Kevin Mitnick demonstrates a Microsoft Word document exploit

Did you know that most successful computer exploits that we encounter are because the user simply clicked a link, or opened a document without giving it a second thought? I think we’re all guilty of receiving an email from someone we know, or assume we know, then opening the email and following that link. I know I have done it, …

Microsoft FixIt for Word / Office should be applied without hesitation

Yesterday’s Microsoft Security Advisory announced a vulnerability in Microsoft Word which could permit remote code execution. The summary of this advisory simply states that people are being exploited due to a vulnerability. It happens when someone opens, or even previews an RTF in email using Microsoft Word as the email viewer. While Microsoft has not released a full patch at …

Is your video surveillance system being used to watch you?

An article caught my eye the other day, where a hacker had gained access to the video baby monitor a family had deployed. In doing so, they harassed the family a bit by saying their child’s name and moving the camera. If your video surveillance system is configured to where you have remote access, you could be allowing someone to …

1

What do you say if someone wants to plug something into your network?

Let’s assume you are a business owner and a man walks in wearing a jumpsuit with an official looking badge, and tells you that he is from the power company, sent there to plug a device into your outlet that will monitor and potentially save you money. What do you do?  Let’s assume they say they are from DHEC and …