KRACK Attack Devastates Wi-Fi Security

Monday, October 16th, 2017

A devastating weakness plagues the WPA2 protocol used to secure all modern Wi-Fi networks, and it can be abused to decrypt traffic from enterprise and consumer networks with varying degrees of difficulty. Not only can attackers peek at supposedly encrypted traffic to steal credentials and payment card data, for example, but ...

How to use Let’s Encrypt to secure your websites

Tuesday, September 19th, 2017

Securing your business website with HTTPS isn't just a good idea, it's a necessity. Google Chrome now marks HTTP payment and login pages and search pages as insecure if they're not using HTTPS. Fortunately, Let's Encrypt makes it both free and easy to lock down your websites. After countless website security ...

Hackers backdoored CCleaner for a month: Over 2 million infected with malware

Monday, September 18th, 2017

Hackers backdoored the popular CCleaner Windows utility; for nearly a month, two malware-tainted versions collected computer names, IP addresses, lists of installed and active software as well lists of network adapters before sending the data to attacker’s server. Cisco Talos, which discovered the malware on September 13 while a customer was ...

5.3 billion devices at risk for invisible, infectious Bluetooth attack

Tuesday, September 12th, 2017

What spreads through the air, is invisible to users, and requires no user interaction— no clicking, no pairing, no downloading, not even turning on discoverable mode— but could bring the hurt to billions of devices? It’s an attack vector dubbed Blueborne. Researchers revealed eight different bugs that affect the Bluetooth ...

Chrome 63 notifies you of Man-in-the-Middle issues

Monday, September 11th, 2017

Google plans to launch a new security feature in the upcoming Chrome 63 browser that notifies users about Man-in-the-Middle (MITM) issues. MITM is best known as a method to attack user systems by intercepting and manipulating traffic. Many security programs with firewall and browsing components do use similar functionality to inspect ...