New hacker group attacks satellite, defense, and telecom companies

A new hacker team labelled Thrip by cyber security company Symantec has successfully infiltrated satellite, defense, and telecom companies using a “living off the land” attack.  A living off the land attack uses common computer utilities that attackers use to conduct “undetectable” activities on the network. Because the attacker is using common utilities, companies may […]

D-Link routers under attack by Internet of Things botnet

A recently discovered vulnerability created a way for hackers to add malicious code to a popular model of router manufactured by D-Link.  The malware that hackers are using is adding internet connected devices to a botnet with the intent to mine cryptocurrency and orchestrate denial of service attacks. The botnet in question is known as […]

Password management for the modern computer user

Bad Passwords

Passwords are quickly becoming a cornerstone to modern living.  From computers and mobile devices to webpage logins, your passwords are one of the most important pieces of data you have, surpassed only by social security and bank routing numbers.  The problem is that people don’t treat them that way.  Users choose weak and overused passwords […]

5 ways to secure your home’s Wi-Fi

1.  Use the correct Wi-Fi security standard WPA2 is the leading security standard for Wi-Fi networks.  Past Wi-Fi security standards have vulnerabilities that have not been patched yet and are considered obsolete.  For example, WEP encryption can be cracked in a matter of seconds using specialized software that anyone can obtain.  WPS is another standard […]

Altr begins work on blockchain technology for cybersecurity

The security company Altr is looking to improve the world of corporate data security using blockchain technology. Altr has been in business since 2014 and has recently received funding of $15 million from private investors, large financial institutions, and IT firms around the United States.  The company can now begin working on their new technology […]

Signature Checks exploit on Mac OS fixed

Mac OS has been vulnerable to malware through a flaw in the security signatures process for third-party developers. Digital signatures are a way for users to know if a piece of software is certified safe with the operating system’s parent company, in this case Apple.  Third-party developers must go through a process to ensure that […]