What comes to mind when you think about the Internet of Things? Tech enthusiasts around the world see hordes of connected devices taking advantage of mobile technologies to augment everyday life, but the realist sees a horde of devices that pose a considerable threat to network security. How can your business ensure maximum security in…
You might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there: this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar and hackers are willing to pay in order to access your network.As…
Malware is defined as software that is intended to damage or disable computers and computer systems, but it can also affect mobile devices and computer networks as well. Malware can give hackers a path into your system, which will keep going deeper into the system until it eventually infects an entire network. Not all anti-virus…
Most organizations have some sort of high level security policy that addresses different types of information, how that information should be handled, and who should be handling it. To expand, this security policy is essentially a set of rules and practices that control network assets, the information within the network, and how this information is…
The subject line of the e-mail referenced "your Amazon Account." The body mentioned my credit card and how it had just been "updated." A quick scan of the rest caused temporary alarm. My credit card? I didn't make any changes to my credit card or my Amazon account. Upon closer inspection, I recognized this e-mail for what it…
There are a lot of factors to take into account when you’re trying to select the best antivirus solution for your needs. With the security of your data, digital identity and financial transactions at stake, it’s worthwhile investing some time in assessing each antivirus product.Furthermore, if you make extensive use of the Internet, email, messaging…
President Barack Obama is taking aim at "malicious cyber actors" who attempt to profit from digital attacks on US interests.An executive order announced Wednesday authorizes the Secretary of the Treasury, Secretary of State and Attorney General to impose sanctions on cyberattackers hacking into the networks of US companies or government agencies.The White House aims to…
A new SSL/TLS vulnerability named “FREAK” was identified by several security researchers, a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted. It’s a threat because FREAK allows an attacker to get between a client and server and view what is intended to be a secure and private communication.The vulnerability is…
If you own an iPhone or Android handset and care about your privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free, zero-learning-curve app exists for both text and voice, keeping those communications fully encrypted so no one but the person holding the phone on the other end…
OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank, it spots…
Do you know how much of your personal information is floating around? It's more than you think and very easy to find. Phone numbers, home addresses, email accounts. As my recent story about gamers who got swatted showed, anybody can become a target. You don't have to be someone with a million followers. Social networks…
Worst Passwords of 2014 List has been released.
SplashData has released its annual list of Worst Passwords to hit the Internet in 2014. One would think that with all the reported data breaches from retail giants such as Target and Home Depot, people would be more self-aware about their choice in passwords, but in reviewing…