RC4 Servers are Breaking the World Wide Web

With all the news over the last year about secure websites falling victim to serious encryption vulnerabilities, I sit here in disbelief that one very critical vulnerability has seemingly slipped through the cracks. I’m speaking of the RC4 encryption cipher. ATTENTION WEB SERVER ADMINISTRATORS: I’M TALKING TO YOU!!

Your 2015 Security Check List

Now that we are almost one-sixth of the way through the year, many of us have probably abandoned some the many great ideas to better ourselves. So, I encourage you to make just one more resolution that you cannot afford to put on the back burner. If you neglect your security, it could lead you …

Your 2015 Security Check List Read More »

E-mail Dos and Don’ts

Email has become one of the primary ways we communicate in our personal and professional lives. However, we can often be our own worst enemy when using it. In this newsletter from the SANS Institute, we will learn the most common mistakes people make and how you can avoid them in our day-to-day lives. SANS Ouch! …

E-mail Dos and Don’ts Read More »

Yes, You Actually Are A Target

A common misconception many people have is that they are not a target for cybercrime: that they or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile device, an online account, email address, credit card, or engage in other types of online activity, you …

Yes, You Actually Are A Target Read More »

A More Secure Password

Password hacks are becoming more common as people’s online accounts contain more sensitive personal data. Even big, trusted sites are suffering password breaches in the recently. And because most people reuse their passwords, it becomes more likely that a password hacked on one site can open accounts on other sites. Here are some tips to …

A More Secure Password Read More »

Protecting Your Kids Online

We all want the best for our children, including the ability to leverage technology. However, with technology come risks, risks that our children are often not aware of or prepared to deal with. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. But this can be …

Protecting Your Kids Online Read More »

Secure Your Computer In Seven Steps

While handheld devices such as smartphones and tablets provide new ways for us to leverage technology, computers are often still the primary tool we use for our professional and personal lives. As a result, your computer, whether at work or at home, still remains a primary target for cyber criminals. By following these simple steps, …

Secure Your Computer In Seven Steps Read More »

The Tech-Support Phone Call Scam

At the heart of many cyber attacks are criminals attempting to fool you out of your money or trick you into giving them your personal information. Common examples of this are fraudulent e-mails, called phishing, that pretend to come from a person or company you trust, such as your friend or your bank. While such …

The Tech-Support Phone Call Scam Read More »

Why you should use proper SSL Certificates

A posting to Pastebin, by a group that calls itself “Cyber Warrior Team from Iran”, claims to have breached a NASA website via a “Man in the Middle” attack. The announcement is a bit hard to read due to the broken English, but here is how the SANS Internet Storm Center parsed the post:

Scroll to Top