Bovinova 2011 made it into the Wall Street Journal!

A group of creative and daring Greenville / Upstate, SC individuals spent thousands of dollars and hundreds of hours of time to bring us Bovinova 2011… What was it?  It was BIG!  Here’s a Wall Street Journal video that details it:  (Vegetarians and Vegans may want to skip this. hahah)   Alas, no mention of The Dockside Band playing, but …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Cisco Small Business UC 300 VoIP system looks like a winner

The time has come to replace that old analog phone system in your small business and upgrade to VoIP (Voice over IP) technology! The prices have never been better. One interesting option is the Cisco Small Business Unified Communications 300 series.  A few features include: Lower communication expenses Business-class calling and messaging Full key system and small private branch exchange …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Cisco IOS potentially susceptible to two zero day vulnerabilities

SecurityFocus has two posts indicating that Cisco IOS 15.0 is vulnerable to attackers. Both are DoS (Denial of Service) issues and at this time there is no solution being offered from Cisco to correct the problem. Should your network be non-responsive, you could attempt to reboot your Cisco device to restore connectivity. The original posts are as follows: Cisco IOS …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Aaron’s rent-to-own computers may have come complete with value-added spyware

It seems that not a day goes by that we don’t hear stories of how this person or that company had a data breach and information was leaked outside their walls, but in the news the last couple days is something far more sinister than someone losing data because of a hacker or accidentally installing malicious software. ABC Action News …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Bin Laden death results in malware spreading via social media, email and web

It will come as no surprise that anything newsworthy results in the creators of malware intensifying their efforts to spread their malicious code. The demise of Usama Bin Laden in no exception as various attempts to entice people to follow links through are being reported all over the place. I have seen 3 people I follow on social media who …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Huge Sony PSN Data Breach: What Should I Do? (From the WatchGuard Security Blog)

I am reposting this from WatchGuard Security Center blog in its entirety below.  I have kept fairly silent on this subject as everyone has said everything that needs to be covered. Corey did a fine job of outlining the situation though, so for your reading enjoyment:   Huge Sony PSN Data Breach; What Should I Do? Corey Nachreiner | April …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter
1

“We’re from the government and we’re here to help!” – FBI in regards to removing Coreflood from infected computers

The FBI seized control of the Coreflood servers a couple weeks ago, drastically reducing the traffic that was being generated by the large botnet by stopping the update of the bot clients. This will allow anti-virus programs to begin to discover the presence on infected machines and hopefully remove it. That’s awesome, but what’s next? The FBI is seeking to …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter
2

Password for life? Yeah, maybe…

I just read an interesting blog post over on http://www.baekdal.com/tips/password-security-usability which gives a good case for not using random letters, numbers, case and special characters… The writer claims the password of “this is fun” would take about 2500 years to hack. Most business security policies require passwords that are a minimum of 8 characters, with upper and lower case, numbers and …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter

Spring Cleaning??? Pffffffthththt

Every year about this time, millions of people spend hours or even days cleaning up their computers. They weed through mail, files and other data, trying to determine what is to be kept and what should be deleted. I suggest NOT cleaning. Sure, you can ORGANIZE, but why risk losing an important file? External hard drives are inexpensive and easy …

Share and Enjoy:
  • Print
  • Facebook
  • Google Bookmarks
  • LinkedIn
  • Add to favorites
  • email
  • PDF
  • Reddit
  • RSS
  • Twitter