Just another post!
Well, it's about time I get some fresh data on this website. I've been busy with other projects and kind of neglected this one. One of the things I wanted to share with you all is how I have my network setup, I'm using a Dell r610 server with a bare metal install of...
Anti-Virus and Firewalls
Ok, let’s talk about anti-virus. Ugh. This one is like opening a nasty can of worms. But it's gotta be done. Your network security would have a big leak in it if you're running without it. But believe it or not a lot of people do. Some of the frustrations over...
Browser Security
Next up is Browser Security. The browser is actually a pretty sophisticated piece of software. It has to translate all that stuff on web servers into something user friendly. The browser also handles all of the security details associated with the communications with...
Keyloggers, Keylog Detectors and Key Scramblers
Ok, now that we have our passwords secured and everyone's sleeping better at night, how about we talk Keyloggers? I’m fairly certain most all have heard of and know what a Keylogger is. Basically what it is, is malware designed to record every keystroke made on your...
LastPass Password Manager
I thought I’d start right off with what is probably the most disregarded yet easiest to implement security practice of all. Password management. We all have many websites we frequent and so many logins to keep track of. So what do most of us do? Well, most of us don’t...
Welcome to Network Security Matters
Welcome to Network Security Matters. I have read several definitions of what Network Security meant and it's really up to who you ask and what it means to them. I read through a dozen or so descriptions of Network Security vs Internet Security vs Cyber Security and I...
Hacking group CyberTeam claiming responsibility for Skype outage, threatens Steam
Source: Hacking group CyberTeam claiming responsibility for Skype outage, threatens Steam A hacking group called CyberTeam has taken responsibility for an attack against Skype that has impacted that service for the last two days and said the gaming site Steam...
Trump’s Cybersecurity Executive Order Under Fire | Threatpost | The first stop for security news
Source: Trump's Cybersecurity Executive Order Under Fire | Threatpost | The first stop for security news “Why don’t we incent young people to be involved with cyber security for five years and then pay for their college?” he said. “We have a small program now...
British parliament hit by cyber security attack – France 24
Britain's parliament was hit by a "sustained and determined" cyber attack on Saturday designed to identify weak email passwords, just over a month after a ransomware worm crippled parts of the country's health service. Source: British parliament hit by cyber security...
New Mac Malware Discovered on Dark Web as Security Experts Remind Mac Users Not to Be ‘Overconfident’ – Mac Rumors
Source: New Mac Malware Discovered on Dark Web as Security Experts Remind Mac Users Not to Be 'Overconfident' - Mac Rumors Two new pieces of malicious software aimed at Mac computers have been discovered on the Dark Web, offered through Malware-as-a-Service (MaaS) and...
Hundreds of Fake Android Antivirus Apps Deliver Malware | SecurityWeek.Com
There are thousands of Android applications containing the label “antivirus,” but a big chunk of them are dangerous programs designed to infect devices of unsuspecting users with malware, RiskIQ warns. Source: Hundreds of Fake Android Antivirus Apps Deliver Malware |...
Chipotle: Hackers Dined Out on Most Restaurants
Restaurant chain Chipotle Mexican Grill says customers' payment card data was stolen via point-of-sale malware installed at the vast majority of its more than 2,000 Source: Chipotle: Hackers Dined Out on Most Restaurants
Credit Card Breach at Buckle Stores — Krebs on Security
The Buckle Inc., a clothier that operates more than 450 stores in 44 U.S. states, disclosed Friday that its retail locations were hit by malicious software designed to steal customer credit card data. The disclosure came hours after KrebsOnSecurity contacted the...
Are Google, Amazon and others getting too big?
The US tech giants Apple, Google's parent Alphabet, Microsoft, Amazon and Facebook are the five biggest companies in the world by market capitalization. Their increasing dominance is fueling concerns about competition and data privacy. So are regulators about to get...
‘How foul-mouthed hackers messed up my life’ – BBC News
A security weakness in Gary Berman's home network may have lost him a $400,000 contract. Source: 'How foul-mouthed hackers messed up my life' - BBC News
Botnets Can Exploit More Vulnerabilities in DVRs | SecurityWeek.Com
Newly discovered vulnerabilities affecting DVR systems could open the door to new, more potent Internet of Things (IoT) botnet attacks. Source: Botnets Can Exploit More Vulnerabilities in DVRs | SecurityWeek.Com
Hacking and Linux Go Together Like 2 Keys in a Key Pair | Cybersecurity | TechNewsWorld
Ever since taking an interest in Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major...