Jay A Howard
Think transactions in cryptocurrencies like Bitcoin are anonymous? Think again.
I love reading articles about technology. This is an interesting read
Drag queen crowned prom king at Indiana high school
His message for other LGBTQ: “Really be yourself, and confidence is key. You can’t let people tear you down.” My message: “I Couldn’t Have Said It Better Myself. Good Job Dude!” Click here to read the entire article
White Hot: The Rise and Fall of Abercrombie and Fitch
Premiering Exclusively on Netflix Tuesday April 19th Will I continue to wear their clothes like I have for the past 20 + years? That would be a BIG YES from me! I educated myself over the last 12 + years from reading articles from the internet so, I was aware […]
Do you use the STARTTLS command on your E-mail Server? If that would be a Yes you better read this
Read the entire article here
Does a VPN Protect You from Hackers? The answer is not a simple Yes or No
Read the entire article here
Software I Highly Recommend for Secure Content Collaboration
If, you are looking to collaborate in a secure environment then checkout what Citrix has to offer. Click here to checkout what Citrix has to offer
How to Effectively Prevent Email Spoofing in 2021
Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Click here to read the article
$4,000 COVID-19 Relief Checks
This is FRAUD Delete this e-mail if you receive it! Click here to read the article
New NAT/Firewall Bypass Attack Lets Hackers Access Any TCP/UDP Service
Click HERE to read the article
Microsoft Exchange Exploits Pave a Ransomware Path
If, you are running an On-Premise Exchange Server UPDATE IMMEDIATELY!
Fixing the Weakest Link *PASSWORD*
I have my Password Manager set to a minimum of 20 characters for ALL of my passwords. I do not use Windows Server but I take this article and apply it to my own Security Policies. Click here to read
Russian hackers selling program in darknet that bypasses spam protection
The Russian-language Darknet site sells a program that allows you to distribute spam messages bypassing traffic and email protection tools. The program uses a function in the IMAP protocol. A new tool for spammers is actively being sold on the Darknet, which allows you to bypass the standard protection of […]
NSA Issues Guidelines for Eliminating Obsolete TLS Protocols
The National Security Agency is a US-based agency on which America highly relies on to collect and process foreign signals, understand them and share them with US Officials, and to take any action against dubious acts. These signals are not comprehensible by common men instead a team of mathematicians, technical […]
SolarWinds attack explained
And why it was so hard to detect The recent breach of major cybersecurity company FireEye by nation-state hackers was part of a much larger attack that was carried out through malicious updates to a popular network monitoring product and impacted major government organizations and companies. The incident highlights the severe impact […]
Several High-Profile Accounts Hacked
Social media platform Twitter, earlier today on Wednesday, was on fire after it suffered one of the biggest cyberattacks in its history. A number of high-profile Twitter accounts, including those of US presidential candidate Joe Biden, Amazon CEO Jeff Bezos, Bill Gates, Elon Musk, Uber, and Apple, were breached simultaneously in […]
QSnatch Data-Stealing Malware
Cybersecurity agencies in the US and UK yesterday issued a jointadvisory about a massive ongoing malware threat infecting Taiwanese company QNAP’s network-attached storage (NAS) appliances. Called QSnatch (or Derek), the data-stealing malware is said to have compromised 62,000 devices since reports emerged last October, with a high degree of infection in Western […]
Industrial VPN Flaws
Cybersecurity researchers have discovered critical vulnerabilities in industrial VPN implementations primarily used to provide remote access to operational technology (OT) networks that could allow hackers to overwrite data, execute malicious code, and compromise industrial control systems (ICS). A new report published by industrial cybersecurity company Claroty demonstrates multiple severe vulnerabilities in enterprise-grade […]
Supreme Court rules LGBTQ Workers are Protected
The Supreme Court ruled that existing federal law forbids job discrimination on the basis of sexual orientation or transgender status, a major victory for advocates of gay rights and for the nascent transgender rights movement — and a surprising one from an increasingly conservative court. By a vote of 6-3, the […]
How to safely access the Deep and Dark Webs
Accessing the deep web is easier than you might think. In fact, you probably already have. The media hasn’t done a great job of differentiating what’s considered the deep web and what is the dark web — two similar names for two very different things. What is the deep web? […]
Billions of devices affected by UPnP vulnerability
Stop us if you’ve heard this before but a researcher has uncovered a new security vulnerability affecting many devices running the Universal Plug and Play (UPnP) protocol. Named CallStranger by discoverer Yunus Çadırcı, the potential for trouble with this flaw looks significant for a whole menu of reasons, starting with the gotcha […]
Users Might be Under Risk of DNS Vulnerability
What is DNS? It is an essential element in the network (online infrastructure) that allows users to watch or access content on the internet by building a link between an IP address and the respective website with the help of a database. Hackers can use it as an opportunity to […]
An increase in the Number of Cyber Attacks after the end of self-isolation
As 62% of respondents answered, when companies transferred employees to remote work at the beginning of the pandemic, the most concern was ensuring secure remote access and VPN. 47% of respondents reported that they were concerned about preventing attacks using social engineering methods, and 52% called the protection of endpoints […]
Gamaredon grows by targeting Microsoft Outlook and Office
ESET, an antivirus company has discovered that Gameradon has been growing fast by developing new tools that target Microsoft Office and Outlook. Gameradon is an advanced persistent threat (APT) group, active since 2013 that mostly targets Ukrainian institutions. New tools have been attributed to the API, developing a module for […]
New Mobile Internet Protocol Vulnerabilities
High impact vulnerabilities in modern communication protocol used by mobile network operators (MNOs) can be exploited to intercept user data and carry out impersonation, fraud, and denial of service (DoS) attacks, cautions a newly published research. The findings are part of a new Vulnerabilities in LTE and 5G Networks 2020 report published […]
