Global Cyber Attacks are Growing in Scope, Impact, and Frequency – Here’s what you can do to stay safe.

Introduction Numerous ongoing phishing schemes, phone scams, account breaches, and hacking campaigns are resulting in substantial losses and disruption around the world. This barrage of attacks leaves most people feeling vulnerable and ill-equipped to protect themselves. Here’s a sampling of news headlines from yesterday and this morning: “Cyberattack Hits Ukraine Then Spreads Internationally,” The New… Continue reading Global Cyber Attacks are Growing in Scope, Impact, and Frequency – Here’s what you can do to stay safe.

Periodically scrubbing unused drive space may help with data recovery later.

Most computers contain many old deleted files even years after they’ve been deleted. This is because deleting a file and emptying the recycle bin doesn’t permanently remove the files from the computer’s hard drive. It only hides it from view. If there’s a file you mistakenly deleted, and you need to get it back, recovery… Continue reading Periodically scrubbing unused drive space may help with data recovery later.

Heartbleed Computer Vulnerability – What you need to know now and how to respond.

Today I had an interview with Justin Andrews of KWWL. We discussed the Heartbleed security exploit and what consumers can do to protect themselves. Click here to view the interview and read the KWWL story. If you have questions about this and other computing security concerns, feel free to contact me. “Considering the long exposure, ease of exploitation and attacks leaving no trace… Continue reading Heartbleed Computer Vulnerability – What you need to know now and how to respond.

Major Computer Security Breach Results in Executive Order by President of the United States

Security Breach. On 8 February 2013 the following report was released: Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms, has suffered a security breach. Some Bit9 customers discovered malware inside of their own Bit9-protected networks, malware that was digitally signed by Bit9′s… Continue reading Major Computer Security Breach Results in Executive Order by President of the United States

Yahoo Accounts Vulnerable to Hacking – Why and How to Protect Yourself

There’s a flurry of articles being written about the current Yahoo security vulnerability that allows user accounts to be easily hacked. The original research for this discovery is provided by a Bitdefender report. Summary. If you are a Yahoo user and mistakenly click on a malicious link, you could be taken to a page with malicious… Continue reading Yahoo Accounts Vulnerable to Hacking – Why and How to Protect Yourself

Important Apple Java Update for OS X 2012-005

ATTN: Apple is distributing a Java update in response to a security alert from Oracle. This update should be applied as soon as possible. Summary [source] Java for OS X 2012-005 delivers improved security, reliability, and compatibility for Java SE 6. Java for OS X 2012-005 supersedes all previous versions of Java for OS X. This… Continue reading Important Apple Java Update for OS X 2012-005