Tag Search: security

Hardcoded Password Found in Cisco Enterprise Software, Again

Posted on Thursday May 17, 2018  |  security

Catalin Cimpanu, writing for BleepingComputer: Cisco released 16 security advisories yesterday, including alerts for three vulnerabilities rated "Critical" and which received a maximum of 10 out of 10 on the CVSSv3 severity score. The three vulnerabilities include a backdoor account and two bypasses of the authentication system for Cisco Digital Network Architecture (DNA) Center. The Cisco DNA Center is a piece of software that's aimed at enterprise clients and which provides a central system for designing and deploying device configurations (aka provisioning) across a large network. This is, arguably, a pretty complex piece of software, and according to Cisco, a recent internal audit has yielded some pretty bad results.

 

Don't give social media hackers a chance

Posted on Thursday May 17, 2018  |  two factor authentication, twitter, settings, security, privacy, login, ios, facebook, apps, android

Pranksters, malicious attackers, extremists - hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don't fret; there are several things you can do to protect your Facebook or Twitter account.

 

Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US

Posted on Wednesday May 16, 2018  |  security

Securus, the company which tracks nearly any phone across the US for cops with minimal oversight, has been hacked, Motherboard reported Wednesday. From the report: The hacker has provided some of the stolen data to Motherboard, including usernames and poorly secured passwords for thousands of Securus' law enforcement customers. Although it's not clear how many of these customers are using Securus's phone geolocation service, the news still signals the incredibly lax security of a company that is granting law enforcement exceptional power to surveill individuals. "Location aggregators are -- from the point of view of adversarial intelligence agencies -- one of the juiciest hacking targets imaginable," Thomas Rid, a professor of strategic studies at Johns Hopkins University, told Motherboard in an online chat.

 

Encrypted Email Has a Major, Divisive Flaw

Posted on Monday May 14, 2018  |  security

An anonymous reader quotes a report from Wired: The ubiquitous email encryption schemes PGP and S/MIME are vulnerable to attack, according to a group of German and Belgian researchers who posted their findings on Monday. The weakness could allow a hacker to expose plaintext versions of encrypted messages -- a nightmare scenario for users who rely on encrypted email to protect their privacy, security, and safety. The weakness, dubbed eFail, emerges when an attacker who has already managed to intercept your encrypted emails manipulates how the message will process its HTML elements, like images and multimedia styling. When the recipient gets the altered message and their email client -- like Outlook or Apple Mail -- decrypts it, the email program will also load the external multimedia components through the maliciously altered channel, allowing the attacker to grab the plaintext of the message. The eFail attack requires hackers to have a high level of access in the first place that, in itself, is difficult to achieve. They need to already be able to intercept encrypted messages, before they begin waylaying messages to alter them. PGP is a classic end-to-end encryption scheme that has been a go-to for secure consumer email since the late 1990s because of the free, open-source standard known as OpenPGP. But the whole point of doing the extra work to keep data encrypted from the time it leaves the sender to the time it displays for the receiver is to reduce the risk of access attacks -- even if someone can tap into your encrypted messages, the data will still be unreadable. eFail is an example of these secondary protections failing.

 

The Risk of Not Having Cloud Backup

Posted on Thursday May 10, 2018  |  storage capacity, security, data recovery, cloud backup, business continuity, budget

It is always better to be safe than sorry. And given the fact that files can disappear or be corrupted in an instant, small businesses need robust data backup systems in place. Without one, you could very well lose lots of money and have your hard-earned reputation irrevocably damaged.

 

Android phones miss vital security patches

Posted on Tuesday April 24, 2018  |  update, smartphone, security, samsung, patch, nokia, huawei, google, android

Android manufacturers routinely update their products with the latest security patches to keep users safe from all manner of threats. Or so they would have you believe. According to recent reports, Android phone manufacturers may have accidentally missed a few critical patches. Here's everything you need to know.

 

Page:   1234567891011121314151617181920212223242526272829303132333435363738394041424344454647

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016