Supreme Court rules federal civil rights
The U.S. Supreme Court ruled Monday that it is illegal for an employer to fire someone because of their sexual orientation or gender identity, delivering a major victory in the fight for civil rights for LGBTQ people. The court’s 6-3 ruling extends the scope of Title VII of the Civil […]
Hackers Use SSL Certificates to Launch Malware Attack
The latest report published by Meno Security indicates that 52% of the top one million websites have “HTTPS” in their URL, not traditional “HTTP.” Despite this, the data says that these organizations that don’t conduct satisfactory SSL reviews are more vulnerable to breaches and cyberattacks. According to recent research, hackers, […]
Reveal the identities of alleged pirates, court tells ISP
If, you download audio or video that you do not own the copyright to you are a PIRATE and that is STEALING! PLAIN and SIMPLE! Pay for every piece of audio or video that you do not own the copyright to or you will eventually find yourself in this situation. […]
Fileless Malware Attacks and How To Fight Them
It has been crystal clear over these years with the increase in a number of cyber-attacks of an equally unique kind making it almost impossible for the out-dated or conventional security mechanisms to intercept and fight. As if a single one-of-a-kind cyber-attack tool wasn’t enough, the threat actors now are […]
Hackers use the Fake Image Hosting Website
What is said to be one of the most creative hacking technique to date, a group of hackers made a fake image hosting website to use it as a disguise for their web skimming operations. The aim is to deploy harmful codes that will steal payment card credentials from users […]
Microsoft joins encrypted DNS club
Microsoft is the latest browser vendor to join the encrypted DNS club by supporting DNS over HTTPS in Windows 10. In Build 19628 and higher, you’ll be able to encrypt your DNS traffic to prevent your geeky flatmate, that hoodie-wearing person in your local coffee shop, and possibly your ISP […]
Best Practice Tips for Password Administration
The end of passwords: Industry experts explore the possibilities and challenges Passwords have been an industry-standard as well as industry headache for a considerable length of time and their administration henceforth has become the misery of end-users and IT administrators, yet there are alternatives to take advantage of the experience […]
Annke Security Camera System
For a starter Home Security Camera System I would recommend the Annke BH500 I purchased this system in February 2020 and very happy with my purchase. These are 5MP cameras and have a very clear picture. I have 4 Bullet Cameras and 1 Dome Camera I purchased through Amazon with […]
What is the difference between public and private IP Addresses?
A public IP address is an IP address that can be accessed over the Internet. Like postal address used to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned to a computing device. Your public IP address can be found at What is my […]
Backup Your Data NO EXCUSES!
Here are some simple tips that will help you to keep both your work and your home data safe 1. Don’t treat backing up simply as “something you do in case of ransomware” In the early days of personal computers, the main reason people made backups, even if it was […]
Password Managers
Security flaws found in popular password managers Care should be taken when choosing a Password Manger. You should always use a Password Generator. Not all they’re cracked up to be? Several password vaults contain vulnerabilities, both new and previously disclosed but never patched, a study says Several popular password managers […]
Are your Medical Records Safe? A Must Read!
You probably think your Medical Records are safe. Think Again! Read this article
How to create an isolated network
Option 1: If you have two public IP’s from your service provider you can simply install aswitch between the router and the modem andthen configure each separately as if it were two different businesses in different buildings. Router 1 and 2 can be wired or wireless. Option 2: If you only have one […]
How to protect yourself against Ransomware
Pick strong passwords. And don’t re-use passwords, ever. Make regular backups. They could be your last line of defense against a six-figure ransom demand. Be sure to keep them offsite where attackers can’t find them. Patch early, patch often. Ransomware like WannaCry and NotPetya relied on unpatched vulnerabilities to spread around the globe. Lock […]
Stop Using IE
In a recent cybersecurity issue, some hackers from North Korea are attacking Internet Explorer by exploiting a vulnerability, which is said to be a zero-day flaw. The company Microsoft has not yet spoken on the issue and is still silent. Users should immediately stop using Internet Explorer for a while […]
USB Flash Drive Alert
The cybercriminals have gotten all the savvier when it comes to finding out new ways of administering malware into the victims’ devices. The next in the list happens to be “Malicious USB sticks”. These are employed whenever an attacker needs a “physical” entrance to a computer or any device for […]
Creating SSH Keys on Windows
PuTTYgen is an key generator tool for creating SSH keys for PuTTY. It is analogous to the ssh-keygen tool used in some other SSH implementations. The basic function is to create public and private key pairs. PuTTY stores keys in its own format in .ppk files. However, the tool can also convert keys to and from other […]
FAKE Factory Network
Factory Workers need to read this! Researchers simulated a real-looking “Industrial prototyping” organization with fake employees, PLCs, and websites to study the types of cyber-attacks that commonly on such networks. The elaborately fake organization’s website and the network worked on a highly advanced interactive “honeypot” network that worked extensively on […]
Awesome Hosting Provider
Are you are looking for the BEST Hosting Provider in the Industry? Then your First and Last Stop will be at KnownHost! They have Awesome Incredible Knowledgeable Customer Friendly Support and Sales Staff! All of my tickets have been answered in 3 mins or under! An established business since 2006 […]
2-Step Verification Cracked
WhiteHat Hackers are still one step behind the BlackHat Hackers. The 2-Step Verification Process has been cracked. Read this article: https://www.ehackingnews.com/2019/12/hackers-bypass-2-step-verification-to.html
Server Security
This is why it is Very Important to have Top Notch Security Policies in place on Your Server! The new Snake Ransomware family sets out to target the organizations’’ corporate networks in all their entirety, written in Golang and containing a significant level of obfuscation, the observations and disclosure for […]