Insinkerator is a venerable and popular brand of garbage disposal you can find at at almost any hardware or home improvement store. You can find one at almost any price point you want, whether you want to spend tens of dollars or hundreds. But who makes Insinkerator garbage disposals?
A watering hole attack is an indirect attack on a victim. Rather than directly attacking the victim’s network, the attacker attacks a web site that the victim’s employees are likely to visit. Then the attacker attacks the victim’s network, via its own workstations, from that web site. A former colleague asked me how you protect against watering hole attacks, and I thought this was a good exercise. So here are some strategies for watering hole attack prevention.
Lionel is an iconic American brand, and I often hear people refer to it as a made-in-the-USA company. But it’s been a long time since that’s been where Lionel trains are made. Or at least the majority.
It turns out Lionel has a bit of a history with that.
My realtor called the other day and asked me what garbage disposals cost. The answer, of course, is that it varies, but it’s definitely possible to estimate.
Barracuda is a private-label brand of garbage disposal you can find at Menards home improvement stores. They are usually the least expensive disposal on Menards’ shelf. But who makes Barracuda garbage disposals?
In the 1950s, Marx and Lionel took turns being the biggest toy company in the world, largely riding on the popularity of O gauge trains. Neither company particularly liked the other, but both owed some degree of their success to being compatible with one another. Because of their interoperability, the two makes of trains are frequently compared and contrasted even today.
I got e-mail the other day from Turbotax saying someone had filed my taxes for me. Obviously a cause for concern, right? Here’s how I determined the message was fake in about three minutes. You can spot phishing e-mails with Outlook the same way.
Some people will tell you not to even open a message like this, but if you’re a computer professional, at some point someone is going to want you to prove the message was fake. I think this is something every e-mail administrator, desktop support professional, security professional, and frankly, every helpdesk professional ought to be able to do.
So here’s how you can get the proof. And generally speaking, Outlook 2010’s default configuration is paranoid enough that this procedure will be safe to do. If you want an extra layer of protection, make sure you have EMET installed and protecting Outlook.
If you need an inexpensive DD-WRT compatible router, TP-Link is probably your best choice. But there are some big differences when you compare the TL-WR840n vs the TL-WR841n.
The now-infamous breached Houston Astros database sounds like a classic case of what security professionals call Shadow IT: a project that the business needs, done without adequate involvement from security and, most likely, from the IT department as well.
These kinds of things happen a lot. A go-getter implements it, cutting through red tape to get a useful project done in record time, and it’s great until something goes wrong.
In this case, “wrong” meant a competitor got into the database and stole trade secrets.
I got a point-blank question in the comments earlier this week: Did Hillary Clinton’s home-made mail server put national secrets at risk of being hacked by our enemies?
Depending on the enemies, maybe marginally. But not enough that any security professional that I know of is worried about it. Here’s why.