International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…Oh No! 8 Signs that Grandma’s Getting Baited by a Catfish!
His name was Colonel Lance Shimmeroff. He was a retired U.S. Army officer and happened to be an ace Words With Friends player, according to my 75-year-old mother, who no one in the family could beat at the online game. They played the game often, and he impressed with his word combinations and witty banter. […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Crypto-Ransomware Sightings and Trends for 1Q 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In January, the Australia-New Zealand region was beset by variants of TorrentLocker. But we soon discovered that TorrentLocker infections were not limited to that region; Turkey, Italy, […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…Stop Malvertisements from Causing a Click-tastrophe on Your Computer
Web ads: sometimes annoying, other times entertaining and useful, but for the most part, harmless. Or so you thought. It seems that cybercriminals are now turning their attention toward pulling you in with a strong sales message, and you may be none the wiser until it’s too late. Your neighborhood hacker has decided to start […] more…Surmounting the Insurmountable: Wikipedia Is Nearing Completion
For about the last five years, Wikipedia has had trouble getting and keeping new volunteer editors. The foundation behind Wikipedia has made building up the editor base a major goal, and is attacking it from all angles, such as encouraging a culture that is friendlier to newbies, creating an easier sign-up page, and making the […] more…How Do I Keep My Kids Safe On iPhone?
A friend had recently been on a trip to Singapore and among the many purchases she made was her dream phone, the gleaming black temptress, the iPhone! From the time of their return, however, she hardly gets to use her iPhone or gloat over her new acquisition. The reason is her two middle-school going kids- […] more…More information
- Double Extortion: Ransomware’s New Normal Combining Encryption with Data Theft
- Let’s hope the FBI really can crack the terrorist’s iPhone
- Ease and security of password protections improved
- Jamf survey: Employees will quit for platform choice
- Malware Steals Image Files from Systems
- Yahoo! Messenger Webcam Upload ActiveX Control Buffer Overflow Vulnerability
- You Probably Shouldn’t Connect Your Smartphone To A Rental Car
- You gave your number to Facebook for security and it used it for ads
- Server Compromises – Understanding Apache Module iFrame Injections and Secure Shell Backdoor
- 11 fixes coming in next week’s Patch Tuesday