Phishing and spear-phishing – the difference between these two forms of cyber security attacks is explained in a TechCrunch post. “Spear-phishing, like phishing, involves emailing a malicious link or file. Whereas phishers send mass emails in hopes of stealing credit card information, Social Security numbers and login credentials from as many people as possible,” Tom […]
Archives: 'IT Security'
Get ready for cybersecurity challenges to your Internet presence in 2018. That’s the not so surprising warning/invitation from In Homeland Security as the new year approaches. “As the continuing digital transformation of our lives entails the ongoing digital transformation of crime, vandalism and warfare, 2018 could bring a lot of new takes on old vulnerabilities, […]
George Mateaki on the Security Metrics blog explains penetration testing – Network Penetration Testing 101 – and why it’s advisable for businesses to confirm the security of their workaday environments.` “Penetration testing, in general,” Mateaki explains, “is a type of ‘ethical certified hacking’ during which a pen tester will attempt to enter and exploit your […]
Connect with the U.S. Department of Homeland Security (DHS) on cyber security alerts, whether it be, in this instance, regarding North Korea, or other mischievous cyber activity. They call them U.S.–CERTs. “The North Korean government malicious cyber activity noted in these alerts is part of a long-term campaign of cyber-enabled operations that impact the U.S. […]
Allow us to introduce you (perhaps) to the Google Security Blog. It discusses such matters as the ‘hijacking’ of web content, including email and social networking accounts. “More than 15% of Internet users have reported experiencing the takeover of an email or social networking account,” advises this Google post. “However, despite its familiarity, there is […]
The U.S. Department of Homeland Security had a busy time, among other things, looking out for the security of critical information networks during October, which, as it happened, was National Cybersecurity Awareness Month. “On October 16,” advises Jeanette Manfra of DHS, “our partners at the Software Engineering Institute’s CERT Division reported to DHS that researchers […]
Knowing where cyber-attacks are coming from is a big part of defending against any that may be aimed at your enterprise. A truism? Yes and no, we gather from a Clearswift post, “3 ways to protect your organization against the insider threat”. “Our latest research reveals that the extended enterprise (employees, customers, suppliers and ex-employees) […]
There are cyber security vigilantes – meet some of them on SecurityInfoWatch who have styled themselves #CyberAvengers. If you need help or solace with your concerns over computer security, this might be a good group to check in with. They’re seeking to cripple “nefarious actors operating in cyberspace seeking to exploit whatever their tapping fingers […]
From Norway comes a security warning about smart watches for children. We don’t know precisely which digital watches, if not all of them, are involved. But it’s certainly wise to wonder and check before you purchase one for a child or grandchild. Schneier on Security is the source for this advisory. Here’s the danger: “Through […]
The Department of Homeland Security advises that October is “National Cyber Security Awareness Month”. That makes it a good time to provide a renewed list of cybersecurity safety tips. They come down to be alert, be updated, and love those passwords! Seriously, cybersecurity is requiring increasing attention, and will continue to do so.