Featured Post

How To Protect USB Media

1. Introduction
USB media, and in particular pen drives, are responsible for much of the virus and malware infections on workstations and even servers used by unsuspecting users. A simple “stick” of a USB flash drive can bypass all security measures implemented in the network environment. With that in mind, I decided to look for a way to passively immunize a USB media, so that the protection is on the media and not on the machine. There is no mitigation, but it is possible to greatly reduce the risk of infection with the technique I will present.

2. How Infection Occurs
When a USB media is inserted into a Windows machine, the auto-play feature starts. If at the root of the media there is an autorun.inf file, it is read by the system and its instructions are processed automatically. The most efficient technique for infecting USB media is then to copy the malware itself (usually a PE binary) to the media and also create an autorun.inf at the root of the media that runs the malware ever…

5 Steps To Protect Your Online Privacy

The Internet now touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide sensitive personal information such as your name, account numbers, addresses, email addresses, passwords, and location information. Sharing this personal information online presents a huge opportunity for cybercriminals to steal your information to commit crimes such as credit card fraud, identity theft, and harassment.

Use strong passwords. Create a password with eight characters or more along with a combination of upper and lowercase letters, numbers, and symbols. Change passwords regularly. Do not include your name, names of your kids or pets, or other personal information about yourself in your password. Often, this information is easy to find on social media, so it’s easy for hackers to determine your passwords with these words.Use stronger authentication. Always op…

Is It Safe To Provide A Phone Number When Registering On Sites

Service owners think that if a user has a smartphone in his pocket and has a SIM card in it, then the attacker will not be able to gain access, and the phone number is absolutely safe.
This is precisely their stupidity, the number is absolutely not safe and it is not advisable to use it as identity confirmation.

Firstly, the availability of a number, this does not mean that it will work forever since the operator has his own policy of providing services.

For example, it may happen that you have not used the number for a long time (let's say a business trip for a month, a year, it doesn’t matter, the idea of ​​taking a SIM card of a local operator where you will be at the time of arrival immediately spins).

And so, the business trip passed, everything is fine, but after arriving home you find that the SIM card does not work, you did not know, but during this time you managed to terminate the contract with the expiration of the deadline, and you will find out only now.

There is no …

Is The Intercom An Ear Of A Spy?

Back in the days of analog telephone, there were rumors about listening to the line, even about the ability to listen to the situation without picking up the phone and talking on it. With the advent of push-button telephones, the problem seemed to go away, moreover, in connection with the principles of switching signals on twisted pair, this was problematic.

The article describes the version - what if, today, this opportunity migrated to intercom networks, moreover, it is used for tacit interference in private life?

In the digital age, nothing should seem transcendental. Perhaps in your home, you should also carefully choose words and topics for everyday conversations, no matter how harmless they would be, if not today, then in the near future.

Today, almost every apartment has a door phone, in particular, a subscriber unit (apartment intercom), made in the form of a telephone receiver, commonly referred to as the common people - an audio handset.

First, a little theory about the typ…

Why Tracking Cookies Are Dangerous, Even If You Really Have Nothing To Hide

There are opinions about the doubtfulness of the harm of such cookies if there really is nothing to hide. This position definitely does not hold water.
In our opinion, the main risk of such tracking cookies for users who really have nothing to hide lies in the possibility of individual manipulation of their consciousness.
This can be beneficial both for entire states and individual economic entities.

Democracy and Statehood The most serious risks, I believe, can be directly or indirectly affecting political views in society and, as a result, influencing democratic processes in the state. This is evidenced by regular reports related to possible state interference in the electoral process of other countries through the placement of political advertising on the Internet.

In addition, by mixing in the “correct” (competently targeted by interests) advertising about events in the world, state, and society, one can systematically bring a person to the desired state. Looked today for a ticket…

You Cannot Forbid To Bring: How To Implement The BYOD Concept And Not Harm Information Security

The ability to perform work tasks using their own gadgets is perceived by many as an element of freedom, a progressive approach to company-employee relationships, and generally a typical example of a win-win strategy. In general, there is no reason to doubt: the employee is happy to use equipment that he has chosen to solve problems, and the company receives an employee who is always in touch and does the work even after hours. According to Frost & Sullivan, BYOD adds up to 58 minutes a day to employees and increases productivity by 34%.

Despite all the advantages, BYOD gives rise to problems - problems of incompatibility and timely installation of security updates, theft and damage to personal devices. And this is only a small part of the headache that you have to endure in the name of convenience. We will talk about how to solve these problems while maintaining a balance between safety and efficiency, in this post.

It stands for Bring Your Own Device, or "bring your dev…

About the EDR solution that is emerging these days.

I need to write a security story after a while. I've been busy for a while (although I'm still busy), so I've been writing to my blog and I'm just dropping visitors, so I'm going to talk about the security system that's been hot lately. Like year's security conference in the United States, RSA 2018, which has been popular in the IT press, especially in the field of security since last year, says that endpoint detection and response (EDR) solutions are in the spotlight. EDR literally means endpoint threat detection and response, so let's take a look at why it's in the spotlight. Of course, it is a theorem in the knowledge I know. As a result, there may be some wrong information.

What is an EDR solution?
E in the EDR solution stands for Endpoint, which means it looks like it's in English, but the endpoint just means the terminal we use (the client in a server-client relationship): PC, smartphone, tablet, etc. do. IoT products also enter endpoints …