Who makes Insinkerator garbage disposals?

Who makes Insinkerator garbage disposals?

Insinkerator is a venerable and popular brand of garbage disposal you can find at at almost any hardware or home improvement store. You can find one at almost any price point you want, whether you want to spend tens of dollars or hundreds. But who makes Insinkerator garbage disposals?

Read more

Watering hole attack prevention

Watering hole attack prevention

A watering hole attack is an indirect attack on a victim. Rather than directly attacking the victim’s network, the attacker attacks a web site that the victim’s employees are likely to visit. Then the attacker attacks the victim’s network, via its own workstations, from that web site. A former colleague asked me how you protect against watering hole attacks, and I thought this was a good exercise. So here are some strategies for watering hole attack prevention.

Read more

Where Lionel trains are made

Lionel is an iconic American brand, and I often hear people refer to it as a made-in-the-USA company. But it’s been a long time since that’s been where Lionel trains are made. Or at least the majority.

It turns out Lionel has a bit of a history with that.

Read more

Marx vs. Lionel

In the 1950s, Marx and Lionel took turns being the biggest toy company in the world, largely riding on the popularity of O gauge trains. Neither company particularly liked the other, but both owed some degree of their success to being compatible with one another. Because of their interoperability, the two makes of trains are frequently compared and contrasted even today.

Read more

Spot phishing e-mails with Outlook

I got e-mail the other day from Turbotax saying someone had filed my taxes for me. Obviously a cause for concern, right? Here’s how I determined the message was fake in about three minutes. You can spot phishing e-mails with Outlook the same way.

Some people will tell you not to even open a message like this, but if you’re a computer professional, at some point someone is going to want you to prove the message was fake. I think this is something every e-mail administrator, desktop support professional, security professional, and frankly, every helpdesk professional ought to be able to do.

So here’s how you can get the proof. And generally speaking, Outlook 2010’s default configuration is paranoid enough that this procedure will be safe to do. If you want an extra layer of protection, make sure you have EMET installed and protecting Outlook.

Read more

TP-Link TL-WR840n vs TL-WR841n

TP-Link TL-WR840n vs TL-WR841n

If you need an inexpensive DD-WRT compatible router, TP-Link is probably your best choice. But there are some big differences when you compare the TL-WR840n vs the TL-WR841n.

I’ve been running the TL-WR841n for more than two years, so I’m familiar with it. I’ve considered supplementing it with a secondary router, and the TL-WR840n was one I looked at.

Read more

What I would have done to secure the Astros’ database

The now-infamous breached Houston Astros database sounds like a classic case of what security professionals call Shadow IT: a project that the business needs, done without adequate involvement from security and, most likely, from the IT department as well.

These kinds of things happen a lot. A go-getter implements it, cutting through red tape to get a useful project done in record time, and it’s great until something goes wrong.

In this case, “wrong” meant a competitor got into the database and stole trade secrets.

Read more

Hillary, hackers, threats, and national security

I got a point-blank question in the comments earlier this week: Did Hillary Clinton’s home-made mail server put national secrets at risk of being hacked by our enemies?

Depending on the enemies, maybe marginally. But not enough that any security professional that I know of is worried about it. Here’s why.

Read more

WordPress Appliance - Powered by TurnKey Linux