Tag Archives: 2015

Fake Profiles on LinkedIn, a Gateway to SpearPhishing Attacks

Posing as recruiters, the LinkedIn fake accounts allow hackers to map the networks of business professionals and gain the trust of those in them. Symantec has worked with LinkedIn to remove all of the fake accounts it identified. By making … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Fake Profiles on LinkedIn, a Gateway to SpearPhishing Attacks

VTech Electronic Toys Suffers Privacy Leak

An anonymous (not the group) hacker got into the VTech toy makers servers and downloaded 190 GB of data that included pictures of parents, kids, and chat logs between the parents and their children. That’s about 4.8 million registered users … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on VTech Electronic Toys Suffers Privacy Leak

Cyber Monday…. Scammers Are Coming!

As you know, with Cyber Monday coming up and all the online shopping you are all doing, you and everybody you know will be hit in the email and all over your social media with probable scams. Be Aware and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Monday…. Scammers Are Coming!

Police Body Cameras Infected with Conficker Worm

Conficker is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Police Body Cameras Infected with Conficker Worm

A Different Terror in France!

Airport systems in Paris Orly International Airport use a system called DECOR, which is used by air traffic controllers to communicate weather information to pilots. Pilots rely on the system when weather conditions are poor. The problem with DECOR is … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on A Different Terror in France!

Cybersecurity Bill of Rights Adopted by NAIC

On October 14th, 2015, the National Association of Insurance Commissioners (co-developer of the Model Audit Rule) has adopted the Cybersecurity Bill of Rights​ ​ The Cybersecurity Bill of Rights describes what you can expect from insurance companies, agents, and other … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Cybersecurity Bill of Rights Adopted by NAIC

SPY Car!

Is a name for an Act for the “Security and Privacy in Your Car Act of 2015. An act that requires automakers to adhere to certain standards of protection against privacy and hacking that would be developed by the Federal … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on SPY Car!

Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson

Your Evolving Digital Life

Click the graphic to learn more about NCSAM!

Posted in Security Blog | Tagged , , , , , | Comments Off on Your Evolving Digital Life

USB Killer… 2.0!

Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Killer… 2.0!