Monday, November 24, 2014

How to encrypt Carbonite data

Leo Laporte answers--

How do I encrypt my Carbonite data? | The Tech Guy: "Bob uses BitLocker to secure his data. And when he uses Carbonite, he sees that his data is unencrypted when restoring it. Leo says that as long as you're logged in, bitlocker has unencrypted the data. And when you log out, it encrypts it again. But the good news is that when you back up Carbonite, the backup is encrypted. And Carbonite allows you to make the data completely encrypted. It's in the settings. BTW using BitLocker requires certificates. So make sure they're backed up. If they get corrupted, you'll lose the ability to access your encrypted data even if you know the password. There's also a good program called SpiderOak. It works like DropBox but uses end to end encryption."

more news below (web link on mobile below)

Monday, November 17, 2014

Threat Intelligence Not So Intelligent, Global Financial System Vulnerable

Threat Intelligence firm mistakes research for nation-state attack | CSO Online: "If anything, this incident proves two things; Redpoint scans will be detected by a honeypot, and when it comes to threat intelligence - sometimes it's not all that smart." (read more at link above)

JPMorgan Chase Says More Than 76 Million Accounts Compromised in Cyberattack -"Hackers were able to burrow deep into JPMorgan’s computer systems, accessing the accounts of more than 90 servers — a breach that underscores just how vulnerable the global financial system is to cybercrime. Until now, most of the largest hack attacks on corporations have been confined to retailers like Target and Home Depot."

more news below (web link on mobile below)

Monday, November 10, 2014

Voice Hackers Will Be Talking Their Way Into Your Technology

Will Siri be indicted as a co-conspirator?

Voice Hackers Will Soon Be Talking Their Way Into Your Technology:  "... this scary reality is not as far away as it might seem, as security researchers have already managed to trick Siri into letting them bypass the lock screen on an iPhone and post Facebook messages, access call history, send text messages and fire off emails. “Microphones should be disabled immediately and our current recommendation is that the user switch off features [involving voice commands],” he said in a phone interview with Forbes. “At the moment, leaving biometric technology as it is today is like leaving a computer without a password and just allowing anyone to walk by, click and take an action. “We realized there is something very basic here that everyone seems to have forgotten: authentication. If you have a smart TV at home, for instance, it will respond to a synthesized voice as well as yours.”..."

more news below (web link on mobile below)

Monday, November 3, 2014

Eugene Kaspersky: How to Deal With the Threat of Cyber-Attacks (video)

How to Deal With the Threat of Cyber-Attacks: Video - Bloomberg:
(Allow video to load after clicking play or go to link above)

Kaspersky Lab Founder and CEO Eugene Kaspersky discusses the threat from cyber-attacks on “Bottom Line.” (Source: Bloomberg 9/15)

more news below (web link on mobile below)

Cybersecurity - Google News

Malware - Google News

National Security - Google News

"Security Threats" - Google News

Maritime security - Google News

The State of Security

TSA - Google News

Homeland Security - Google News