The Firewall Summary shows the number of attacks on this website that the web application firewall recently blocked. The summary includes three types of attacks: Complex Attacks, Brute Force Attacks and Blacklist blocks. A complex attack is when a visitor requests the website that is specifically crafted to exploit the site or find a vulnerability they can later exploit. Firewall rules block these types of attacks. Brute force attacks are username/password-guessing attempts. These attacks intend to log in to the…
Security
Michael Tsai - Blog - Annoying Catalina Security Features (mjtsai.com) After 24 hours of trying to use Catalina in earnest with all my data and apps intact, the new security features are incredibly annoying. Even my backup software, CrashPlan, lost access to all drives.…
Citrix Workspace App GlobalSign Root CA post upgrade to Catalina Beta macOS 10.15 Catalina was released yesterday. Apple provided a warning (June 2019) about important new security requirements for TLS server certificates in iOS 13 and macOS 10.15. Citrix, which offers enterprise software for Mac and Windows, didn't get the memo or were just asleep at the wheel. After installing Catalina, I started getting errors about untrusted root certificates. You have not chosen to trust "GlobalSign Root CA", the issuer…
Sunday Paper - Cybersecurity, Writing, Molecular Coffee, NJ Transit, Fish Tube, Stop Being Positive
Posted on 25th August 2019Jim Grey on how he can write a new blog post almost every day. I write about whatever I want — it’s a personal blog after all. Anything is subject fodder. I write about photography and cameras a lot because it’s a lifelong interest and I’ve found my largest, most engaged audience there. Yes, I pander shamelessly to you film photographers!Jim Grey Some people just want all the profit for themselves. Lab engineered coffee means nothing good for the environment…
Deepfake Audio Technology Is a Real Threat to Enterprise Security
Posted on 24th August 2019Why Deepfake Audio Technology Is a Real Threat to Enterprise Security According to Axios, deepfake audio technology has already begun wreaking havoc on the business world, as threat actors use the tech to impersonate CEOs. Symantec has reported three successful audio attacks on private companies that involved a call from the “CEO” to a senior financial officer requesting an urgent money transfer. Just imagine how an incident like this would affect your company. Time to start thinking about mitigation.…