“Remember, though, you’re not hunting the healthy — you’re looking for the weak and overlooked.”
—- Matt Walker
This is my absolute favorite quote regarding cyber security that I’ve heard so far. It says so much. And resonates with me on a personal level.
I would rather “stay sharp” than “stay fresh”. My logic behind this is staying sharp means you keep a figurative “cutting edge” and are ready to “cut” when needed. Also, the opposite of sharp is dull which is useless when you need a cutting edge. Now, as for “staying fresh”, it implies that you are keeping yourself fresh and ripe for the plucking or consumption. In other words, ready to be devoured. I would rather be a sharp edged sword than a fresh pie. Just a thought.
If you want to run a virtual machine on a Mac or even a Windows host, I highly recommend VMware Fusion. I’ve been driving it for some time now and I can’t tell you how helpful the Unity mode is. Also, their support has been great.
So, for some time now, having an RDP port open to the web would probably mean trouble for you. A number of reasons you would not want to open that port up include being able to brute force the administrator account. Even if it has been renamed, it is not guaranteed to stop an attacker. There are tools for enumeration of user accounts. Anyway, apparently using an RDP honeypot is a great way to examine attack techniques. Please read the following blogs for more information:
Trusted Sec: Adventures of an RDP Honeypot
Wilbur Security: RDP Honeypotting
These articles are just a couple that I’ve seen out there. I’m sure there are more on the web if you look for it.
Stay safe out there.
Microsoft can send samples of software from your PC using the Automatic Sample submission feature in Windows Defender. This would mean that even software that you develop or test will be pushed to their servers. Developers need to ask themselves if this is ok or not and turn off this feature in Windows 10.
The door is usually open for Microsoft when it comes to whitelisted services. Unless you are using a computer that is controlled by your organization’s policy, etc. This means the Windows Defender service can send samples of software to Microsoft for analysis. Including software you develop in-house. One must ask themselves what Microsoft is doing with the installers after they “analyze” them.
I’m also finding myself thinking of how attackers can exploit this in a way that can mean impersonating a piece of software that is meant for someone else’s system….
Take a look at this engineer’s experience here:
I’m sure both Google and Apple take security seriously when it comes to their mobile OS. But I actually place my trust in Apple over Google because Apple is the creator of the device and the OS. With that said they don’t allow people to look at their source code. Apple also does a pretty decent job of gatekeeping their App Store. Google Android source code can be modified to run on different hardware platforms and each of these hardware vendors have their own set of privacy and security policies. Software and the data can get messy and over complicated. With Apple, you get Apple policy. Read more here.
I would like to share this news with you because it made me happy:
Hello from the farm. Please take note of this document when building a small business IT environment.
I really have to give a shout out to Apple support for making my day better. I had a screen issue with my 13″ MacBook Pro and it was still under warranty. Called support folks on Friday the 16th. They sent me a box on Monday the 19th and I shipped my computer to them that day. They were able to fix my screen and have my precious computer back to me today the 22nd. I’m a happy customer. Just disappointed there isn’t an authorized Apple repair store closer to my location. Doesn’t matter, I’m happy I have my computer back and it’s just like brand new.
Using updated Wp due to security vulnerabilities in my last PHP implementation. Makes a couple of things easier for admin and users.
Working on getting things moved over. Please stand by for updates.
If you are an Apple user please be aware of where you get your lightning cable from. Don’t borrow one from someone. Don’t accept or purchase a cable that doesn’t come from Apple directly.
A hacker has modified a Lightning cable in order to gain remote access to your device. I believe it works via wireless so the attacker needs to also be in close proximity to your device.
Read more here.