Search Results for: 2 factor

Windows Vulnerable to FREAK

Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Windows Vulnerable to FREAK

Digital Home Privacy Invasion

According to HP’s report on the Internet of Things, there will be 25 billion connected things (that’s a technical term) by the year 2020. On the way to the year 2020, as we walk this crazy road, we keep finding … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Digital Home Privacy Invasion

Beware Used or Discount Devices

Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Beware Used or Discount Devices

U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate

The United States Central Command (USCENTCOM) is a theater-level Unified Combatant Command of the U.S. Department of Defense, established in 1983. It was originally conceived of as the Rapid Deployment Joint Task Force (RDJTF). Its area of responsibility includes countries … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate

Protecting Personal Information

Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Protecting Personal Information

Payment Card Industry – Data Security Standard version 3.0

I’ve been doing some extensive studying for the PCI DSS v 3 and there is a vast improvement on the requirements. There are 6 goals of PCI Remove sensitive authentication data and limit data retention. This milestone targets a key … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Payment Card Industry – Data Security Standard version 3.0

Seven Million Dropbox Passwords

6,937,081 usernames and passwords were unfortunately stolen from other services and used in attempts to log in to Dropbox accounts. I recommend that users turn on two-factor authentication and install a time-based, one-time password app on a mobile device. To … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Seven Million Dropbox Passwords

My Google GPS Footprint

I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on My Google GPS Footprint

The Heartbleed Hit List

To search this page, press CTRL and F, then type in the site you are about to log into and hit enter. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Heartbleed Hit List

Bruce Schneier Facts

Bruce Schneier Fact #1: Bruce Schneier once killed a man using only linear cryptanalysis. Bruce Schneier Fact #2 Bruce Schneier once decrypted a box of AlphaBits. Bruce Schneier Fact #3 P = NP in Bruce Schneier’s very presence. Bruce Schneier … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Bruce Schneier Facts