Want Your Phone Hacked? Visit These 10 Airports When Sharon and I give security presentations, the topic of insecure Wi-Fi networks typically makes it in a few slides. Tech Republic posted information about a report from Coronet that identified the ten worst airports for Wi-Fi security. To quote the post, “Hackers can use the poor cyber hygiene and insecure Wi-Fi at many airports to inject advanced network vulnerabilities like captive portals, Evil Twins, ARP poisoning, VPN gaps, honeypots, and compromised routers.” Any of these vulnerabilities could allow an attacker to get the account credentials for cloud services such as Dropbox, Office 365, G Suite, etc. View Full Post
How to Mitigate 2FA Attack on Office 365 Users should enable and use two factor authentication (2FA) whenever it is available. Sure there are issues with using SMS as a second factor, but 2FA is by far better than just using a user ID and password. The attack vectors are constantly changing and the attacks on Office 365 are no exception. View Full Post
Google Chrome Eats More RAM I’m a big fan of Google’s Chrome browser. What I’m not a fan of is its voracious appetite for eating up system memory. Just check your system resources each time you open a new tab. Part of the reason for consuming memory is for security reasons as many of the browser functions are isolated in separate memory “sandboxes.” In order to obtain stability, Chrome splits every tab, plugin, and extension into its own process, so that if one thing crashes it won’t take down the whole web page. View Full Post
Screenshot Options on a Mac Sometimes you just want to capture what’s on your screen to preserve, review, edit or send along as an e-mail attachment. Taking screenshots on Windows or your smartphone are pretty simple, but what about a Mac? It turns out there are several options for taking screenshots on a Mac that are listed in a Wired post. View Full Post