article thumbnail

MyBook Users Urged to Unplug Devices from Internet

Krebs on Security

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device.

Internet 295
article thumbnail

GUEST ESSAY: Best practices checklists each individual computer user still needs to follow

The Last Watchdog

Keep your firewall turned on. Software based firewalls are widely recommended for single computers, while hardware firewalls are typically provided with routers for networks. Some operating systems provide native software firewalls (such as Windows OS). Backup checklist. Stelzhammer.

Backups 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Security Affairs

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. The tool is not designed to be exposed on the Internet, however, researchers spotted tens thousands Redis instance publicly accessible without authentication. ” warns Censys. bash_history).

article thumbnail

Top Security Tools & Software for SMBs in 2022

eSecurity Planet

FortiGate Network Firewall. Fortinet delivers FortiGate Network Firewalls that are right sized for small businesses to deliver easy-to-use enterprise-level security, good price-to-performance, and offer centralized cloud management that integrates into the larger Fortinet Security Fabric as the business grows. Key Differentiators.

Software 133
article thumbnail

A ransomware attack took 100 Romanian hospitals down

Security Affairs

Identify affected systems and immediately isolate them from the rest of the network as well as from the Internet Keep a copy of the ransom message and any other communications from the attackers. This information is useful to the authorities or for further analysis of the attack Do not shut down the affected equipment.

article thumbnail

BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

The Last Watchdog

A VPN encrypts all internet traffic so that it is unreadable to anyone who intercepts it. This keeps your information away from prying eyes, such as internet service providers and hackers. Set up firewalls. Firewalls act as a defense line in preventing the possibility of threats entering your system. Secure home router.

VPN 214
article thumbnail

How to Protect WordPress Sites from Exploitation

SecureWorld News

Hundreds of millions of websites on the internet today rely on the content management system WordPress. Be sure to verify that they are using approved Web Application Firewalls (WAFs) and secure FTP capabilities. Security plugins will typically include traffic firewalls, scanners, brute-force protection, and real-time notifications.

Backups 82