Crumbling Cookies: Session Cookies Used to Attack Companies

A lot of people have the concept that all cookies are bad. That's simply not true. Many are useful and some are actually necessary. The cookies people think are bad are the ones that are used for marketing and for the most part, they can be blocked. Do you really want to type in your … Continue reading Crumbling Cookies: Session Cookies Used to Attack Companies

Russia’s Killnet Group Declares War on the West

On May 15, 2022, Killnet, a pro-Russian hactivist group, declared war on 10 nations. “Greetings to all our enemies, today we officially declare cyber war on the government of ten countries. From now on, our attacks will include the United States, Great Britain, Germany, Italy, Latvia, Romania, Lithuania, Estonia, Poland and Ukraine.” So, I suppose … Continue reading Russia’s Killnet Group Declares War on the West

The Narcissist Nightmare: Will TikTok be Banned?

If you're a nonentity looking for attention, no app is better than TikTok. If conditions are right, even the most disturbed person can have their moment in the sun. TikTok advocates may think this is fine, but parents don't always agree. Parents complain of TikToks addictive nature, but they've been complaining about addictive apps every … Continue reading The Narcissist Nightmare: Will TikTok be Banned?

The Worse and Worst of BadUSB

A BadUSB attack is what it says it is. It's an attack that uses an altered USB to create an interface to a computer, device, or network that unauthorized users or hackers can take advantage of.  Among hackers, such a pre-programmed, often malicious, USB is referred to as a Rubber Ducky. The good thing about … Continue reading The Worse and Worst of BadUSB

Microsoft 365 Initiates Plan to Detect and Report Bad Employee Behavior

Within Microsoft 365 is something called the Microsoft 365 Compliance Center. It basically checks on how your network complies with ever-changing regulations and tries to assess any risky areas in your network, and this includes your employees. Employees can become threats by accident or by intent. Malicious insiders are those employees who are intentionally trying … Continue reading Microsoft 365 Initiates Plan to Detect and Report Bad Employee Behavior

Government Cybersecurity Agency Finds Vulnerabilities in Dominion Voting Machines

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced that it had found nine vulnerabilities in Dominion Voting machines, or, as the company calls them, systems. The vulnerabilities listed by the government applied to the company's Imagecast X (ICX) system, pictured below. These systems are in use in the following states, which does not mean … Continue reading Government Cybersecurity Agency Finds Vulnerabilities in Dominion Voting Machines

New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Nearly everyone owns an endpoint. We generally call them smartphones or personal computers, but they can also be smart watches or smart TVs. In short, anything you own that can connect to the internet is a potential endpoint. However, they only reach the status of an endpoint when they become part of a network. Endpoint … Continue reading New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Selena Gomez Scams Fan out of $230,613.. sort of

At first, this was good for a laugh. Someone actually believed they were being contacted by Selena Gomez for help. How gullible can someone be! Here is the first part of the report that the victim filed with the Better Business Bureau. At this point you'd still have to wonder how the victim is falling … Continue reading Selena Gomez Scams Fan out of $230,613.. sort of

Online Form Information Harvested Even Before Submission

Did you ever begin to sign up for a newsletter or some website service and then change your mind? Maybe you were worried that you were giving out too much personal information on the form. Unfortunately, new research has found that the information you put on your form may have been harvested by third parties, … Continue reading Online Form Information Harvested Even Before Submission

How Russia’s YouTube was Nuked by the IT Army of Ukraine

Russia has its own version of YouTube called RuTube. It does much the same as YouTube does except that, among the usual videos on cooking and cats, you'll find it used as a propaganda platform for government controlled TV channels such as RT or Channel 1. RuTube is very popular and boasts over 25 million … Continue reading How Russia’s YouTube was Nuked by the IT Army of Ukraine