November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,642 hits
Search Results for: 2 factor
Windows Vulnerable to FREAK
Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading
Posted in Security Blog
Tagged 2015, Apple iPhone, FREAK, Google Android, man-in-the-middle, Microsoft Windows, mitm, openssl, rsa, ssl, tls, vulnerability
Comments Off on Windows Vulnerable to FREAK
Beware Used or Discount Devices
Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading
Posted in Security Blog
Tagged 2015, badusb, buyer beware, hacked, hardware, keyboard, keylogger, malwre, mouse, peripherals, Security Awareness, spy, trojan, usb
Comments Off on Beware Used or Discount Devices
U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate
The United States Central Command (USCENTCOM) is a theater-level Unified Combatant Command of the U.S. Department of Defense, established in 1983. It was originally conceived of as the Rapid Deployment Joint Task Force (RDJTF). Its area of responsibility includes countries … Continue reading
Posted in Security Blog
Tagged 2015, centcom, cyber caliphate, cyberterrorism, isis, Islamic State of Iraq and al-Sham, twitter, us central command, youtube
Comments Off on U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate
Protecting Personal Information
Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, passwords, Protect Your Personal Information, two-factor
Comments Off on Protecting Personal Information
Payment Card Industry – Data Security Standard version 3.0
I’ve been doing some extensive studying for the PCI DSS v 3 and there is a vast improvement on the requirements. There are 6 goals of PCI Remove sensitive authentication data and limit data retention. This milestone targets a key … Continue reading
Posted in Security Blog
Tagged 2014, credit card, data security standards, guidance, help, PCI Compliance, requirements, security standards council
Comments Off on Payment Card Industry – Data Security Standard version 3.0
Seven Million Dropbox Passwords
6,937,081 usernames and passwords were unfortunately stolen from other services and used in attempts to log in to Dropbox accounts. I recommend that users turn on two-factor authentication and install a time-based, one-time password app on a mobile device. To … Continue reading
Posted in Security Blog
Tagged 2014, dropbox, hacked, information security, passwords
Comments Off on Seven Million Dropbox Passwords
My Google GPS Footprint
I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading
Posted in Security Blog
Tagged 2-step, 2014, android, footprint, Google location history, gps, Information Technology Security Awareness, passwords, Security Awareness, two-factor
Comments Off on My Google GPS Footprint
Bruce Schneier Facts
Bruce Schneier Fact #1: Bruce Schneier once killed a man using only linear cryptanalysis. Bruce Schneier Fact #2 Bruce Schneier once decrypted a box of AlphaBits. Bruce Schneier Fact #3 P = NP in Bruce Schneier’s very presence. Bruce Schneier … Continue reading
Posted in Security Blog
Tagged 2014, Bruce Schneier, Bruce Schneier Facts, lol
Comments Off on Bruce Schneier Facts