Microsoft patch Tuesday is upon us this week (2nd Tue in month)

The Storm  center announces patch Tuesday with a typical list of new vulnerabilities

And a big reminder – Windows XP will have its last update in April

 

But also Office 2003 will have its last update in April as well. So please update our operating systems and Office versions in case you have not yet.

(even to the old machine in the back that should just be retired.) It is not a good idea to reuse computers and not watch them.  reusing a computer has too many risks.

Wifi virus? is it possible?

RFGlobalnet  has an article about a possible Wifi virus which propagates from one AP (access point) to another.

The University of Liverpool has set up a theoretical infection from one Wifi to another.

If a wifi system (AP) does not have good enough encryption setup, with a sophisticated password this attack could occur.

And Anti-virus programs will not protect.

The problem is that the danger has only been discovered, which means the nefarious methods are not even devised yet.

Keep you Wifi router correctly configured. Contact us for a remote Alpha scan.

Network Vulnerability Assessments

Why perform a network vulnerability assessment or review?

because there are certain individuals that will take any weakness in your computers and networks (firewalls, switches) and exploit it to their own ends.

What can an enterprising evil hacker do? Minimally use your computers and networks that you have bought and paid for to attack other machines.

Besides using your resources, the evil hacker can steal your data, your customer information, anything that can be pieced together to be sold on the criminal market.

To give an example of hacker prowess and ingenuity: the Cap’n Crunch whistle for example There were these whistles in Cap’n Crunch cartons, and they happened to whistle at 2600Hz frequency

Cap'n Crunch whistle

Story at jetcityorange.com

Before the phone systems were run by digital computers, the analog systems could be fooled in giving unlimited calls (long distance etc) at payphones.

I know it is stealing and a bad ethical thing, but look at the pure “hacking” ingenuity of the action finding of a whistle in a box, using it in a payphone and then trying various methods to steal calls.

 

Today’s hackers are just as ingenious with many different types of attacks.