2 Factor Authentication

2-factor authentication is your friend. Use it!

Due to a remote execution flaw in CyberPanel, I had to clean up after this attack. The most useful site I found was Kinsing malware (kdevtmpfsi) – how to kill on CreateIt. The instructions there are useful. Don’t forget to do the full search, as if you have any “kinsing” files left, they’ll get things started…
I’m frequently asked how to do this, and the simple answer is that if an e-mail isn’t from someone you know or someone you do business with, don’t open it. Further, if the e-mail doesn’t seem in character for that person or business, don’t open it. If you’d be suspicious of the content if your…
Your pride in your child may represent a security, safety, and privacy issue.
… consider yourself warned. I have encountered several machines recently on which people were either running without anti-virus protection or had allowed the anti-virus subscription to lapse, sometimes for long periods of time. I know it’s tempting to avoid that little expense, but the protection is critical. You also need to let those scans run,…
Wordfence is providing another excellent public service announcement, this time regarding hijacked extensions. While the method of attack is interesting, there are a number of important actions recommended in the post. I’d like to call your attention to a few: Don’t trust links in e-mails. As we become used to search bars being combined with…
The hope of getting something for nothing was encouraged with the advent of computers and software. For technically oriented people, it’s fairly easy, and relatively safe, to steal software. You just copy it. For many, especially in the early days, this didn’t seem like stealing. After all, where is the thing that you’re stealing? I…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)