Google has announced that Gmail including G Suite (formerly Google Apps) will begin blocking attachments with the file extension of .js. This means you will not be able to send .js (typically Javascript) files from Gmail and people sending messages to Gmail accounts will receive a bounce message telling them that their message cannot be delivered. Google made this announcement … [Read more...]
Shodan – the search engine for Internet-connected devices
Shodan, taking its name from the AI in the System Shock video game series, is a search engine for devices reachable on the Internet. The index is built by crawlers scanning the web 24/7 looking for devices that are reachable on standard ports. This is a valuable resource to understand the security of your organization. You might have some devices intentionally exposed to the … [Read more...]
National Cyber Security Awareness Month 2016
October is National Cyber Security Awareness Month. It is an effort in its 13th year between government and industry to remind Americans of the resources available to stay safe and secure online. The official site is available StaySafeOnline.org. This year marks the sixth year of the Stop. Think. Connect. campaign. This encourages people to pause and consider security … [Read more...]
FTC video shares steps for consumers to take post-data breach
The Federal Trade Commission has created a video explaining the steps they recommend taking after you find out that your information has been stolen in a data breach. Several large breaches have been announced in recent weeks, so this information could be timely if you are impacted by LinkedIn, Yahoo, and other compromised companies. You can find the advice from the … [Read more...]
Is the smart home secure?
The Internet of Things (IoT) trend of connected devices may make our lives more convenient and our homes "smart" but are they secure? Researchers indicate that many devices are not secured by using the default password, unpatched vulnerabilities, or other security weaknesses can leave your home, appliances, computers, and personal information at the mercy of attackers. See this … [Read more...]