ResourcesYou Can Hang Up On Them All You Want, But They'll Keep Robo-CallingHow to Free Yourself and Your Phone from SPAM Calls Using LAD. The Autodialer, Redux. No Call Registry or not, the nuisance of the Nineties has returned in force and it is badder than ever (or just makes you madder than ever? Probably both). Technology and the Internet… [read more] Down the Rabbit Hole — How "Secure DNS" Keeps Hackers Safe From YouSince the dawn of the Internet, the Internet relied on DNS. DNS is a system for connecting domain names, which are easy for people to remember (e.g., google.com), to IP addresses, which are easy for computers to work with (e.g. 192.168.0.1). This system for translating domain… [read more] Cyber-Fighting in the Factory: CISA Issues New Warnings About ICS VulnerabilitiesWhile not groundbreaking news, CISA's newest security advisories about ICS vulnerabilities are good reminders to be alert to the importance of network segregation and the need to isolate sensitive controls from the hoi polloi of the common business computer network… [read more] Absolutely Frightful! Zombie ComputersThough the term "zombie computer" may conjure up hilarious images of grisly undead computers mindlessly moaning out code, roaming the land and causing madness and mayhem, a zombie computer is simply a computer that has been surreptitiously hijacked by a cyber… [read more] Keeping Secrets From Your Computer: Network Segregation With LADThe environment inside the typical computer network is oftentimes wide open. Everyone knows who everyone else is, any device can address another and no one holds much back. It is all pretty convivial, easygoing and not really a problem, so long as no one has ill intentions… [read more] When Your Digital Assistant Moonlights for Someone ElseSiri, Alexis and… Bob. We all know the names of the most popular digital assistants from Apple, Amazon and others, but what about Bob? Yeah, Bob: the guy who spies on you through your digital assistant… [read more] We Don't Have Any Hackers in North Dakota!It is a misperception to believe that only the government and large corporations are under attack by hackers, or that smaller organizations only have trouble with hacking when someone has a beef with them. Though there are stories in the news about disgruntled ex-employees… [read more] The Gloves Fit, But Aren’t Yours: When Someone Else Uses Your IP AddressWhether they have hacked your Wifi or are spoofing your IP address, someone else using your IP address to download or distribute images of exploited children and other illicit or illegal content is a serious situation that can lead to criminal and legal entanglements… [read more] Trust in the Digital Age: Working from Home on a Company LaptopYou have been provided a computer by your company. They trust you enough to work from home without direct supervision. You dot all your i’s and cross all your t’s, making sure to keep the company computer just for work, taking care… [read more] And You Thought Online Ads Were Just About Marketing...You were right when you thought online ads were about selling something, you just didn't know that they were about selling you. We first touched on this phenomena back in 2013, when we pioneered research into the use of online as by cybercriminals… [read more] Why Should I Care About Keeping Apples Away From Oranges?An odd question to ask in the context of networks? Perhaps. Yet, the same logic applies. You may have noticed how we frequently bring up the concept of segregating the computers and other devices on your network from each other… [read more] How Intel’s J-1900 Can Help You With Network Management and SecurityIntel released its 4-core J-1900 processor in 2013. The most remarkable thing about it was its low price. It also has very low power consumption – so low that a whole chassis with the J-1900 processor typically consumes only seven to nine watts, not including power draw… [read more] Hunting for the Needle in the NetworkWhile many network problems usually manifest themselves only intermittently, their effects can cascade far beyond their initial cause, making it difficult to separate the cause from the effects. Narrowing down the problem to the specific piece of failing equipment, misconfigured… [read more] Why Close the Curtains? Your TV Is Showing Your Dirty Underwear to the WorldIt’s not just celebrities who get their private pictures stolen and published for all to see. It’s an equal opportunity hack and could happen to anyone with a computer, tablet or smart TV connected to the Internet. It’s a very simple scenario: someone hacks into your… [read more] When Your Computer Becomes the Scammer's AccompliceComputers are useful tools, but they are dumb. Somehow computer technology has not yet evolved enough for computers to make judgement calls (of any sort). Whether a dinky low-powered laptop or a speedy, overclocked desktop, computers can only do what they are… [read more] Don’t Mix Business and Pleasure: Top Tips for Securely Working from HomeWith telecommuting and freelance work from home on the rise, data security is a top priority. No working relationship could be improved by spreading malware and computer viruses from your home network to the corporate network of your employer or client… [read more] Worse than the Flu: How Not to Infect Your Workplace Because Your Kids Were Careless on the InternetYou thought you did everything right: you were processing payroll or working with corporate secrets from home on a dedicated, password-protected computer that no one else was allowed to touch, and you didn’t use it for anything but work… [read more] What Your VPN Doesn’t Know (Can Hurt You)For a quick dash of security, companies set up many telecommuters with VPN clients to connect to the corporate server and other assets on the company’s computer network. Leaving aside the issues of expense, inconvenience and how good the VPN’s encryption actually is… [read more] Securely Working From Home: Practical ConcernsAside from managing the interruptions and distractions that will occur when you work from home (especially if you have kids), the biggest practical concern is how to do it securely. A home computing environment is very far removed from a corporate network… [read more] No “Expert” Needed: Computer Network Management at Your FingertipsLarge technology corporations catering their expensive (“elite”) wares to the select few have forgotten that it is the small businesses and the scrappy bootstrappers that are the backbone of the US economy. We remember, and we know that with the right tools… [read more] Why Your Computer Is Valuable to HackersA hacker’s desire for your computer likely has nothing to do with you specifically (nice as you are). It’s not just potential access to your financial accounts or the ability to unleash ransomware that makes hackers want to get into your computer. Your computer is valuable… [read more] The Secret Life of Computer NetworksThe average traffic on a home computer network today tops what was typical for a small office ten years ago. Back then home users did not generate much network traffic, but today with Internet-connected “smart” TVs, entertainment systems and gaming consoles… [read more] When Your Irreplaceable Software Reaches End-of-LifeWhile many legacy apps continue to provide value, maintaining and securing them presents a challenge to IT security teams, since patches and upgrades are no longer available after they reach end-of-life status. Add in the many attacks targeted toward end-of-life platforms… [read more] When Too Many Bytes Leave You with FragmentsThe standard Ethernet payload/MTU size? 1500 bytes. The packet payload size used on many networks? Also 1500 bytes. Easy, peasy, right? Not so fast. When sent out to the Internet, those packets with 1500-byte payloads that seamlessly sped around within … [read more] Is Your “Smart” TV Watching You? FBI WarningAs the holidays near and deals tempt, shoppers are carting home all manner of tech gifts, including “smart” TVs. Whether the TVs are smart or not, the manufacturers certainly have additional ideas on how to get value out of making them, beyond the one-time sale to the… [read more] |