IFTTT

Set of online resources from AV-Comparatives.org

Here is a set of resources put together by AV-Comparatives.org : General guidelines in minimizing risks Online vulnerability starts with human vulnerability E-mail security Web navigation Safe online banking Safe online gaming Safe streaming Safe file… The post Set of online resources from AV-Comparatives.org appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”


DOS challenges with ITsecurity.co.uk

We were faced on ITSecurity.co.uk with a problem which was at first out of our control: “somebody” is creating, probably without knowing, a denial of service on this website. The consequence was that it was “consuming” the accesses to the database behind this WordPress site. The ISP hosting the website limits the accesses to 50K a day. More accesses require a high plan, three times more expensive. The “somebody” is an IP from Canada which, considering the fact that it is retrying every second, it is most probably a script out of control. First thing, I contacted the owner of the IP address at…


Ransomware: Prevention is the best solution

Ransomware is malicious software that denies you access to your computer or files until you pay a ransom. There are several types of ransomware that are commonly seen: files/folders encryptors screen ‘lockers‘ MBR ransomware (MBR: master… The post Ransomware: Prevention is the best solution appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”


How to recognize a money laundry scam

This is the state of mind you should always have when you read an email. When something is too good to be true, it usually isn’t true. Here is an email I got, which sounds…… The post How to recognize a money laundry scam appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”


How to recognize a targeted malware/phishing attack

I received an email pretending to be from my hoster Strato (known as Cronon AG) telling me that my domain I have for my IT Consulting business has been suspended because of complains they received…. The post How to recognize a targeted malware/phishing attack appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”


Encryption is not solving all cybersecurity problems

I visited last week the IAA in Frankfurt, Germany. IAA stands for International Automobile Exhibition and takes place every year in Frankfurt, Germany. This is the place where every year the latest cars are being presented but also the newest technologies around cars. This year it was a lot about mobility, interaction, autonomous parking and driving, interconnectivity between cars and IoT. I went there to address more the car parts suppliers (Tier 1 and 2) than the car manufacturers. For us it was more interesting to get involved in the devices that are easily and directly attackable. Things like entertainment systems,…


No Picture

Cyber security tips (in German and English)

If you understand German, there are tons of information about CyberSecurity and how to improve your security. BSI (Bundesamt für Sicherheit in der Informationstechnik) has a lot of resources published here:Alliance for Cybersecurity : http://ift.tt/UQNm4c The materials are available here: http://ift.tt/1ILTynT They… < p class=”more-link-p”>Read more → The post Cyber security tips (in German and English) appeared first on Improve Your Security. Want to get the book ? Get it from here: Improve your Security”



No Picture

IT Security essentials for small and medium enterprises

Since I first published the free eBook "Improve your security" dedicated to end users, I've been asked many times to give advises for small and medium enterprises. At first, I thought that this is a very different topic than what I wrote before. However, after some thinking, I realized, that difference between the behavior of end-users at home and in the office of a small to medium companies, doesn't differ that much. After all, it is no secret that the cyber criminals are where the money are. If the targets are easy to breach, it is even better since this improves the…


No Picture

Cybercriminals go where the money is – SMEs

I wrote some time ago an article called “IT Security essentials for companies and small businesses”. I tried to pitch it to some companies that have to do with security and… nobody wanted it. Good for me. My good friends… Read more here: The post Cybercriminals go where the money is – SMEs appeared first on Improve Your Security.


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close