Our next Cyber Security Awareness Month blog is about fraudulent emails and phishing scams. This blog is written to help provide awareness to some of the common methods used in email phishing, and identify typical signs of fraudulent emails.
Whenever you connect to a website or server, there will always be a record of your connection. Learn how to hide and encrypt your identity on the web using VPN. Mask your connection by sending it through different servers around the world.
Your wireless router is the your first line of defense to your network, so having an unsecured wireless network is like leaving your front-door unlocked. This article will teach you 8 easy tips to securing your wireless network.
A password is your first line of defense. Naturally, you should do everything you can to make it as strong and secure as possible. This guide will provide some helpful tips on choosing a strong password, as well as a list of some of the common pitfalls of password security.
Night Lion Security will be joining the movement this year by helping increase awareness and giving back some of our expert knowledge. Every day for the next 31 days we will post information or a how-to guide on a specific topic..
It’s unfortunate that Information Security still doesn’t capture a significant amount of executive attention. Just how damaging would an attack be? How would you respond to state holders? Questions like that might come and go .. until there’s an incident. Then it’s damage control time; and the amount of money that could have been spent on security is pale in comparison to the amount that will be needed to contain the fallout.
The fight against cyber criminals is on-going, and in 2013 it’s as tough as ever. Businesses large and small as well as individuals constantly need to be aware of the risks that they face when they work online, and businesses in particular can be affected extremely adversely when cyber-attacks take place.
If Google detects that your website has been infected with malware or badware, visitors will be displayed a warning before they are allowed to access your site. Learn how to remove the offending code, or contact Night Lion Security to help with the removal process.
This tutorial shows how incredibly simple it is to bypass UAC and escalate your user permissions on a Windows 7 (fully patched) machine using the Sysret exploit. This exploit works on 64bit Intel Chips, including Windows and Linux.
Key takeaways: 72% of the known hacker breaches in 2011 affected businesses with 100 employees or less. 50% of small businesses think they are too small to be a hacker target. 67% don’t use web-based security/service. Read more.