You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.
Weekly security roundup week of March 12th
Samba admins urged to patch
An important vulnerability that came to light this past week is one in the venerable Samba open-source networking stack – and if you’re a Samba admin, you need to update now.
Lawmakers urge better security for smart devices
The first indication that internet of things (IoT) devices posed a real security threat came in October 2016 when a botnet — made up of devices such as security cameras infected with Mirai malware — attacked Dyn, a provider of DNS services.The attack came in the form of a DDoS (distributed denial of service) assault on Dyn’s servers. By firing off multiple requests every second, the attack took down websites all over the USA and Europe, as DNS servers were overrun with requests from millions of infected devices.
Equifax reveals more victims of 2017 breach
The breach at credit-reporting agency Equifax was one of the worst not only of 2017, but of all time.
For most of us, the use of internet-based services is a huge part of our everyday lives. We bank. We shop. We stream. What’s the one thing all of these services have in common? Passwords. They all demand passwords.
Data that you share on social media could end up for sale on the Dark Web. The luxury retailer Neiman Marcus is the latest victim of a data breach. At the end of January, Neiman Marcus notified their online customers that unauthorized individuals attempted to access customer’s online accounts by trying various login and password […]
One of the best ways to protect yourself online is by using strong passwords. Yeah, right. You’ve seen the rules before 1. Use long, strong passwords that mix letters, numbers, special characters, and capital letters 2. Avoid using the same password on different websites. But since we have so many to remember, the average is 19 per […]
People create terrible passwords. As simple as this might sound it unfortunately remains news to millions — if not billions — of individuals who use the Internet. As proof, we’ll take a look at a selection of passwords that were revealed in the Ashley Madison leak. Regardless of any shortcomings Ashley Madison had in terms […]
For those of you keeping track, you can add high-tech sniper rifles to the growing list of Things That Can be Hacked. The vulnerability that allowed two security researchers to break into the computer guidance system of a sniper rifle is the same that allows hackers to access baby monitors and home routers. Simply put, the […]
Last night the pilot episode of MR. ROBOT, a new thriller-drama series aired on USA Network. The show revolves around Elliot who works as a cyber security engineer by day and is a vigilante hacker by night. I watched the episode and then sat down with Avast security expert Pedram Amini, host of Avast’s new […]