Top 5 Unfortunately Common Online Attacks

Using the Internet continues to be a risky endeavor as the range of exploits and attacks continues to increase. Even without seeking out questionable content, it is easy to be compromised by a wide range of common online attacks. Here are five unfortunately common online attacks and what you need to do about them.

Read more

Don’t Get Stung By Hacking Back With Honeypots

Consider this: You are the CEO of a company that has been persistently attacked by hackers. You’ve suffered damage, denial of service, loss of intellectual property, and more. Despite numerous attempts to identify and clean up malware and vulnerabilities, the hackers continue to attack. You decide something must be done. Your company cannot continue to suffer this loss and damage. You want to locate the hackers, if possible, but at a minimum you want to stop or block the attacks and try to recover stolen property.

Read more

How To Protect Yourself from Malware By Using a Non-Privileged Account

Standard security practice for the U.S. federal government and most medium and large enterprises calls for users to run as “Normal User” on the computer at their desk. Also called “Standard User” mode, this prevents employees from becoming an administrator on their work PC. While this helps prevent misconfiguring work computers (and the subsequent helpdesk requests,) this is mainly to prevent malicious software, or malware, from installing on the system and compromising the business’ network or sensitive information.

Read more

Top 5 Risky Internet Behaviors

The Internet is not a safe place. We see that more than ever with the security breaches of businesses and individuals in the news on a daily basis. As Internet citizens, we need to take our protection into our own hands, as obviously most online services are not doing their best to protect us.

Read more

Who’s the Hacker?

Before the era of cybercrime, hacking for social, political, or religious causes (so-called hacktivism), and terrorist threats to our infrastructure and monetary systems, the hacker started as an explorer and traveler on the data superhighway. Today, we can still categorize some hackers as explorers. In fact, the title “hacker” carried the pejorative meaning only recently.

Read more