NSA Hacking Group Gets Hacked

Wednesday, August 17th, 2016

NSA hacked Shadowbrokers Equation Group

In an ironic twist, the U.S’s National Security Agency (NSA) has been hacked by hackers. Their elite hacking tools are now up for auction for over half a million dollars, available to the highest bidder.