Thursday, August 6th, 2015
Hackers don't even need your password anymore to get access to your cloud data.
Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a "man-in-the-cloud" attack can grab cloud-based files -- as well as infecting users with malware -- without ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, July 14th, 2015
A new version of the nasty TeslaCrypt ransomware is making the rounds, and the creators have added several new features, including an improved encryption scheme and some details designed to mimic CryptoWall.
TeslaCrypt is among the more recent variants of ransomware to emerge and the malware, which is a variant of ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, June 10th, 2015
I'm helping someone reconfigure their home network and realized that I never posted about the Y-router configuration. Most folks have a home modem that is leased from their ISP and most of these newer modems have built-in router functionality and provide both LAN and WLAN connectivity, but this modem is ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, June 6th, 2015
Everyone wants a secure operating system. No one likes to have a computer infected with malware that slows down the PC, destroys files or steals sensitive information. Often, that operating system isn't very secure by default. If it's also a highly popular OS, such as Windows, then more tools are ...
Posted in Internet, Privacy, Security, Windows | No Comments
Tuesday, June 2nd, 2015
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.
The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects ...
Posted in Internet, Privacy, Security | No Comments