Tools: How to identify and clean up Windows computers infected with malware and bots

Solution: Follow the steps below in the given order: Step 1: Disconnect the computer from the network and notify the user that the computer cannot be re-connected until all malware has been successfully removed. Step 2: Find out if the user is familiar with the destination or action that the malware or bot is trying … Continue reading Tools: How to identify and clean up Windows computers infected with malware and bots

Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions

Found this tool from CheckPoint to test your AV, Anti-Bot and Threat Emulation function. https://threatwiki.checkpoint.com/threatwiki/public.htm Test Threat Emulation Click to download a DOC with an exploit. This file will not harm your computer. To confirm the file was detected, use the Smart Log / Smart View Tracker to locate the Threat Emulation log for this … Continue reading Tools: Test your Firewall’s AV, Anti-Bot and Threat Emulation functions

Infographics: Most Common Forms of Phishing Attacks

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Bad guys are trying to phish in more than more ways to get the information they want. The core takeaway is be careful on what to entertain (whether … Continue reading Infographics: Most Common Forms of Phishing Attacks

Fortigate 5.2 Vulnerability: SSH/SSL – Weak Encryptions

Known issue to: FortiOS 5.2.x (can also apply to higher versions). But 5.4.x and later has already disabled weaker ciphers DES, RC4 and SSLv3, so Firewalls running on later version are less-prone to vulnerabilities.     Recommendations/Mitigations:  What does strong encryption do? Enabling the use of strong encryption will only allow strong ciphers such as: AES … Continue reading Fortigate 5.2 Vulnerability: SSH/SSL – Weak Encryptions

Facebook adds Google Authenticator for Two-Factor Authentication

Good news! Facebook now makes Two-Factor Authentication (2FA) easier to set up by allowing common third-party apps like Google Authenticator or Duo Security on both desktop and mobile. 2FA adds layer of security to your Facebook login by requiring you to provide a passcode or from “something that you have” (which is the 2FA generated … Continue reading Facebook adds Google Authenticator for Two-Factor Authentication

IOS 11 Tip. “Turning Off” your Bluetooth or WiFi from Control Panel doesnt really turns it OFF

BAD NEWS: In IOS 11, turning off BLUETOOTH and WIFI doesnt really turn it off in the background. It just disconnects you from your connected bluetooth peers (or wireless networks)   The GOOD NEWS is, there is still away to totally TURN OFF your Bluetooth (and WIFI) to save power. You can do this from … Continue reading IOS 11 Tip. “Turning Off” your Bluetooth or WiFi from Control Panel doesnt really turns it OFF

Gartner’s 2017 Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Released

  Here is an overview of the leaders in Unified Threat Management (UTM) for 2017. The quadrant is based on the vendor's ability to execute and the completeness of vision.  For 8th straight year, Fortinet is recognized as the market leader in UTMs. To learn more about Gartner's complete view of the UTM market, register for … Continue reading Gartner’s 2017 Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Released