This is one of a series of user tips for protecting your privacy and security. Windows 10 has a feature that allows apps to run in the background. Is this a problem? Well, not in theory, but that is the problem. Theories are just that – our best guess at the moment. If you allow […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware is an Equal Opportunity Business As American businesses deal with ever increasing ransomware attacks, larger ransom demands and ransom and extortion wrapped up together, we are not alone. Not that the fact that we are not alone should make us feel better. A new Iranian hacker group is using Dharma ransomware to go after […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Supply chain attacks are attacks on the software (and hardware) that goes into the software (and hardware) that you buy. We keep seeing attacks that compromise that underlying software. Earlier this year, it was Ripple20 that affected millions of IoT devices. Many of those devices will likely never be patched and will be vulnerable forever. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes we focus on the details of cybersecurity protections. And ignore the core issues. In a lot of cases, when companies office in multi-tenant office buildings, the Internet comes into a shared area of the building that is not part of the company’s leased space. This is called a Dmarc for point of demarcation. The […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is a follow up to yesterday’s newsletter alert and sorry, it is a bit technical, but I will try to make it as untechnical as possible. Up to a few years ago, if you ran a website, you could buy an HTTPS (also known as a TLS or SSL) certificate that didn’t expire for […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
August 13th, a Day That Will Live in Confusion August 13th is the day that Part B of Section 889 of the 2019 National Defense Authorization Act went into effect. It bans the use of equipment and services tied to certain Chinese companies that have been deemed security threats by the United States. Companies that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]