Domain Time II exploit

Domain Time II is a software used by the largest enterprises such as NASDAQ, Experian, Raytheon, SpaceX, Verizon, Microsoft, HP, AMD, and many (many) more. The purpose of this software is to synchronize time across networks and computers, which is something so basic...

10 Mistakes everyone makes with passwords

Use a password that is hard to guess. Security firms regularly report the most widely used and most obvious passwords, and the same suspects always pop up. ‘Password’ is perennially popular, as is ‘123456’ and ‘iloveyou’. The user’s own name is also a common choice....

Microsoft Exchange March 2021

If you use Exchange servers you are most likely vulnerable to what can become the hack of the year, or even worse. Malicious actors have gained access to over 30 thousand Exchange servers in the USA, hundreds of thousands around the world. Even updated and patched...

Protect Kids From Cyber Threats

When kids get on a phone or tablet or computer, they are immediately exposed to two kinds of threats: watching what they should not be watching and being watched by those who shouldn’t be watching them! And that makes for a new challenge for parents who are not...

CEO: CyberSecurity while traveling.

> Before You Go Update your software: unpatched software (operating system as well as installed applications) is by default software that has known vulnerabilities that are known to the public. Shut those doors down before you leave the safety of your office! Back...

What Is Phishing

  > What Is Phishing Phishing in the digital world is similar to fishing in the general public’s understanding, and it is very simple: The Phisher casts a bait, and waits to see who will bite. And just like fishing can cost a fish its life, Phishing can very...

Ransomware Attack

SmarterASP.NET – a provider that hosts Microsoft’s ASP.NET web framework and reportedly has more than 440,000 customers – suffered a ransomware attack on Saturday. SmarterASP.NET was blunt in a status update on Monday titled: “Your hosting accounts are under attack”....

Can Malicious Actors Impersonate You?

One of the first things hackers try is to see if they can spoof the email address of a CEO, HR manager, Finance, or something of the sort. If they succeed then they can cut through your network like a hot knife through butter. Attackers can launch a spear-phishing...

error

Enjoy this blog? Please spread the word :)