Category Archives: internet security;

An interview with Fabian Wosar, EMSISOFT’s ransomare killer

Fabian Wosar, CTO of EMSISOFT is known as the most prolific ransomware killer in the world.   We reached out to Fabian and asked him ten questions. Look for our Live Interview and video late next week… Steve: You’re the cybercriminal…Create … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, Information Technology, Internet of Things, internet security;, IoT, Linux, Mac, malware, Microsoft, ransomware, Technology, viruses, Windows Security | Tagged , , , , , , | Leave a comment

2019 Middle Tennessee Cyber Conference Agenda

The TN Department of Safety and Homeland Security along with TCAT Shelbyville and the Cyber Conference committee are working on the 2019 Middle TN Cyber Conference agenda.  Look for speakers such as Jayson E. Street (http://jaysonestreet.com/), Brent White of We … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, higher ed, higher education, Information Technology, internet security;, Technology | Tagged , , , , , , , , , , , | Leave a comment

Why hiding your SSID is not secure.

Have you heard that hiding your SSID is a good idea?  Think again. With BackBox or Kali (in fact in form of Linux), you can run sudo airodump-ng phy1.mon at a terminal (replace phy1.mon with your network card number) – onboard … Continue reading

Rate this:

Posted in Computer Security, higher ed, Home Networking, Information Technology, internet security;, network, Networking, Technology, Wireless | Tagged , | Leave a comment

Save the date for the 2018 Middle TN Cyber Security Conference.

Save the date for the Middle TN Cyber Security Conference. Website and registration details will be posted soon.      

Rate this:

Posted in Computer Security, higher ed, higher education, internet security;, Technology, Windows Security | Tagged , , , | Leave a comment

SSL not showing green lock? Here’s some things to try.

Recently we did a certificate request with an IIS server and loaded the received certificates under Enterprise Trust and imported the certificate into IIS. When we visited the website, we noticed that the newly loaded server did not present a … Continue reading

Rate this:

Posted in Computer Security, Education, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, network, Networking, Technology, troubleshooting, Windows, Windows Security, Windows Server | Tagged , , , , , , | Leave a comment

Bookmark4Techs link updated

Need access to one of the largest listings of technical bookmarks? Go over and visit – https://whatsonmypc.blog/bookmarks4techs/

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Hardware, Home Networking, Industry, Information Technology, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Technology, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Security | Leave a comment

Cyber Summit – Memphis, TN June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

2017 Cyber Security Conference – Memphis, TN – June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Computer Security, Education, Hacking, higher ed, higher education, Information Technology, internet security;, Technology, Windows Security | Tagged , , , , | Leave a comment

9 Popular Password Manager Apps Found Leaking Your Secrets

Source: 9 Popular Password Manager Apps Found Leaking Your Secrets

Rate this:

Posted in Computer Security, Free Software, help desk, higher ed, higher education, Information Technology, internet security;, Software, Windows Security | Tagged , , , , | 1 Comment

OWASP Zed Attack Proxy (ZAP)- Using on your home network

OWASP -The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. (Wikipedia) If you have wanted to learn how to test your network and … Continue reading

Rate this:

Posted in Computer Security, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, internet security;, IoT, Microsoft Windows, Microsoft Windows 10, Networking, Technology, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Security, Windows Server, Wireless | Tagged , , , , , , , | Leave a comment

Are your IoT devices visible from the internet?

BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet.  Here’s the link to see if you have something that … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Hardware, higher ed, higher education, Information Technology, Internet, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft Windows, Mobile Computing, network, Networking, Technology | Tagged , , , , , | Leave a comment

An interview with Shannon Morse, Internet Media Host & Producer

Image Source Over the next several months we plan on interviewing technical experts and leaders across the globe to find out how they got started in the technology industry, what their favorite operating systems are, information security trends and more. This … Continue reading

Rate this:

Posted in Computer hardware, Computer Security, Computers, Hacking, Information Technology, internet security;, Linux, Microsoft, Technology | Tagged , , , | Leave a comment

Watch hackers break into the US power grid

Read more: http://www.techinsider.io/

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , | Leave a comment

Best Malware/Spyware Removal Tools

Have a Windows computer with malware or spyware?  Here’s three of the best malware and spyware removal tools that are free. Adwcleaner is light weight and removes browser redirects, malware and spyware. Webpage – https://toolslib.net/downloads/finish/1/ Approximate size- 1.7 mb TSA … Continue reading

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged , , , , , , , | Leave a comment

Enhanced Mitigation Experience Toolkit 5.2

“The Enhanced Mitigation Experience Toolkit (EMET) helps raise the bar against attackers gaining access to computer systems. EMET anticipates the most common actions and techniques adversaries might use in compromising a computer, and helps protect by diverting, terminating, blocking, and … Continue reading

Rate this:

Posted in Computer Security, internet security;, Technology, Windows Security | Tagged | Leave a comment

Your Location has been Shared 5,398 Times in Last 14 Days

Your Location has been Shared 5,398 Times in Last 14 Days.

Rate this:

Posted in Apple, Business, Information Technology, internet security;, Law, Linux, Mac, Microsoft | Tagged | Leave a comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments