This article is six pages in Word and because of the length, WordPress isn’t playing nice. The document below contains the entire article. Read more “Do the right thing – configure your HTTP headers”
“Free” websites are free because they display ads to generate revenue, but some website owners are forgoing ads for crypto-miners that are loaded into your browser without your knowledge or consent. Cryptojacking began with less than reputable websites such as The Pirate Bay and phishing websites, but that is slowing changing. Read more “Cryptojacking has Grown in Popularity”
Browsers give you the option of auto-filling your username and password as a convenience, but convenience usually comes with vulnerability in the cyber world, and this is no exception. There are two scripts used by over one thousand websites to steal your email address and other user identifiers to send to third-party servers to track you.
Site owners are using one of two scripts that are an invisible login form that recognizes that your browser is using auto-fill. Read more “Web Trackers Exploit Your Browser Credential Manager”
A data breach is a cataclysmic invasion of privacy which can wreak havoc on both businesses and private individuals. 2017 surpassed the total number of data breaches in 2016 by mid-year. Today we touch up on what to do after a data breach. Read more “Steps You Should Take After a Data Breach”
There’s been a lot of issues with Netgear’s remote management web page in its routers in the past, and the guidance has been to disable the remote management web page. Well, I decided to see how many people have left their Netgear router vulnerable because they have the remote management enabled. Read more “Shodan Adventures Part 1”
We all hate slow computers, so this tutorial will show you how to speed up your Windows PC.
Disk Cleanup Tool
Programs→Accessories→System Tools→Disk Cleanup.
Go ahead and tick everything in the disk cleanup window. Wait for the program to finish and click the delete files button.
Start menu -> Type Disk Cleanup
It will take about 5-10 seconds to come to the main window, and it will ask which files you want to delete. Select all files and click ‘Clean up system files.’ Read more “How to Speed up Your Windows PC”
Human traffickers worldwide are increasingly using social media to contact vulnerable victims. Human traffickers know how to search out a needy child or teenagers who may be insecure and wanting attention. The trafficker may appear to take a special interest in the child and tell them what they want to hear…this is called grooming.
Once limited to luring victims in the street, traffickers can now message thousands of people through Instagram, Facebook, Kik, Tagged and Twitter, with WhatsApp and Snapchat some of the latest tools in their arsenal. A trafficker may meet their potential victim on Facebook or other well-known site but ask the child to transfer their conversation to Kik or another less popular site. Read more “Human Traffickers Use Social Media to Lure Victims”
PCI DSS was developed to stem the tide of credit card fraud where Visa and Mastercard had losses topping $750 million between 1988 and 1998. PCI DSS is the brainchild of Visa, Mastercard, Discover, and American Express that was standardized in 2004. The goal of PCI DSS is to have security requirements for management, policies, procedures, network architecture, and software design to prevent a data breach or in the vent of a breach to keep the damage to a minimum. PCI DSS is for merchants and service providers (the focus of this article), PCI PA-DSS is for software developers, and PCI PTS is for device manufacturers. Read more “Payment Card Industry Data Security Standard”