rkeene

/Richard Keene

About Richard Keene

This author has not yet filled in any details.
So far Richard Keene has created 304 blog entries.

Second Google+ Security Vulnerability in Three Months Hastens Shutdown

Google+ has encountered its second security vulnerability since October.  The most recent issue may have leaked up 52.5 million account credentials, including information that was set to private within the platform. The social media platform has been underutilized for years and in the light of ongoing security concerns, Google has announced that it will shut [...]

By |2019-02-20T05:58:09+00:00December 11th, 2018|Data Breach, Google|0 Comments

Facebook Uses Your Private Mobile Number for Ad Targeting

Facebook has got itself into hot water again, this time in response to concerns over handing user phone numbers over to advertisers. On Thursday, Facebook confirmed that phone numbers used to verify two-factor authentication become targetable by advertisers within weeks of use. As a free platform, Facebook earns most of its money through advertising. Any [...]

By |2019-02-04T02:35:43+00:00September 29th, 2018|System Security|0 Comments

Old Misfortune Cookie Vulnerability Reappears on Medical Devices

Four years ago, the Misfortune Cookie vulnerability posed a threat to residential SOHO routers and was present in over 200 models from different manufacturers.  The vulnerability allowed hackers to remotely access the routers and hijack the devices.  The old vulnerability has reared its head again but this time the vulnerability is present in medical device [...]

By |2019-02-04T02:35:43+00:00August 31st, 2018|System Security|0 Comments

(Bluehost) Email Scam Aimed at Website Owners

One of the latest email scams to come our way is quite convincing and aimed squarely at website owners and managers.  This particular email landed in my inbox earlier this week and is worded in such a way that it could be a legitimate correspondence. The email in question warns that outbound email services have [...]

By |2019-02-04T02:35:43+00:00August 15th, 2018|Phishing Scams|0 Comments

VPNFilter Infects Over 500,000 Routers Worldwide

Last week the Justice Department issued a statement that owners of SOHO and NAS routers may be infected and should reboot their devices as soon as possible.  The warning was issued in an effort to disrupt a massive malware botnet and increase the chances of identifying and remediating the world wide infection. The infectious malware [...]

By |2018-05-31T19:45:48+00:00May 31st, 2018|Botnet|0 Comments

SynAck Doppelgänging Slips Past Antivirus Programs

First reported in 2017, the SynAck malware was nothing particularly special.  Like most ransomware based malware, SynAck employed file encryption and blackmail to extort victims of money through Bitcoin.  All of that has changed, however, as a new SynAck variant has been reported that uses a technique known as Doppelgänging to bypass security programs. [...]

By |2019-02-04T02:35:43+00:00May 8th, 2018|malware, Ransomware|0 Comments

Cryptocurrency-Mining Malware is the New Ransomware

Throughout 2017 it seemed like barely a week went by that a new ransomware scare didn’t hit the news.  Because of the overall public awareness, ransomware has slowly started to fall out of popularity with scammers and new types of malware have started to appear.   The newest trend embraces cryptocurrency mining and is proving to [...]

By |2018-03-06T16:32:44+00:00March 6th, 2018|malware|0 Comments

Google Chrome Browser Hit by Support Scam

Google Chrome is the current target of a malvertising campaign that aims to trick users into calling a fake tech support line.  Tech support scams have become a popular tactic for malware distributers because they prey on a user’s ignorance and fear instead of relying on the overt extortion tactics used by ransomware. The Google [...]

By |2019-02-04T02:35:43+00:00February 8th, 2018|Browser, Phishing Scams|0 Comments

Security in a Driverless Future

The security and safety risks of driverless cars have quickly become a hot topic issue for both regulators and consumer advocates.  Many oppose the very notion of driverless cars due to the potential for catastrophic failure, while others advocate that they are safer than human drivers.  In either case, self-driving cars are on the way [...]

By |2019-02-04T02:35:44+00:00January 22nd, 2018|Technology|0 Comments

Dell EMC Protection Suite Vulnerabilities Discovered

Researchers have discovered three vulnerabilities in the Dell EMC Data Protection family of products.  These vulnerabilities could be used by attackers to bypass security and gain complete control of a system. Dell EMC's Avamar Server, NetWorker Virtual Edition, and the Integrated Data Protection Appliance all contain a standard component – the Avamar Installation Manager which [...]

By |2019-02-04T02:35:44+00:00January 5th, 2018|Business Management|0 Comments