Attackers can access Dropbox, Google Drive, OneDrive files without a user’s password

Thursday, August 6th, 2015

Hackers don't even need your password anymore to get access to your cloud data. Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a "man-in-the-cloud" attack can grab cloud-based files -- as well as infecting users with malware -- without ...

New Version of TeslaCrypt Changes Encryption Scheme

Tuesday, July 14th, 2015

A new version of the nasty TeslaCrypt ransomware is making the rounds, and the creators have added several new features, including an improved encryption scheme and some details designed to mimic CryptoWall. TeslaCrypt is among the more recent variants of ransomware to emerge and the malware, which is a variant of ...

Y-router configuration adds additional security to your home network

Wednesday, June 10th, 2015

I'm helping someone reconfigure their home network and realized that I never posted about the Y-router configuration.  Most folks have a home modem that is leased from their ISP and most of these newer modems have built-in router functionality and provide both LAN and WLAN connectivity, but this modem is ...

Free Tools To Secure Windows Against Malware

Saturday, June 6th, 2015

Everyone wants a secure operating system. No one likes to have a computer infected with malware that slows down the PC, destroys files or steals sensitive information. Often, that operating system isn't very secure by default. If it's also a highly popular OS, such as Windows, then more tools are ...

New exploit leaves most Macs vulnerable to permanent backdooring

Tuesday, June 2nd, 2015

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction. The attack, according to a blog post published Friday by well-known OS X security researcher Pedro Vilaca, affects ...