Monthly Archives: December 2018
Microsoft Edge Being Switched To Chromium
If you haven’t heard already Microsoft Edge is switching to the open-source Chromium software. This is the same software that Google Chrome is based on. This is a beautiful idea most because who wants to navigate a hand full of folder paths to reach favorites. I really hope that they will place them back to…
Best Practice Checklist For Business Continuity
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the…
NASA Data Breach Exposing Employee Records
In October Hackers were successful in hacking into and obtaining the information that resides from within an HR Database. The amount of information extracted is potentially significant which compromised records from July 2006 to October 2018 from previous and current employees. There was an internal Memo sent Tuesday to NASA Employees and published at spaceref.com….
Memes in Twitter can be used to inject Malware
This new malware uses Twitter to deploy Remote Access Tojans (RATs) from a image. The malware can infect vulnerable computers and collect information, take screenshots and jump to other computers to infect them as well. Trend Micro said in their Blog Post that the malware listens for commands within the the hackers twitter account ….
6.8M Facebook Users Private Photos Exposed
The Facebook bug allowed 1,500 apps built by 800+ developers to view unposted private photos. Friday Facebook disclosed that a bug in the platform enabled third-party apps to access unpublished photos of millions of users. When your writing a new post and upload a photo but do not finish posting it Facebook will store it…
Top Worst Passwords Of All Time
Take security serious, here is a lists of the top 500 worst passwords. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds…
DuckDuckGo better than Google for privacy
#1 — Google tracks you. DuckDuckGo Doesn’t You share your most intimate secrets with your search engine without even thinking: medical, financial and personal issues, along with all the day to day things that make you, well, you. All of that personal information should be private, but on Google it’s not. On Google, your searches…
Mac Malware Injects Ads Into Encrypted Traffic
A newly discovered malware infection targeting macOS devices. Malwarebytes security researchers say it has the ability of injecting ads into encrypted web traffic. This malware is call OSX.SearchAwesome, the malware is delivered by a malicious installer that arrives as an app downloaded using a torrent file. The malware installer looks like a disk image file but doesn’t have…
How To Fix RDP Connection Was Denied
Learn how to troubleshoot and resolve the “RDP connection was denied” error. Fix issues preventing remote desktop access with simple steps and solutions.