Blog

ATMs Hacked

Withdrawal Fees? Today an article revealed that hackers are stealing money directly from ATM machines and, better yet, nobody can stop these attacks as they spread across the world.  For those following these types of events, this is just another failing of the SWIFT...

read more

Security Is An Ecosystem…Not A Product

BitCoin Hacked! Today another major hack occurred with intruders obtained $75M in bitcoin from a cryptocurrency exchange in Slovenia.  This is actually not the first BitCoin hack, nor is it even the biggest attack on cryptocurrency.  At the same time, we keep hearing...

read more

And It Begins

Do You Believe Us Now? A while ago, we blogged about the real threat hackers posed and yet we heard nothing back.  We warned you then that simply grabbing data or shutting down a service provider was not the true threat.  We tried to explain that cities and regions...

read more

Stopping Malware

The Hard Way I was discussing malware with a couple of experts last week and they immediately focused on how to prevent malware from being downloaded and how to detect malware in an operating system.  This is the classic approach that I often refer to as The Hard Way....

read more

Let’s Talk Services

That Scarecrow Is Screwed A recent report came out that talks about banks being in deep trouble as hackers are getting serious about accessing their systems.  This follows on the heels of a report that our energy grid has been compromised.  Everything in our lives...

read more

Do Something!

Another Day Another Disaster Now it is Uber that has released critical information to the world.  They join a long list of major data breaches that are "hugely concerning" and "very bad" and "<Insert Nonsense PR Words Here>". The reality is that almost NONE of...

read more

Configuration Is Security

Another MS Security Nightmare In a recent article, it was discovered that the way Microsoft installs applications in Windows makes those applications relatively easy to hack.  While it is amusing (terrifying?) that yet another massive security hole in Microsoft has...

read more

Right…And So Very Wrong

It Starts Out Good... A new report from the NSA discusses how more and more sophisticated attacks are ramping up and how more nations and large entities are amassing resources against our online world.  This is all true, if not understated, and the focus on the...

read more

MS Mess

Smart Edge Devices...Wrong Model Microsoft has released it's Azure IoT Edge software bundle that supposedly enables edge-based computing.  While Microsoft has been moving more and more towards the IoT with great results (see Windows Core), this effort is going to be a...

read more

It Is Not Just Security

Our Infrastructure Is Screwed News flash, we are ripe for the picking as not one agency is our government is properly protected against cyberattacks. Whether the attacks take us to the dark ages or cost over a trillion dollars, the fact is that we are completely...

read more

Protect Your GMail Account

Using Two Factor Authentication A recent study revealed that 250,000 Google account logins are hacked every week.  This number is massive and shows that your login being stolen are inevitable. But that does NOT mean that your account will be hacked. Google has made it...

read more

App Security Does Not Work!

Really...Again? A new programming error has exposed data for over 180 million phone users.  The problem is that developers of over 680 applications used an incorrect set of access codes to a backend text message provider.  Of course, the provider says that they are...

read more

Simple Tricks To Overcome Ransomware

Look First Yes, another attack came out today that combines all kinds of malware threats into one nightmare package.  With the number of ransomware attacks increasing so drastically, many people feel helpless and are just waiting to get taken down.  And yet there are...

read more

Certificates Must Go

The World Of Certs For those who are unaware, certificates are a traditional way for one device to assert its identity to another device.  Certificates are provided by an independent party, often called a Certificate Authority (CA), and that CA takes part in an...

read more

Beware Dirty Dishes

IQ + Homes = Hacker Heaven In a shocking (not really) discovery, researchers discovered a major exploit that impacts LG smart dishwashers.  Using this massive security hole, hackers can readily break into these dishwashers and...err...see your dirty dishes? Or, more...

read more

Security Software Has To Change

In-Band Security Is Bad It continues to surprise me how many people still do not know about the Kaspersky Russian Spyware fiasco.  In short, Kaspersky is one of the most widely-installed anti-virus software in the world.  Many people knowingly added it to their...

read more

Stopping The Reaper

Fear The Reaper In a prior post, we warned you that this was going to happen, that the series of bot attacks were a prelude to the real action.  Now it is here, the Reaper botnet attack is threatening to take down the Internet.  The best part? There is nothing we can...

read more