Do you use a Cisco/Linksys router?

Are you running a Cisco/Linksys router at home?  If so, you might want to check out this article:
After reading it, I can no longer recommend Cisco/Linksys gear for home use.  There are plenty of alternatives out there that work just as good as Cisco/Linksys and in a lot of cases, cheaper too.

Have you updated lately?

Every where you look, there seems to be mention of a new piece of malware.  Lately we've seen Stuxnet, Duqu, and now we have Flame.  A lot of times, malware uses some kind of vulnerability in order to infect your computer.  One of the first lines of defense is having an antivirus product installed.  Another line is to keep your systems updated with the latest patches from your vendor.  No matter what operating system you use, YOU ARE VULNERABLE.  It just depends on how much.  Despite what Apple and others claim, you need antivirus on Macs as well.  So update your systems and update often!

Please Remember Those Who Came Before

We at NSS are Veterans.  We are, I guess, some of the lucky few.  While you are out enjoying the holiday, please take a moment to remember those who came before and fought for the freedoms we have today.  You may not agree or support our President and Government but please support our troops and their families.  They and their families need our support more now than ever before.

Time to change your passwords!

When was the last time you changed your passwords? Last week? Last month? Never? If it’s not been within the last three months or worse, never, it’s time to change your ways! What got me thinking about this is recently having to change all my passwords where I work. We have a strict policy they be changed every 90 days. This is a good rule of thumb even outside of work. Attackers target passwords because they are used everywhere. What’s worse is the majority of all people use the same password for everything from their Facebook login to their banking website login.

Secure Shell (SSH) Security

I see a lot of SSH brute force attacks on a daily basis. Most of these are scripts being blindly run against servers, but there is the occasional one where a hacker is directly targeting a system. The biggest problem with defending against these attacks is SSH’s biggest benefit…the use of encryption. By using encryption, an IDS/IPS device cannot see into the packet and show us what the attack is trying to do. However, defending against SSH attacks is quite easy to do even if we can’t see into the packet. Simply block it at the firewall.

Subscribe to RSS - blogs