Wednesday, September 20, 2023

Now even a light bulb can steal your Wi-Fi password.

Recently, vulnerabilities were discovered in TP-Link Tapo L530E smart bulbs and the TP-Link Tapo application. These vulnerabilities can pave the way for any malicious actor to access Wi-Fi credentials.

The vulnerabilities are related to unreliable authentication and a lack of random elements in symmetric encryption.

With the help of these vulnerabilities, a malicious actor can obtain the Wi-Fi credentials of the victim's network and control all devices connected to that network.

Until the vulnerabilities are fixed, I recommend not using these light bulbs and their associated application. 


Source: AntiHaker Blog  

Monday, September 18, 2023

Unlock / Delete File or Folder, Locked by a System or Applications

Choose the right tools


 Tested, works

 

 https://emcosoftware.com/unlock-it

Wednesday, September 13, 2023

Reconciling the DHCP Database

When inconsistencies in the DHCP database are detected, reconciliation of data across all scopes can resolve the problem. Lease information is stored in the database in two forms: detailed and summary. During reconciliation, these details are compared for contradiction. If found, the DHCP server either reverts the addresses  in question to the original owners or creates temporary reservations for them, valid for the assigned lease time. 

Access the DHCP console and select the relevant server from the console tree to perform reconciliation. 

On the 'Action' menu, click 'Reconcile All Scopes', then 'Verify'. 

Any inconsistencies are reported and can be fixed by clicking 'Reconcile'. 

If the database is found to be consistent, click OK.

To perform this process for an individual scope, click the applicable scope in the console tree, and from 'Actions', click 'Reconcile', and then 'Verify'. Any inconsistencies detected can be corrected by selecting the discrepancies and clicking 'Reconcile'.






Monday, September 11, 2023

AI helps to prevent accidental data exposure

 Hornetsecurity releases 365 Total Protection Plan 4 for Microsoft 365 with AI Recipient Validation that prevents misdirected emails.


AI Recipient Validation is one of 365 Total Protection’s newest features, providing security and compliance managers with true visibility into how often employees are exposed to potentially misdirected emails and how they respond to them. It protects the end user by providing a warning when an email they are about to send appears to be misguided or contain sensitive information. The user can decide to either adjust their email or continue to send without modification.

Additionally, this new AI-based service continuously updates its understanding of the user’s email communication patterns by learning user behaviour and responses. It then automatically adjusts warnings for outgoing emails and prevents users from receiving similar warnings multiple times.


Read more:

https://www.hornetsecurity.com/en/press-releases/launch-of-365tp-plan4-with-airv


Reminder
Tips for identifying malicious emails

Professional cyber attacks via email are very difficult to detect, but there are a few clues for detecting fraud. First of all, if a fraudulent email is suspected, Verify whether the sender address actually matches the original domain. Consider carefully whether the sender is really an acquaintance or business partner of yours or whether the email address only resembles that of the actual person. Check for spelling and grammar mistakes, especially if the email is supposed to come from a reputable company. An impersonal form of address in the cover letter, such as “Dear Ladies and Gentlemen,” is another clue. Be careful with links or buttons placed in emails, because as a “normal user” it is very difficult to check whether the apparent link target is actually correct. In case of doubt, it is safest not to click on any attached link.


Sunday, September 3, 2023

GoldeN Rules- 13

 

Simplify IT concepts for non-technical users.

 

While IT professionals are familiar with terms like botnets, DDoS attacks, drive-by downloads, and spear phishing campaigns, many users may not be. It's crucial to make things easy to understand.

 

Think of it this way: imagine explaining complex ideas to a 5-year-old. That's the approach we should take when explaining cyber security to non-technical folks. We want to break it down into simple terms that anyone can grasp.

 

If you or your users need a handy reference, I recommend checking out this glossary of cyber security terms on TechAdvisory.com. It can be a great resource for understanding the jargon and making the topic more approachable.

Ninite.com - download commonly installed programs all at once when setting up a new computer.

 Ninite.com is a free and user-friendly service that simplifies the process of installing and updating commonly used software on Windows com...