Chrome and Firefox Exploits using CSS and HTML5
Insider threats come in all different shapes and sizes. Many times it’s not malicious in any way even though they come directly from your own employees. A recent vulnerability found in Firefox and Chrome gave attackers access to images from the popular social media site Facebook. The vulnerability was mainly from the advanced HTML5 and…
Read MoreRouters Under Attack from Russian Hackers through Default Passwords
One common element of all networks is the existence of routers. These devices weren’t always used in household networks. But they soon became commonplace with any home network. Because they are so commonplace, hackers have gone after home routers with numerous different attacks. Some attacks make routers a part of a botnet. Others sniff data…
Read MoreAttackers Still use Drupalgeddon2 Vulnerabilities for Cryptojacking
A vulnerability in Drupal’s content management system was found weeks ago. But as with many patches site owners either don’t know that they need to patch their software or they disregard it as unnecessary. Unfortunately, this is the crux of a widespread problem in recent days that indicate more attackers are using the Drupalgeddon2 exploit…
Read More€20,000,000 or 4%? – GDPR
You knew it was coming, and while initially, you may have been in denial, you can’t ignore it anymore. The General Data Protection Regulation (GDPR) is going into effect on May 25, 2018, whether you’re ready or not. Make sure you have a GDPR compliance solution deployed to make maintaining compliance much easier. Because the…
Read MoreInsider Threats and the Dangers of Crypto Mining to the Enterprise
Although there has been several debates on the advantages and disadvantages of cryptocurrency and the enterprise, one issue with it is cyber security. Dealing with bitcoin or any other cryptocurrency could be an advantage for revenue. But cyber security experts are concerned with the risk of mining and using internal resources on the local network.…
Read MoreWhen Human Error Sends Panic Across the Country
On January 13th, the state of Hawaii went into a state of panic when they received an emergency text message telling them that a ballistic missile was incoming. It took 38 minutes before a follow-up message was sent telling people that the message was in error. The governor of Hawaii later held a conference explaining…
Read MoreThe First Line of Defense in Cyber Security
Headlines continue to provide us with more information on large data breaches like Yahoo and Equifax, where cyber attackers gained access to personal information through gaps in security software. But a shocking number of data breaches have nothing at all to do with the level of an organization’s security. Instead, they have everything to do…
Read MoreGateKeeper Assistive Technology for Logging In
The best office tech helps you get your work done with efficiency and convenience. But when you’re working with a disability, challenges to that kind of unthinking ease can crop up throughout the day. Assistive technology for logging into computers. Touchless password tech can help. GateKeeper type-free login offers simple and elegant tech that unlocks…
Read MoreProtecting Your Organization – Insider Threat Prevention
Most organizations know that they need cyber security to protect from outside threats, but what they don’t account for is the growing number of insider threats. Insider threats come from trusted employees, which is something most employers don’t consider. It’s hard to imagine that a trusted employee could be the one to cost you millions…
Read More