Archive for the ‘Security Breach’ Category

 

GoToMyPC Forcing Reset of Passwords

GoToMyPC announced that they suffered a recent attack. Once again, this affected users who had used the same password at other sites too. Congratulations to you readers who have implemented two-step logon. The site twofactorauth dot org provides a list of services that provide a two-step login feature. If you know someone who uses GoToMyPC, you can recommend they use this search:

gotomypc two step verification site:citrix.com

If you want your IT Professionals to become even more effective, send them to the 2.5 day SuperTech workshop Monday thru Wednesday August 8 thru 10.

And, if you are an executive who wants more insight into working effectively with your IT Professionals and/or outsourced IT firm, please come too.

The workshop is designed in such a way that you can enjoy exploring Napa Valley and the San Francisco Bay area with your family while you are here.

Please email stacey @ fosterinstitute dot com for all of the details.

Please forward this to everyone whose cyber-security you care about, as well as anyone who would enjoy an exciting and educational end of summer experience in Napa Valley, CA.


iPhone and iPad Hacking Alert

You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now? Continue reading ‘iPhone and iPad Hacking Alert’


Security Breaches are Preventable

After security breaches, in order for the victim companies to feel better, executives are often led to believe that Continue reading ‘Security Breaches are Preventable’


Lenovo Computers Infected

Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: http://support.lenovo.com/us/en/product_security/superfish_uninstall

Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.


Hack the Hacker who Hacked You

Many times, organizations that got hacked want to track down and “hack the attacker back.” For instance, suppose someone emails your customers an email that says something bad about your organization. Most of the time, you’ll want to track those people down and do something about it! Continue reading ‘Hack the Hacker who Hacked You’


A Caller Says Your Computer Is Infected

Someone in your company receives a phone call, “This is Microsoft Technical Support. Your computer is infected with a virus.” They call back 50 more times after you tell them no. Continue reading ‘A Caller Says Your Computer Is Infected’


Did You Cause Your Own Dropbox Breach?

Hackers say they have 7 million Dropbox passwords. And testing of a sampling of them show that is true – but Dropbox adds that… Continue reading ‘Did You Cause Your Own Dropbox Breach?’


Shellshock: Check Your Web Server

Shellshock is a bug that may exist on your servers and even your Mac. Even if you use Windows in your office, your web server may use Apache on Linux. Continue reading ‘Shellshock: Check Your Web Server’


Reduce Your Risk of a Workplace Shooter

It happens too often: An employer terminates an employee, and then the employee comes back to shoot their supervisors. There is a simple way to reduce the likelihood… Continue reading ‘Reduce Your Risk of a Workplace Shooter’


What to Do About Your Passwords

You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies: Continue reading ‘What to Do About Your Passwords’