No one else I know, until Facebook announced they would buy them. I don't have the WhatsApp app or an account either, so I immediately classified the phishing message below as spam. However, it is a great example of how criminals will use current events in attempts to get their phishing messages looking legitimate. The … Continue reading Who’s heard of WhatsApp? Phishers, that’s who!
A colleague experienced a rather unsettling event today. Their e-mail account was compromised and used to send out scam messages asking for funds to be transferred abroad to most of the e-mail addresses they had ever used to send and receive e-mail. When your e-mail account has been taken over, you're in for a world of … Continue reading Steps to take when your e-mail account has been hacked
Many people have their opinion about passwords and the role they should or should not play in information security. I have an opinion too, but I also realize that today, passwords are simply necessary and we should keep trying to educate end-users about the importance of strong passwords and not re-using them (which is very … Continue reading Google Password Strength Indicator: Weak?
Just another example of this today: I finally got a signup link for the beta of Office 365. I signed up and connected an e-mail account I have at a hosting provider. The hosting provider uses SmarterMail 7 Enterprise Edition. Apparently, all I had to do was input my e-mail address and my e-mail password. … Continue reading Nothing on the Internet is ever, ever deleted
For your day-to-day activities, that is. The blog post below points this out one more time: NEWS: “Removing end user admin rights eliminates 92% of vulnerabilities" This advice holds independent of operating system, version, etc. I do believe though that Vista's User Account Control (UAC) provides significant security and usability benefits by allowing people to … Continue reading Logging On as Administrator is a Bad Idea…