Browsing articles in "Information Security"

ATM Skimmers: How to Protect Your ATM Card

Aug 4, 2014   //   by Crocmaster   //   Information Security  //  No Comments

automated-transaction-machine-or-atm

An “ATM skimmer” is a malicious device criminals attach to an ATM. When you use an ATM that’s been compromised in such a way, the skimmer will create a copy of your card and capture your PIN.

If you use ATMs, you should be aware of these attacks. It’s often possible to spot ATM skimmers, or at least to protect your PIN so ATM skimmers won’t be able to capture it.  Read more >>

How to Bypass and Reset the Password on Every Operating System

Jul 29, 2014   //   by Crocmaster   //   Information Security  //  No Comments

reset-or-bypass-operating-system-or-device-password

Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files.

On other devices where you can’t gain access to the files, you can still reset the device and gain access to it without knowing a password. These tricks all require physical access to the device.  Read more >>

How to Change Your MAC Address on Windows, Linux, and Mac

Jul 28, 2014   //   by Crocmaster   //   Information Security  //  No Comments

ethernet-network-interface

Each network interface on your computer or any other networked device has a unique MAC address. These MAC addresses are assigned in the factory, but you can change, or “spoof,” MAC addresses in software.

MAC stands for “media access control.” MAC addresses are also commonly referred to as physical addresses or hardware addresses, because they correspond to a hardware adapter.  Read more >>

How an Attacker Could Crack Your Wireless Network Security

Jul 27, 2014   //   by Crocmaster   //   Information Security  //  No Comments

crack-wifi-network

It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks.

This isn’t a “how to crack a wireless network” guide. We’re not here to walk you through the process of compromising a network — we want you to understand how someone might compromise your network.  Read more >>

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Apr 9, 2014   //   by Crocmaster   //   Information Security  //  No Comments

Exploits allow attackers to obtain private keys used to decrypt sensitive data.

For a more detailed analysis of this catastrophic bug, see this update, which went live about a few minutes after HackShark published this initial post.

Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.  Read more >>

Pages:123456789»

Archives





Protected by Copyscape Online Copyright Protection

Latest Visitor Record

DO NOT try to do anything wrong with our website so that we may have to report to the Feds!