Morons Use Public Wifi!
Well as the title implies, Morons Use Public WiFi! Sorry, not Sorry. I am getting straight to the point and ripping off the band-aid. You are a moron if you use public WiFi and its probably not your fault but this day in age there is no excuse and these 7 reasons below will tell you why you should stay off Public WiFi.
1. The Man-in-the-middle Attack
One of the most common types of Wi-Fi security threats is the man-in-the-middle attack. This is where hackers intercepts data through techniques to eavesdrop on you. The hackers will intercept and relay messages between two different points which makes it appear everything is normal, but in reality, the attacker is controlling the entire communication.
2. Attack cloning
Here is a simple and one of my favorite tricks. The hackers would divert your internet traffic to a cloned site. The technical term for this … Read the rest
Adobe Users Compromised Due To Public Accessible Database
Around 7.5 million Adobe Creative Cloud users details are now available on the dark web. Researcher Bob Diachenko uncovered the compromised database which could be tapped without a password or any other authentication; offering an attacker access to email addresses, account information and which Adobe products that users purchased. They were quickly made aware but information was already out on the web. Which now leaves you open to even more phishing campaigns, as spear phishing wasn’t bad enough.
Thankfully, users’ passwords and payment details were not among the data that was exposed. However, a laundry list of personal information belonging to nearly 7.5 million Adobe Creative Cloud users was accessible via the database. This included:
- Email addresses
- Account creation date
- Which Adobe products they use
- Subscription status
- Whether the user is an Adobe employee
- Member IDs
- Country
- Time since last login
- Payment status
Please be vigilant towards any emails you … Read the rest
Saying Goodbye To Adobe Flash
Saying goodbye to Adobe Flash will be hard, The end date of Flash Player is on December 31, 2020. Here’s what you can expect after the farewell of flash.
Adobe Stated the following:
“Given this progress, and in collaboration with several of our technology partners – including Apple, Facebook, Google, Microsoft and Mozilla – Adobe is planning to end-of-life Flash. Specifically, we will stop updating and distributing the Flash Player at the end of 2020 and encourage content creators to migrate any existing Flash content to these new open formats.”
“Several industries and businesses have been built around Flash technology – including gaming, education and video – and we remain committed to supporting Flash through 2020, as customers and partners put their migration plans into place. Adobe will continue to support Flash on a number of major OSs and browsers that currently support Flash content through the
Hackers Using Discord to Steal Your Information With Malware
Researchers found that Hackers are injecting malware into Discord to steal your information. The Windows Discord application functionality is based on HTML, CSS, and JavaScript. This allows malware to modify its core files so that the client executes malicious behavior on startup.
This Discord malware is targeting data that can be obtained from the chatting platform itself:
- details about the Discord version used;
- the browser user agent;
- first 50 characters out of the victims’ Windows clipboard;
- zoom factor;
- stored payment information;
- username;
- email address;
- phone number;
- a public IP address;
- a local IP address;
- screen resolution;
- timezone;
- Discord user token.
How to check if you are infected
Checking if your Discord client has been modified is very easy as the targeted files normally have only one line of code in them.
To check the %AppData%\Discord\[version]\modules\discord_modules\index.js simply open it in Notepad and it should only contain the single line of “module.exports … Read the rest
How To Fix Not Responding Windows Explorer
Are you having problems with windows explorer? Here are a few steps on how to fix windows explorer not responding or windows crashing issue. There is a Windows 10 feature in File Explorer called “Quick Access”. This feature allows you easy access files and folders you frequently use, either it be locally or on the network and OneDrive.
Quick Access can make your workflow faster by making it so you don’t have to navigate to a file’s or folder’s that are buried deep in a directories file system. However, on occasion you may want to delete the Quick Access history to help maintain some privacy or quicker access or just resolve the explorer crashing issue
Clearing Windows 10 Quick Access History
- Click Start or Cortana’s search field and type: file explorer options and hit Enter or click the option at the top of the search results.
2. Now in the … Read the rest
Firefox 70 Tells You If Website Breached
Firefox 70 has been released for Windows, Mac, and Linux and with it comes additional protection like telling you if a website was breached. Firefox 70 also has a new ability for providing social tracking protection and the most awesome feature is that it has a integrated data breach notification service for your saved logins.
Lockwise data breach notifications
With Firefox 70, the Lockwise password manager will now warn you if your saved login credentials were exposed in a data breach.
If your login information was saved to the password manager priror to the data breach, Firefox will display an alert in lockwise logins entry. This alert will state that “Passwords were leaked or stolen from this website since you last updated your login details” and then prompt you to change your password.
You can download Firefox 70 from the following links:
… Read the restTop Email Phishing Scams
Email phishing scams have evolved to a point that makes it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands and people to trick victims into providing money or providing credentials over an email or a fake landing page.
Roughly one in four Americans in constantly online. According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.
Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the … Read the rest
Is Microsoft Teams HIPAA Compliant?
Many still seem to wonder and ask what is Microsoft Teams and is this software questionable for use? This includes compliance and security officers in the Healthcare industry leading them to ask is this HIPAA Compliant? However lets go back to the basics, Microsoft Teams is a cloud platform that combines workplace chat, meetings, notes, and attachments. Microsoft Teams is Microsoft’s was created to be the competitor to Slack and Google Hangouts Chat.
Microsoft Teams and the Business Associate Agreement
I have previously mentioned that their is a office365 Business Associate Agreement which is the written contract between a Covered Entity and a Business Associate. It is required by law for HIPAA compliance.
I have checked Microsoft’s site and found a page called:
Microsoft Teams Security Features
Certification and Compliance
Microsoft created Teams to be fully Office 365 Tier-C compliant, … Read the rest
Achieving Security with IoT (Internet of Things)
Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security. Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This day in age we have to maintain a due-care and due-diligence approach on security for all these IoT devices.
With this in mind, here are seven best practices on security for IoT:
- Use security gateways: They have the ability to inspect and audit the communications of your network.
- Use VLans: Put all IoT devices in a separate Vlan outside primary business network.
- Use strong authentication: Change those consumer devices default passwords!
- Disable services: Many devices use telnet, FTP and other risky services that may be exposed to the internet.
- Use secure protocols:
The Best Home Lab For System Administrators
This home lab is great for anyone who is just starting off their IT career and looking to get a step up in knowledge by chasing after it. If your a System Administrator already get yourself a lab anyways because the more you know the better.
Having a Home Lab builds your confidence because you obtain the technical know how for deploying new infrastructures. You gain confidence because you have created the environments you currently work with or you create a similar clients environment in your home lab then you learn what could happen and what will happen and how to go about troubleshooting or setups and migrations. As someone that has their own Home Lab I do know the benefits of it and what knowledge you would gain from it. As an employer I ask every interviewee if they have a home lab or not because this lets me … Read the rest