20
Aug

Non-Profit Legal in Hackers’ Crosshairs: Top signs you’re a spear-phishing target and how to defend yourself

Posted by on · · · · · · · | Blog

People are often the weakest link when it comes to being a target for cyber criminals, so it’s important to know the signs in order to avoid becoming a victim of email-based scams.  Background  Globally, the rate of email spam and phishing remained high in the second quarter of 2020. Roughly 50 percent of all email traffic was spam related. To make […]

Read More
02
Apr

Sample Emergency Work from Home Policy

Posted by on · · · · · · | Blog · News

This sample Emergency Work From Home (eWFH) policy is presented to Just-Tech clients and other legal services organizations to modify and use as necessary during this time.  Please note that this document contains language and provisions that may or may not apply to your organization, and should be adapted as necessary to fit your organization’s […]

Read More
20
Jun

Widely used D-Link Modem/Router Under Attack

Posted by on · · · · | News

Ars Technica is running a story on how the Sartori botnet has been actively targeting widely used D-Link DSL Internet modems in a effort to expand its infected base and likely launch new, and more sophisticated attacks against networks and devices. What makes the focus on D-Link notable is its position as one of the […]

Read More
11
May

Security for a Civil Society

Posted by on · · · · · · · | Blog

The Ford Foundation recently partnered with The Engine Room to conduct research on the current state of digital security within the civil society community. The report is broken into three sections: The Contextual Nature of Security – which discusses “basic understandings of digital security, consider[s] political contexts, and take[s] a brief look at current and […]

Read More
06
Apr

NYC Announces City’s First-Ever Cybersecurity Initiative

Posted by on · · · | News

Via NYC.gov: Mayor Bill de Blasio has a announced “NYC Secure“, New York City’s first ever cyber-security initiative. NYC Secure will defend New Yorkers from malicious cyber activity on mobile devices, across public Wi-Fi networks, and beyond. The first NYC Secure programs will include a free City-sponsored smartphone protection app that, when installed, will issue […]

Read More
27
Mar

Facebook, Privacy, and What You Need to Know

Posted by on · · · · | Blog

Last week, New Zealand student and technologist Dylan McKay downloaded his entire Facebook archive to see just how much data the company had harvested from. To his surprise, he discovered that not only had Facebook collected the identities of his friends and family from his address book, but that, for a short period between 2016 […]

Read More
06
Feb

In Just 24 hours, 5,000 Android Devices are Conscripted into Mining Botnet

Posted by on · · · · | Blog · News

Via Ars Technica: A new internet worm emerged over the weekend that took less than 24-hours to infect Android devices such a smartphones and TV boxes. Once infected, the devices began mining the Monero brand of crypto-currency, and seeking additional devices to infect: Once infected, Android phones and TV boxes scan networks for other devices […]

Read More
30
Jan

More Than 2000 WordPress Sites Found to be Infected With Key-Logging Malware

Posted by on · · · | Blog · News

The security desk at Ars Technica is reporting on a new attack where more than 2000 WordPress sites were infected with malware that can capture keystrokes (and passwords) within the administrative control panel. It also installs an in-browser crypto-currency miner that hijacks the computers of site visitors to run silently in the background. Side effects […]

Read More
12
Jan

Meltdown and Spectre: The Pain Has Only Just Begun

Posted by on · · · | Blog · News

Ars Technica has published an excellent in-depth article detailing how the upcoming software and hardware patches designed to deal with the Meltdown and Spectre vulnerabilities will likely have a negative impact on computer performance. To recap: modern high-performance processors perform what is called speculative execution. They will make assumptions about which way branches in the code […]

Read More
29
Dec

Web Trackers Exploit Browser Login Managers

Posted by on · · · | News

Another day, another online hack, or so it seems. Whether it’s the Yahoo! password grab, or the Equifax data breach, we know that we need to secure our passwords online. Just when you thought you had done everything to be save online, we now learn of one more way your data is not safe. A […]

Read More